0 Members and 3 Guests are viewing this topic.
Hi,You may already know this.?If you visit the clamtk webpage: https://code.google.com/p/clamtk/Scroll down to downloadsThere is a Thunar add-on for Ubuntu "thunar-sendto-clamtk"[/size]It gives you a Right Click > Sendto > ClamTK option
#! /bin/sh# A collection of postinst actions for Linux Lite# postinst script for wallpaper removal# Date: 04/09/15# Time: 23:51 (EST)# As reported here - https://www.linuxliteos.com/forums/other/virus-detected-on-lite-2-6-wallpapers/set -ecd /usr/share/backgrounds/xfce/sudo rm -rf Entrance.jpg
If you click on the link I provided for more info, and then click on the "File detail" tab it states: The file being studied is an image file! More specifically, it is a JPEG. The image has been injected with malicious web content. In the box right below that statement is what appears to be the code that was injected into the file.
[email protected]:~$ sudo -s[sudo] password for harry: [email protected]:~# cd /usr/share/backgrounds/xfce[email protected]:/usr/share/backgrounds/xfce# lsCar.jpg Linux-Lite-Bridge.png Lite-Coral.png Stadium.jpgCubes.jpg Linux-Lite-Coast.png Lite-Gold.png Thames.jpgEntrance.jpg Linux-Lite.jpg Lite-Grey.png Winter.jpgGaming.jpeg Linux-Lite-Mountains-Gold.png Lite-Lite-2.2.jpg xfce-blue.jpgKids.jpg Linux-Lite-Sand-Feather.jpg Lite-Parchment.pngLandscape.jpg Linux-Lite-Simple-Gray.png River-Dock.jpgLiberty.jpg Linux-Lite-Waves.png Sea-House.jpg[email protected]:/usr/share/backgrounds/xfce# rm -f Entrance.jpg[email protected]:/usr/share/backgrounds/xfce# lsCar.jpg Linux-Lite.jpg Lite-Lite-2.2.jpgCubes.jpg Linux-Lite-Mountains-Gold.png Lite-Parchment.pngGaming.jpeg Linux-Lite-Sand-Feather.jpg River-Dock.jpgKids.jpg Linux-Lite-Simple-Gray.png Sea-House.jpgLandscape.jpg Linux-Lite-Waves.png Stadium.jpgLiberty.jpg Lite-Coral.png Thames.jpgLinux-Lite-Bridge.png Lite-Gold.png Winter.jpgLinux-Lite-Coast.png Lite-Grey.png xfce-blue.jpg[email protected]:/usr/share/backgrounds/xfce# exitexit[email protected]:~$