There is a logical gap in this story - I’m curious how the statement ‘an email that had a foul link’ led to ‘I had been warned too late that it is a password stealer’. Does this mean you actually downloaded something from the link in an email?
Surely just downloading something couldn’t enable it to do anything unless you deliberately tried to execute the file somehow?
Where did this ‘warning’ come from? If you were warned, doesn’t that mean you already have a way to check it?
So this is (for us) purely speculating to understand your situation; where did the analysis that it’s a password stealer come from? Also, why would you decide that it doesn’t work with Linux?
- Phishing emails are the main risk for ‘password stealing’ - possibly with headers and links to mimic a request from some service (Your Amazon Account, or a ‘Failed Shipping Delivery’ or Google/Microsoft/Facebook) asking you to enter information… or some fake login page prompting you to enter your email/password.
So the way to deal with this would be to copy the suspicious URL and paste it into a service like ‘VirusTotal’ or something.
Why didn’t you share more information? It seems unlikely that you can find software to manage this for you…
'Your account will be suspended, Click Here Now!
This would be a SOCIAL engineering problem, not a malware problem.
But then to suggest that you tried using ClamAV - which is designed to scan for malware running on the system, not to scan inside emails.
This kind of paranoia would be reinforced by any kind of web search, leading you to feel more threatened and more in need of a licence to pay for and run some kind of ‘Super Security Scanner’ ■■■■■■■■ before you fire your browser up every morning.
Linux Advice
- If an email DOWNLOADS an attacment, like an .appimage or .sh or .desktop, or a .py, or something - or contains a link to a dodgy site that hosts malware, or has a social enginerring lure (fake invoice, alert, or offer)… then what’s next?
- Did you download and run the file manually and deliberately? LINUX SYSTEMS DO NOT AUTOMATICALLY EXECUTE.
If you did this, then restore a snapshot to undo any changes.
If any such file requested elevated privileges (pkexec, sudo, or GUI prompt) then you’d have to be very deliberate to enable it… there is no defence against this.
To some extent, this is a good advertisement for Wayland, as simple xinput or evdev keystroke loggers would be harder to implement…
Malware won’t be able to read encrypted browser login data to steal passwords…
You are creating an XY problem for yourself - searching a solution when you have not given sufficient information about what happened.
This kind of ‘Fuzzy Paranoia’ is a huge problem, and it’s a reason that many companies make millions of bucks selling huge ‘umbrella’ style invasive security suites that alert you that they are ‘protecting your very existence’ every time you touch your mouse.