888.678.7282    Get SUPPORT

Strata Information Technology Blog

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

You can never be too careful about what you install on your computers. In this most recent example, Google Chrome users are finding themselves targeted by a new type of malware called Nigelthorn.

Nigelthorn’s Method of Attack
The scam works like this; you encounter a link to a fake YouTube video on social media. If the user clicks on this link, they will be asked to download the Nigelify extension from the Chrome Web Store before viewing the contents of the video. If the user installs this extension, this malware can run rampant on their system.

The Google Chrome Web Store has several measures put in place to keep threats from sneaking onto the store, but Nigelthorn’s code is found on an extension that has passed the Web Store’s tests. In this case, the affected extension, Nigelify, replaces all images on a page with images of Nigel Thornberry, a late 1990s/early 2000s cartoon character who has emerged as a meme in recent years. Essentially, this malware is taking advantage of people’s fondness for nostalgia.

Once Nigelthorn has been installed, it will affect the system in various ways. It can steal your data available through Facebook, but if this isn’t enough, it can also share itself out to any of your contacts via Facebook Messenger or tagging your friends to potentially infect them as well. This aggressive manner of spreading makes it quite effective at collecting a large amount of information, as well as keeping itself out there in the world, still relevant enough to be a concern.

Nigelthorn is also capable of using other malware tools in order to pull off its scam, including methods such as cryptomining and YouTube manipulation to raise money and attack more targets.

How to Prevent Infection in the First Place
Another big pain about the Nigelthorn malware is that it can be quite difficult to get rid of. If you’ve accidentally installed Nigelthorn in your web browser, it will close the extensions panel--an extreme way of keeping you from uninstalling it. The only way to get rid of this malware is to uninstall Chrome entirely, and you’ll also want to change any credentials that may have been stolen by the malware.

As is the case with most threats, the most effective countermeasure is to just not click on the link that downloads the malware in the first place. As long as a user knows not to click on suspicious links, Chrome can be reasonably safe.

For more information on the latest threats to your organization’s security, subscribe to Strata Information Technology’s blog and reach out to us at 888.678.7282.

Tip of the Week: Adding a Watermark to a Word Docu...
Businesses Thrive with Dedicated Proactive Mainten...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, February 15 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Best Practices Managed IT Services Privacy Cloud Network Security Malware Internet Hackers Communications User Tips Cybersecurity Software Productivity Ransomware Backup Tech Term Microsoft IT Support Passwords Business Management Smartphones Outsourced IT Efficiency VoIP Productivity Email Data Alert Business Hardware Communication Small Business Browser IT Services Innovation Network Google Social Media Data Backup Windows 10 Data Recovery Mobile Device Smartphone Microsoft Office Phishing Holiday Collaboration Users Save Money Cloud Computing Hosted Solutions Business Continuity Vulnerability Apps Data Breach Access Control Android Miscellaneous App Saving Money Bandwidth Twitter Internet of Things Computer Patch Management Applications Facebook Settings Law Enforcement Networking Workers Office 365 Personal Information Employer-Employee Relationship Remote Monitoring Scam Excel Company Culture Cybercrime Compliance Politics Wireless BDR Government Mobile Device Management Mobile Devices Workplace Tips Wi-Fi Blockchain Entertainment Data Security Computers Recovery Antivirus Password Medical IT Marketing Maintenance Managed IT Service Dark Web Managing Stress Chrome Retail Office Virus Education Website BYOD Information Remote Monitoring and Management Word Vendor Management Virtual Assistant Automation Connectivity SaaS How To Spam Windows Router Content Filtering Smart Technology Staff RAM Certification HIPAA Staffing Document Management Database Touchscreen Downloads Managed Service Live Streaming HaaS Printer Server Cortana Reporting Tablet Printer Unified Threat Management VoIPMyths Files Biometrics Backup and Disaster Recovery Cables Plug-In Tech Support Telephone Systems Data Protection Gadget Safety Gmail Business Intelligence Websites Microsoft Teams Managed Service Provider Cost Management Mobility Remote Support Hard Drive Paperless Office Tactics Microsoft Office 365 Artificial Intelligence Trends Managed IT Profitability The Internet of Things WhatsApp Wireless Charging Cleaning Printers e-waste Knowledge Botnet VPN VoIPSavings Leadership Access SSD Voice over Internet Protocol Hiring/Firing Employer Employee Relationship Proactive IT E-Commerce Gadgets Budget Remote Control Current Events Shortcut IT budget PowerPoint Authentication Training Processors Digital Internet Explorer A.I. Encryption Eliminating Downtime Lead Generation Computer Care disposal Battery Data Management GDPR Comparison Sports Update Emergency Telephony Inventory Automobile Payment Net Neutrality CrashOverride IT Management Synergy Authorization Disaster Recovery Dongle Security Cameras Apple Edge Threat Movies Wireless Internet Upgrade News Gaming Console Spyware Value Yahoo Storage Multi-Factor Security Specifications Tech Terms Technology Efficiently Licensing Voice over IP Analytics Amazon instant Messaging Email Management Bring Your Own Device Hard Drives iPhone Scalability Phone System Data loss Help Desk Telephone System WannaCry Video Games Google Maps HP DDoS Error Streaming Media Outlook Travel IaaS Regulation Vulnerabilities Sales Worker Dark Data Troubleshooting Physical Security Television Information Technology Technology Tips Hybrid Cloud Avoiding Downtime Healthcare Two-factor Authentication WiFi Credit Cards Lithium-ion battery Paste Instagram Server Management Money Augmented Reality Online Shopping Environment Samsung Cryptocurrency Wireless Technology 5G Millennials Ink IBM Managed IT Services Hacker Google Drive IT Support File Sharing Competition User Tip Customer Relationship Management Machine Learning Fun Big Data IP Address Spam Blocking User Security Tip of the week G Suite Customer Service Hosted Solution Telecommute Mobile Office Autocorrect Domains Mobile Security Virtualization Business Technology Quick Tips Remote Computing Wearables Laptop Printing Conferencing Copy Unified Communications Search Scheduling Network Attached Storage Public Speaking eCommerce Operating System Server Windows 10 Emoji Presentation Telecommuting VoIP Paper

Newsletter Sign Up