Wow that article is very badly written.
At the end of Last month, TOR itself confirmed that someone out there which is exploiting TOR Network for De-Anonymize tor users
Looks like the author didn't even bother to read the blogpost that the Tor Project put up:
https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attackIn short: they are COMPLETELY different attacks. The attack in the OP's article is the one that was used against Freedom Hosting back in August 2013, where they hacked the freedom hosting server and served up malicious javascript to anyone visiting the kiddy porn sites they were hosting.
This issue has been patched (it was a 0-day exploit in Firefox) and similar exploits can be prevent by DISABLING JAVASCRIPT like you are supposed to do when using Tor as javascript can do all sorts of evil things such as this.
The attack detected by the Tor Project recently is MUCH more serious. It involves running hundreds of malicious Tor nodes and using traffic analysis techniques to determine the users IP. It was also used to determine the IP's of the hidden services they were visiting. This kind of attack was already well known in theory, it is just the first time someone has successfully pulled it off, especially in a large scale and for such a long time (5 months).
Additionally it shows a huge failure on the part of the Tor Project as they had actually detected these malicious nodes hours after they originally came online in January but they thought that it wasn't enough nodes to pull off the attack.
Please note that this attack was ONLY executed against people visiting Tor hidden services. If you used Tor for general internet browsing you are unaffected. In addition it has been found out that the attack was executed by security researchers and it appears they are going to destroy all the information they collected (users IP's) so we dodged a bullet this time.