Ars Technica used in malware campaign with never-before-seen obfuscation — Buried in URL was a string of characters that appeared to be random, but were actually a payload::Vimeo also used by legitimate user who posted booby-trapped content.
You must log in or # to comment.
Ars Technica compromised. Come read the story at Ars Technica!
It’s also not clear that any Ars users visited the about page.
Are weblogs not a thing? They should be able to tell how many times that page was accessed and by whom with a single query.
Damn, that’s pretty cool actually.