Can you expand a little
I feel like this article is lacking information: like how to identify infections and remove. Links are fine but a little more info is always welcome considering how many of us run Linux systems. Also, some information as to how infection is achieved would be useful.
Obviously I'll do some research of my own too.