[02:23] <tomreyn> quick summary for those who missed it on #xubuntu. xubuntu.org currently delivers javascript malware to users: https://quttera.com/detailed_report/xubuntu.org https://sitecheck.sucuri.net/results/xubuntu.org
[02:23] <tomreyn> tcuthbert in #canonical-sysadmin is working on mitigating it and cleaning it up, will get back to you when it's done.
[02:26] <JackFrost> ...Huh, that's actually an accurate report, not someone or some site being over the top. :3
[02:30] <JackFrost> Thanks, tomreyn.  Looks like that thinks the community hosted stuff is fine at least.
[03:40] <JackFrost> krytarik, knome: Can either one of you login to xubuntu.org and poke around, make sure everything is normal?
[12:42] <tomreyn> JackFrost: not fully fixed, yet - i just re-ran a scan using quttera: https://quttera.com/detailed_report/xubuntu.org
[12:42] <tomreyn> it links to an online pharmacy still
[12:43] <tomreyn> though the bad JS files seem to be gone
[12:47] <tomreyn> curl -s https://xubuntu.org/screenshots/ | grep -i levitra
[12:56] <JackFrost> Hah, so much for the note that it was fixed. :P
[13:00] <tomreyn> quettera had not scanned /screenshots/ during the first run - so this may already have been present then, and tcuthbert just didn't know about it.
[13:02] <JackFrost> He may not have.
[15:00] <Baytuch> Good evening, guys