There are far more than 31 signatures that have the potential to impact Linux systems. There are, in truth, over 23,000 signatures that are able to detect malware on Linux and Unix systems. Most "Linux" signatures only contain the word Unix, however. Additionally, keep in mind that these are only from the ClamAV provided databases. Sanesecurity and the Linux Malware Detect project add more as well.
Of the official databases, the signatures break down like this for Unix signatures: 1 [bytecode] 7386 [daily.hdb] 11640 [daily.hsb] 67 [daily.ldb] 11 [daily.ndb] 141 [main.hdb] 3445 [main.hsb] 5 [main.mdb] 426 [main.ndb] 2 [daily.ldb] <== These are noted by Al in his previous message. Aside from the Win.* signatures, these are the major grouping of the non-hash signatures: 1 Unix.Downloader 28 Unix.Exploit 1 Unix.Malware 1 Unix.Packer 6 Unix.Rootkit 311 Unix.Tool 144 Unix.Trojan 11 Unix.Worm Of the hashes, there are about 50 different 'families' of Unix/Linux related malware of varying specificity: 3 Unix.Adware.Bundlore 1 Unix.Adware.Bundloreca 9 Unix.Adware.Genieo 1 Unix.Adware.Installmiez 1 Unix.Adware.Macinst 1 Unix.Adware.Spigot 1 Unix.Adware.Xloader 1 Unix.Downloader.Amcleaner 1 Unix.Exploit.CVE_2016_8733 1 Unix.Exploit.CVE_2016_9032 1 Unix.Exploit.CVE_2016_9033 1 Unix.Exploit.CVE_2017_1000253 1 Unix.Exploit.Gingerbreak 1 Unix.Exploit.Iosjailbreak 1 Unix.Exploit.Lacksand 4 Unix.Exploit.Lotoor 1 Unix.Exploit.Powershell 1 Unix.Exploit.Remotesync 1 Unix.Exploit.Roothack 1 Unix.Exploit.TALOS_2016_0257 21777 Unix.Malware.Agent 1 Unix.Malware.Generic 1 Unix.Malware.Setag 4 Unix.Malware.Tsunami 1 Unix.Malware.Xorddos 1 Unix.Spyware.Opinionspy 1 Unix.Tool.Dnsamp 6 Unix.Tool.Dofloo 448 Unix.Tool.EQGRP 5 Unix.Tool.FakeAV 1 Unix.Tool.Flood 1 Unix.Tool.Zusy 137 Unix.Trojan.Agent 6 Unix.Trojan.Cornelgen 7 Unix.Trojan.Ddostf 13 Unix.Trojan.Dofloo 1 Unix.Trojan.Dogspectus 1 Unix.Trojan.Elknot 1 Unix.Trojan.Elzob 127 Unix.Trojan.Gafgyt 3 Unix.Trojan.Hanthie 3 Unix.Trojan.Mayday 24 Unix.Trojan.Mirai 2 Unix.Trojan.Small 7 Unix.Trojan.Tsunami 1 Unix.Trojan.Webshell 1 Unix.Trojan.Zonie 1 Unix.Virus.Zusy 1 Unix.Worm.Cheese 1 Unix.Worm.Darlloz My suggestion is, yes. Run ClamAV. But don't rely on just the official databases. --Maarten On Wed, Dec 20, 2017 at 4:09 AM, Al Varnell <alvarn...@mac.com> wrote: > FYI, there are 31 ClamAV signatures that contain the word "Linux". There > are currently almost 6.4 million ClamAV signatures in the database. > > All but two are in main.ndb or main.hdb, meaning they are relatively old. > > All but five start with Win.Trojan or Win.Exploit or Win.Tool so I'm not > clear on their relationship to Linux. > > The two most recent ones are: > - Unix.Trojan.Linux_DDoS_93-2 > - Unix.Trojan.Linux_DDoS_93-5364119-0 > > -Al- > > On Wed, Dec 20, 2017 at 12:47 AM, Matus UHLAR - fantomas wrote: > > On 19.12.17 12:44, Dan Rawson wrote: > >> I'm working on running clamav on my Linux workstation - NOT a server > environment. What is the recommended usage in that environment? clamd + > OnAccess? clamscan scheduled from cron?? clamdscan scheduled from cron?? > >> > >> I did search through the documentation but didn't see much addressing > "best practices" in a single machine environment. > > > > I haven't seen a linux malware yet. Well, I've heard that it exists, but > > haven't seen it (except hacking suite...) > > > > what makes you think you need it? > > -Al- > -- > Al Varnell > Mountain View, CA > > > > > > _______________________________________________ > clamav-users mailing list > clamav-users@lists.clamav.net > http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users > > > Help us build a comprehensive ClamAV guide: > https://github.com/vrtadmin/clamav-faq > > http://www.clamav.net/contact.html#ml > _______________________________________________ clamav-users mailing list clamav-users@lists.clamav.net http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users Help us build a comprehensive ClamAV guide: https://github.com/vrtadmin/clamav-faq http://www.clamav.net/contact.html#ml