Ars Technica used in malware campaign with never-before-seen obfuscation — Buried in URL was a string of characters that appeared to be random, but were actually a payload
Ars Technica used in malware campaign with never-before-seen obfuscation — Buried in URL was a string of characters that appeared to be random, but were actually a payload::Vimeo also used by legitimate user who posted booby-trapped content.
![](https://kbin.life/media/cache/resolve/entry_thumb/8e/b2/8eb20b154c0ade98bc9d8be1f4afb06a1d0ca5b78134fd7969fdd211c6e855ea.jpg)