888.678.7282    Get SUPPORT

Strata Information Technology Blog

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

You can never be too careful about what you install on your computers. In this most recent example, Google Chrome users are finding themselves targeted by a new type of malware called Nigelthorn.

Nigelthorn’s Method of Attack
The scam works like this; you encounter a link to a fake YouTube video on social media. If the user clicks on this link, they will be asked to download the Nigelify extension from the Chrome Web Store before viewing the contents of the video. If the user installs this extension, this malware can run rampant on their system.

The Google Chrome Web Store has several measures put in place to keep threats from sneaking onto the store, but Nigelthorn’s code is found on an extension that has passed the Web Store’s tests. In this case, the affected extension, Nigelify, replaces all images on a page with images of Nigel Thornberry, a late 1990s/early 2000s cartoon character who has emerged as a meme in recent years. Essentially, this malware is taking advantage of people’s fondness for nostalgia.

Once Nigelthorn has been installed, it will affect the system in various ways. It can steal your data available through Facebook, but if this isn’t enough, it can also share itself out to any of your contacts via Facebook Messenger or tagging your friends to potentially infect them as well. This aggressive manner of spreading makes it quite effective at collecting a large amount of information, as well as keeping itself out there in the world, still relevant enough to be a concern.

Nigelthorn is also capable of using other malware tools in order to pull off its scam, including methods such as cryptomining and YouTube manipulation to raise money and attack more targets.

How to Prevent Infection in the First Place
Another big pain about the Nigelthorn malware is that it can be quite difficult to get rid of. If you’ve accidentally installed Nigelthorn in your web browser, it will close the extensions panel--an extreme way of keeping you from uninstalling it. The only way to get rid of this malware is to uninstall Chrome entirely, and you’ll also want to change any credentials that may have been stolen by the malware.

As is the case with most threats, the most effective countermeasure is to just not click on the link that downloads the malware in the first place. As long as a user knows not to click on suspicious links, Chrome can be reasonably safe.

For more information on the latest threats to your organization’s security, subscribe to Strata Information Technology’s blog and reach out to us at 888.678.7282.

Tip of the Week: Adding a Watermark to a Word Docu...
Businesses Thrive with Dedicated Proactive Mainten...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, December 11 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Best Practices Managed IT Services Privacy Cloud Internet Network Security Cybersecurity Malware Tech Term Hackers Communications Backup Outsourced IT VoIP Microsoft IT Support Software Ransomware User Tips Business Management Smartphones Passwords Productivity Alert Google Social Media Business Data Backup Windows 10 Efficiency Email Communication Data Recovery Productivity Browser IT Services Hardware Save Money Hosted Solutions Data Small Business Cloud Computing Phishing Users Network App Bandwidth Twitter Internet of Things Business Continuity Apps Mobile Device Smartphone Microsoft Office Vulnerability Data Breach Miscellaneous Android Saving Money Company Culture Cybercrime Politics Access Control Compliance Government Mobile Device Management BDR Wi-Fi Computer Workplace Tips Blockchain Applications Law Enforcement Patch Management Workers Innovation Collaboration Networking Office 365 Settings Employer-Employee Relationship Remote Monitoring Scam Excel Vendor Management Automation Managed IT Service SaaS Spam Dark Web Wireless Chrome Connectivity Virus Windows Word Virtual Assistant How To Facebook Entertainment Recovery Computers Marketing Antivirus Maintenance Password Retail Holiday Office Website Managing Stress Personal Information BYOD Education Information Remote Monitoring and Management Gaming Console Edge Threat Authorization Yahoo Dongle Remote Control Analytics Spyware Value Storage Movies Processors Wireless Internet Amazon Comparison Hard Drives Scalability Phone System Tech Terms Lead Generation Technology Efficiently Video Games Google Maps Emergency Telephony DDoS Bring Your Own Device Mobile Devices IaaS HP Two-factor Authentication Error Worker Data loss Apple Help Desk Multi-Factor Security Specifications Regulation Avoiding Downtime Credit Cards Streaming Media News Outlook Dark Data Television Information Technology Email Management Staffing Licensing Voice over IP Troubleshooting Smart Technology Technology Tips Hybrid Cloud HaaS Printer Server Document Management Database Tech Support Touchscreen Cortana Printer Staff RAM iPhone Biometrics Reporting Gadget Downloads Safety Telephone System WannaCry Managed Service Unified Threat Management Sales Plug-In Managed Service Provider Cost Management Travel VoIPMyths Business Intelligence Backup and Disaster Recovery The Internet of Things Cables Managed IT Cleaning Printers Paperless Office Gadgets Tactics Budget Physical Security Microsoft Office 365 Websites Microsoft Teams WiFi Leadership Access e-waste Router Content Filtering Medical IT Hiring/Firing Employer Employee Relationship Current Events Shortcut Artificial Intelligence Trends HIPAA Profitability Botnet VPN Tablet Proactive IT IT budget PowerPoint Live Streaming VoIPSavings SSD Voice over Internet Protocol Encryption Computer Care Digital Internet Explorer Files Authentication Battery Data Management Telephone Systems Data Protection disposal Gmail GDPR Automobile Net Neutrality CrashOverride A.I. Remote Support Hard Drive Eliminating Downtime Upgrade Knowledge IT Management Sports WhatsApp Wireless Charging Update Synergy Disaster Recovery Inventory IT Support Hosted Solution Domains G Suite File Sharing User Tip Virtualization Telecommute Autocorrect Mobile Security User Security Search Scheduling Laptop Printing Quick Tips Copy Public Speaking Spam Blocking Tip of the week Server Windows 10 Presentation Unified Communications Operating System VoIP Network Attached Storage Lithium-ion battery Emoji Business Technology Instagram Paper Paste Augmented Reality Remote Computing Samsung Wireless Technology 5G Certification Money Environment IBM Conferencing Server Management Managed IT Services Ink Hacker eCommerce Telecommuting Customer Relationship Management Competition IP Address Online Shopping Big Data Fun Millennials Customer Service Machine Learning Google Drive Mobile Office

Newsletter Sign Up