second hypothesis, the mobile operators intervene on the source code of the pages before serving to brower altering the content to serve the malicious code
🏠 Home ➡️ Bar ➡️ Defend yourself from unsolicited mobile subscriptions charges with SMS (text) barring ➡️ injectionB