http://www.wired.com/2014/08/operation_torpedo/
Security experts call it a “drive-by download”: a hacker infiltrates a
high-traffic website and then subverts it to deliver malware to every single
visitor. It’s one of the most powerful tools in the black hat arsenal,
capable of delivering thousands of fresh victims into a hackers’ clutches
within minutes.
Now the technique is being adopted by a different kind of a hacker—the kind
with a badge. For the last two years, the FBI has been quietly
experimenting with drive-by hacks as a solution to one of law enforcement’s
knottiest Internet problems: how to identify and prosecute users of
criminal websites hiding behind the powerful Tor anonymity system.