Things to know:
#1: The amount of images with an infected payload is very small.
#2:
http://www.ghacks.net/2015/02/05/how-to-clear-web-storage-in-your-browser-of-choice/ If you suspect you may be infected, clear your web storage.
#3: To prevent the malicious payload from being downloaded, disable flash and javascript on imgur.
#4: This attack was targeted towards 8chan users. If you somehow become infected and you don't go to 8chan, then supposedly the virus will do nothing.
#5: A short description of the virus: "This flash file injected more javascript into the page (while on the surface looking like an innocuous pikachu animation). This javascript was stored to the user's localstorage (which, since the iframe was pointing at 8chan, allowed the attacker to attach js to 8chan's localstorage). It's functionality is to issue a GET request to 8chan.pw (not an 8chan server AFAIK) and then decrypted the response. So far no one has been able to see a response from that web service, meaning it likely wasn't activated yet or has already been deactivated. The outcome is that every time a user visited an 8chan page, it would "phone home" to check for instructions and then execute more javascript code."