Okay, but how? Is someone reading commands in a "how the exploit works" write-up and... running them?
Never underestimate human stupidity, especially when it comes to IT.
Never underestimate human stupidity, especially when it comes to IT.