nice, the business model is evolving.
But this is still a very 'inefficient' attack since:
a) the final binaries were the ones infected (very easy to detect (imagine
if the infected code was actually from 'real' SVN source code and made from
a 'trusted' developer))
b) by the speed this was detec
> a) the final binaries were the ones infected (very easy to detect (imagine
> if the infected code was actually from 'real' SVN source code and made from
> a 'trusted' developer))
> b) by the speed this was detected the exploit (and the blog page didn't
> give a lot of details about it) must hav