And...Pdf, Rtf, Doc, Xls, Ppt, Html etc... and I could go on. There are
some vulnerabilities that affect applications across platforms. Something
to keep in mind.

Might be better to exclude "Win.", rather than chose what to include.

- Alain

On Wed, Dec 20, 2017 at 9:53 AM, Joel Esler (jesler) <jes...@cisco.com>
wrote:

> You may want to add “ELF….” To your count.  Perhaps even “OSX….”
> --
> Joel Esler | Talos: Manager | jes...@cisco.com<mailto:jes...@cisco.com>
>
>
>
>
>
>
> On Dec 20, 2017, at 7:02 AM, Maarten Broekman <maarten.broek...@gmail.com<
> mailto:maarten.broek...@gmail.com>> wrote:
>
> There are far more than 31 signatures that have the potential to impact
> Linux systems. There are, in truth, over 23,000 signatures that are able to
> detect malware on Linux and Unix systems. Most "Linux" signatures only
> contain the word Unix, however. Additionally, keep in mind that these are
> only from the ClamAV provided databases. Sanesecurity and the Linux Malware
> Detect project add more as well.
>
> Of the official databases, the signatures break down like this for Unix
> signatures:
>      1 [bytecode]
>   7386 [daily.hdb]
>  11640 [daily.hsb]
>     67 [daily.ldb]
>     11 [daily.ndb]
>    141 [main.hdb]
>   3445 [main.hsb]
>      5 [main.mdb]
>    426 [main.ndb]
>      2 [daily.ldb] <== These are noted by Al in his previous message.
>
> Aside from the Win.* signatures, these are the major grouping of the
> non-hash signatures:
>      1 Unix.Downloader
>     28 Unix.Exploit
>      1 Unix.Malware
>      1 Unix.Packer
>      6 Unix.Rootkit
>    311 Unix.Tool
>    144 Unix.Trojan
>     11 Unix.Worm
>
> Of the hashes, there are about 50 different 'families' of Unix/Linux
> related malware of varying specificity:
>      3 Unix.Adware.Bundlore
>      1 Unix.Adware.Bundloreca
>      9 Unix.Adware.Genieo
>      1 Unix.Adware.Installmiez
>      1 Unix.Adware.Macinst
>      1 Unix.Adware.Spigot
>      1 Unix.Adware.Xloader
>      1 Unix.Downloader.Amcleaner
>      1 Unix.Exploit.CVE_2016_8733
>      1 Unix.Exploit.CVE_2016_9032
>      1 Unix.Exploit.CVE_2016_9033
>      1 Unix.Exploit.CVE_2017_1000253
>      1 Unix.Exploit.Gingerbreak
>      1 Unix.Exploit.Iosjailbreak
>      1 Unix.Exploit.Lacksand
>      4 Unix.Exploit.Lotoor
>      1 Unix.Exploit.Powershell
>      1 Unix.Exploit.Remotesync
>      1 Unix.Exploit.Roothack
>      1 Unix.Exploit.TALOS_2016_0257
>  21777 Unix.Malware.Agent
>      1 Unix.Malware.Generic
>      1 Unix.Malware.Setag
>      4 Unix.Malware.Tsunami
>      1 Unix.Malware.Xorddos
>      1 Unix.Spyware.Opinionspy
>      1 Unix.Tool.Dnsamp
>      6 Unix.Tool.Dofloo
>    448 Unix.Tool.EQGRP
>      5 Unix.Tool.FakeAV
>      1 Unix.Tool.Flood
>      1 Unix.Tool.Zusy
>    137 Unix.Trojan.Agent
>      6 Unix.Trojan.Cornelgen
>      7 Unix.Trojan.Ddostf
>     13 Unix.Trojan.Dofloo
>      1 Unix.Trojan.Dogspectus
>      1 Unix.Trojan.Elknot
>      1 Unix.Trojan.Elzob
>    127 Unix.Trojan.Gafgyt
>      3 Unix.Trojan.Hanthie
>      3 Unix.Trojan.Mayday
>     24 Unix.Trojan.Mirai
>      2 Unix.Trojan.Small
>      7 Unix.Trojan.Tsunami
>      1 Unix.Trojan.Webshell
>      1 Unix.Trojan.Zonie
>      1 Unix.Virus.Zusy
>      1 Unix.Worm.Cheese
>      1 Unix.Worm.Darlloz
>
> My suggestion is, yes. Run ClamAV. But don't rely on just the official
> databases.
>
> --Maarten
>
> On Wed, Dec 20, 2017 at 4:09 AM, Al Varnell <alvarn...@mac.com<mailto:alva
> rn...@mac.com>> wrote:
>
> FYI, there are 31 ClamAV signatures that contain the word "Linux". There
> are currently almost 6.4 million ClamAV signatures in the database.
>
> All but two are in main.ndb or main.hdb, meaning they are relatively old.
>
> All but five start with Win.Trojan or Win.Exploit or Win.Tool so I'm not
> clear on their relationship to Linux.
>
> The two most recent ones are:
> - Unix.Trojan.Linux_DDoS_93-2
> - Unix.Trojan.Linux_DDoS_93-5364119-0
>
> -Al-
>
> On Wed, Dec 20, 2017 at 12:47 AM, Matus UHLAR - fantomas wrote:
> On 19.12.17 12:44, Dan Rawson wrote:
> I'm working on running clamav on my Linux workstation - NOT a server
> environment.  What is the recommended usage in that environment?  clamd +
> OnAccess?  clamscan scheduled from cron?? clamdscan scheduled from cron??
>
> I did search through the documentation but didn't see much addressing
> "best practices" in a single machine environment.
>
> I haven't seen a linux malware yet. Well, I've heard that it exists, but
> haven't seen it (except hacking suite...)
>
> what makes you think you need it?
>
> -Al-
> --
> Al Varnell
> Mountain View, CA
>
>
>
>
>
> _______________________________________________
> clamav-users mailing list
> clamav-users@lists.clamav.net<mailto:clamav-users@lists.clamav.net>
> http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users
>
>
> Help us build a comprehensive ClamAV guide:
> https://github.com/vrtadmin/clamav-faq
>
> http://www.clamav.net/contact.html#ml
>
> _______________________________________________
> clamav-users mailing list
> clamav-users@lists.clamav.net<mailto:clamav-users@lists.clamav.net>
> http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users
>
>
> Help us build a comprehensive ClamAV guide:
> https://github.com/vrtadmin/clamav-faq
>
> http://www.clamav.net/contact.html#ml
>
> _______________________________________________
> clamav-users mailing list
> clamav-users@lists.clamav.net
> http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users
>
>
> Help us build a comprehensive ClamAV guide:
> https://github.com/vrtadmin/clamav-faq
>
> http://www.clamav.net/contact.html#ml
>
_______________________________________________
clamav-users mailing list
clamav-users@lists.clamav.net
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to