For those using Tor this should be treated as an heads up.
http://www.theguardian.com/technology/2014/nov/14/government-hackers-tor-malware-attacks-onionduke-minidukeA hacker who was surreptitiously injecting malicious code in downloads in to part of the Tor network has been linked to a series of government-sponsored cyber attacks.
The attacker was abusing their control over a TOR exit node in Russia to inject malware into downloads, Josh Pitts, a researcher at Leviathan Security, discovered in late October.
Finnish security firm F-Secure investigated the malware, calling it OnionDuke owing to its links to another piece of suite of hacker tools named MiniDuke, which is thought to have the backing of the Russian government as it had previously targeted Nato and European governments.
Once the OnionDuke malware was installed on a victim’s machine via a “wrapper” that included the original file and the malicious code, it would attempt to speak with its creators via a number of hacked websites.
This is not the only attack on TOR, last year we saw the FBI flooding the Tor Network using "Virtual Tor Nodes" to assist in locating Darknet servers, it seems anyone using such technology and thinking they are securely hidden is way out of touch with current reality, I remember posting previously about the Chinese Govt hosting such nodes to gather security/login data, operating an exit node can be quite an efficient way to gather a lot of private data, you have been warned