a) the final binaries were the ones infected (very easy to detect (imagine
if the infected code was actually from 'real' SVN source code and made from
a 'trusted' developer))
b) by the speed this was detected the exploit (and the blog page didn't
give a lot of details about it) must have
nice, the business model is evolving.
But this is still a very 'inefficient' attack since:
a) the final binaries were the ones infected (very easy to detect (imagine
if the infected code was actually from 'real' SVN source code and made from
a 'trusted' developer))
b) by the speed this was