Airtel 3G Script Injection
<b> Airtel 3g is injecting script and iframe into your page. After <a href='https://github.com/thejeshgn'>Thejesh GN</a> reported this & uploaded on <a href='https://github.com/thejeshgn/airtel-3g-script-injection'>Github.com</a>, Israeli firm Flash networks Ltd. sent a DMCA notice to Github.com to bring it down and sent a cease & desist notice to Thejesh GN.</b><br/><br/>
<b> This page is a copy of the page Github.com brought down after receiving the DMCA notice. Exact copy can be found at <a href='https://web.archive.org/web/20150609004452/https://github.com/thejeshgn/.... Please share it widely and bring it to the notice of unsuspecting users whose privacy is being compromised by such scripts.</b><br/><br/>
<b>Script URL that gets injected: <a href='http://18.104.22.168/scripts/Anchor.js'>http://22.214.171.124/scripts...
<b>Check the copy of that source code at pastebin.com</b><br/><br/>
<iframe src="http://pastebin.com/embed_iframe.php?i=ZP6r6ENK" style="border:none;width:100%"></iframe><br/><br/>
<b>Iframe src: <a href='http://126.96.36.199/l8/Layer8Servlet'>http://188.8.131.52/l8/Layer...
<b>Code of injected script is here for you to look. You can also look at the beautified version.
What does iframe contain?
Nothing as of now. Nothing that I can see. But a browse through a code says they are trying to inject a toolbar!</b><br/><br/>
<h2>ip 184.108.40.206 belongs to</h2><br/>
<b>So whats up at 220.127.116.11<b><br/><br/>
<b>Google or go through the code for the rest</b>