888.678.7282    Get SUPPORT

Strata Information Technology Blog

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

You can never be too careful about what you install on your computers. In this most recent example, Google Chrome users are finding themselves targeted by a new type of malware called Nigelthorn.

Nigelthorn’s Method of Attack
The scam works like this; you encounter a link to a fake YouTube video on social media. If the user clicks on this link, they will be asked to download the Nigelify extension from the Chrome Web Store before viewing the contents of the video. If the user installs this extension, this malware can run rampant on their system.

The Google Chrome Web Store has several measures put in place to keep threats from sneaking onto the store, but Nigelthorn’s code is found on an extension that has passed the Web Store’s tests. In this case, the affected extension, Nigelify, replaces all images on a page with images of Nigel Thornberry, a late 1990s/early 2000s cartoon character who has emerged as a meme in recent years. Essentially, this malware is taking advantage of people’s fondness for nostalgia.

Once Nigelthorn has been installed, it will affect the system in various ways. It can steal your data available through Facebook, but if this isn’t enough, it can also share itself out to any of your contacts via Facebook Messenger or tagging your friends to potentially infect them as well. This aggressive manner of spreading makes it quite effective at collecting a large amount of information, as well as keeping itself out there in the world, still relevant enough to be a concern.

Nigelthorn is also capable of using other malware tools in order to pull off its scam, including methods such as cryptomining and YouTube manipulation to raise money and attack more targets.

How to Prevent Infection in the First Place
Another big pain about the Nigelthorn malware is that it can be quite difficult to get rid of. If you’ve accidentally installed Nigelthorn in your web browser, it will close the extensions panel--an extreme way of keeping you from uninstalling it. The only way to get rid of this malware is to uninstall Chrome entirely, and you’ll also want to change any credentials that may have been stolen by the malware.

As is the case with most threats, the most effective countermeasure is to just not click on the link that downloads the malware in the first place. As long as a user knows not to click on suspicious links, Chrome can be reasonably safe.

For more information on the latest threats to your organization’s security, subscribe to Strata Information Technology’s blog and reach out to us at 888.678.7282.

Tip of the Week: Adding a Watermark to a Word Docu...
Businesses Thrive with Dedicated Proactive Mainten...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, August 21 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Managed IT Services Privacy Best Practices Cloud Malware Communications Cybersecurity Ransomware Hackers Backup Productivity Internet VoIP Tech Term Alert Software Outsourced IT Network Security Smartphones IT Support Passwords Business Management Social Media Hardware Microsoft Data Phishing Save Money Business Windows 10 Data Recovery Smartphone Email Communication IT Services Small Business Data Breach Vulnerability Android Microsoft Office Network App Google Data Backup Twitter Hosted Solutions Business Continuity Compliance BDR Mobile Device Management Law Enforcement Cloud Computing Blockchain Computer Patch Management Workers Apps Settings Employer-Employee Relationship Productivity Remote Monitoring Scam Excel Browser Company Culture Cybercrime Politics Bandwidth Government Office 365 User Tips Miscellaneous Internet of Things Saving Money Spam How To Applications Facebook Entertainment Wi-Fi Recovery Antivirus Mobile Device Maintenance Password Retail Holiday Computers Office Collaboration Education Personal Information Automation Managed IT Service Vendor Management Dark Web Networking Managing Stress Chrome SaaS Access Control Website Virus Users Innovation Efficiency Windows Word Virtual Assistant Wireless Tech Terms Connectivity Staffing Licensing Voice over IP Amazon Smart Technology Email Management HaaS Printer Server Cortana Bring Your Own Device Printer iPhone Mobile Devices Data loss Gadget Telephone System WannaCry Unified Threat Management HP Biometrics Managed Service Provider Cost Management Streaming Media Travel Two-factor Authentication Workplace Tips Business Intelligence Regulation Sales Cleaning Printers Physical Security Technology Tips Hybrid Cloud WiFi Managed IT Router Content Filtering Hiring/Firing Employer Employee Relationship Staff RAM Current Events Shortcut HIPAA Botnet VPN Document Management Database Leadership Access Tablet Downloads Live Streaming Tech Support Reporting Computer Care Files Battery Data Management Backup and Disaster Recovery Cables Plug-In Telephone Systems Data Protection Encryption Safety Gmail Automobile The Internet of Things Websites Microsoft Teams Net Neutrality CrashOverride Remote Support Hard Drive Marketing Paperless Office Tactics BYOD Knowledge Artificial Intelligence Trends WhatsApp Wireless Charging Synergy Gadgets Budget e-waste Disaster Recovery Medical IT IT budget PowerPoint Gaming Console Yahoo SSD Voice over Internet Protocol Proactive IT Remote Control Analytics Processors Digital Internet Explorer Comparison Hard Drives A.I. Scalability Phone System Lead Generation disposal GDPR IT Management Sports Video Games Google Maps Emergency Telephony DDoS Inventory Information Remote Monitoring and Management IaaS Dongle Worker Apple Edge Threat Storage Multi-Factor Security Specifications Avoiding Downtime Movies Credit Cards News Dark Data Spyware Value Television Information Technology Instagram Mobile Security Paste Business Technology Printing Remote Computing Samsung Money Laptop Error Conferencing Public Speaking Unified Communications Presentation Network Attached Storage Managed IT Services eCommerce Operating System Paper Telecommuting Lithium-ion battery Augmented Reality Wireless Technology 5G Server Management Online Shopping Environment Ink Millennials IBM Fun Hacker Google Drive IT Support Customer Relationship Management Hosted Solution File Sharing Competition User Tip Virtualization Big Data Autocorrect IP Address Machine Learning Customer Service Copy Spam Blocking User Security Search Scheduling Tip of the week Server Upgrade G Suite Windows 10 Mobile Office Domains Telecommute VoIP Emoji

Newsletter Sign Up