the code itself can be seen here: http://pastebin.mozilla.org/1049772
the interesting thing about this code is that the advertising servers are not switched on but in this example we see a hijack of mozilla.com. if you use noscript like i do in firefox this warns you of the attack but is not able to prevent it due to the MITM nature of the attack, if you have a list of sites that are able to bypass noscript and you live in china i suggest removing them for the time being.
Upon phoning china telecom on their hotline number "10000" they try to give you the run around and insist advertising exists on the web and that they are not interfering with the traffic, only once you start to argue with them and go up the food chain do you get somewhere, which they are willing to disable this "service". my questions to them were "why am i paying twice for a service, i pay for it the first time, then you force me to look at your advertisements on my personal sites?" no comment is the response but a technician will follow up..
However the downside is that any web apps pulling data from sites are also being interfered with causing malformed errors.
One operator from china telecom said "i don't see any problems when i'm at home" which i quickly replied to "sure, but you're probably using IE and being that this service hasn't been fully activated yet you wont notice"
The more exposure this gets the more chance that this wont make it past testing