John Connor
Lifer
The iFrame injection attack loaded a valid jquery.js file with very little to alert even the researcher that something else was going on. As the company writes in this blog post, the only red flag in the code was a loadFile() function downloading dron.png into the iFrame.
http://www.theregister.co.uk/2014/02/05/iframe_attack_injects_code_via_pngs/
Good thing I use NoScript for Firefox.