888.678.7282    Get SUPPORT

Strata Information Technology Blog

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

You can never be too careful about what you install on your computers. In this most recent example, Google Chrome users are finding themselves targeted by a new type of malware called Nigelthorn.

Nigelthorn’s Method of Attack
The scam works like this; you encounter a link to a fake YouTube video on social media. If the user clicks on this link, they will be asked to download the Nigelify extension from the Chrome Web Store before viewing the contents of the video. If the user installs this extension, this malware can run rampant on their system.

The Google Chrome Web Store has several measures put in place to keep threats from sneaking onto the store, but Nigelthorn’s code is found on an extension that has passed the Web Store’s tests. In this case, the affected extension, Nigelify, replaces all images on a page with images of Nigel Thornberry, a late 1990s/early 2000s cartoon character who has emerged as a meme in recent years. Essentially, this malware is taking advantage of people’s fondness for nostalgia.

Once Nigelthorn has been installed, it will affect the system in various ways. It can steal your data available through Facebook, but if this isn’t enough, it can also share itself out to any of your contacts via Facebook Messenger or tagging your friends to potentially infect them as well. This aggressive manner of spreading makes it quite effective at collecting a large amount of information, as well as keeping itself out there in the world, still relevant enough to be a concern.

Nigelthorn is also capable of using other malware tools in order to pull off its scam, including methods such as cryptomining and YouTube manipulation to raise money and attack more targets.

How to Prevent Infection in the First Place
Another big pain about the Nigelthorn malware is that it can be quite difficult to get rid of. If you’ve accidentally installed Nigelthorn in your web browser, it will close the extensions panel--an extreme way of keeping you from uninstalling it. The only way to get rid of this malware is to uninstall Chrome entirely, and you’ll also want to change any credentials that may have been stolen by the malware.

As is the case with most threats, the most effective countermeasure is to just not click on the link that downloads the malware in the first place. As long as a user knows not to click on suspicious links, Chrome can be reasonably safe.

For more information on the latest threats to your organization’s security, subscribe to Strata Information Technology’s blog and reach out to us at 888.678.7282.

Tip of the Week: Adding a Watermark to a Word Docu...
Businesses Thrive with Dedicated Proactive Mainten...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, October 23 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Managed IT Services Privacy Best Practices Cloud Network Security Malware Cybersecurity Internet Hackers Communications Ransomware Tech Term Backup VoIP Microsoft Productivity Passwords Alert Software Smartphones Outsourced IT Communication IT Support Browser Business Management Social Media Business Save Money Email Hosted Solutions Data Small Business Productivity Phishing User Tips Google Hardware Windows 10 Efficiency Vulnerability Data Breach Microsoft Office Smartphone IT Services Network Users Data Backup Android Miscellaneous Saving Money Internet of Things App Bandwidth Twitter Data Recovery Cloud Computing Patch Management Computer Settings Apps Compliance Law Enforcement BDR Workers Collaboration Mobile Device Workplace Tips Blockchain Access Control Excel Innovation Company Culture Office 365 Politics Employer-Employee Relationship Remote Monitoring Scam Cybercrime Mobile Device Management Government Business Continuity Applications Wi-Fi Facebook Entertainment Recovery Maintenance Password Antivirus Marketing Retail Office Managed IT Service Dark Web Personal Information Chrome Holiday Virus Website Automation Education Word SaaS Computers Virtual Assistant Vendor Management Spam How To Windows Networking Managing Stress Two-factor Authentication Printer A.I. Physical Security HaaS Printer Server GDPR disposal WiFi Gadget Update Dark Data IT Management Sports Router Content Filtering Biometrics Remote Monitoring and Management Avoiding Downtime Inventory Information HIPAA Edge Threat Tablet Business Intelligence Dongle Live Streaming Authorization Telephone Systems Data Protection Tech Support Movies Files Cleaning Printers Storage Cortana Spyware Value Current Events Shortcut Technology Efficiently Unified Threat Management Tech Terms Connectivity Gmail Safety Leadership Access Amazon Remote Support Hard Drive Knowledge Managed Service Provider Cost Management Bring Your Own Device WhatsApp Wireless Charging The Internet of Things Remote Control Gadgets Budget Managed IT Data loss Computer Care Error HP Net Neutrality CrashOverride Outlook Botnet VPN Streaming Media BYOD Regulation Hiring/Firing Employer Employee Relationship Processors Troubleshooting Comparison Disaster Recovery Technology Tips Hybrid Cloud Lead Generation Encryption Staff RAM Emergency Telephony Gaming Console Touchscreen Battery Data Management Document Management Database Downloads Analytics Reporting Automobile Apple VoIPMyths Synergy Multi-Factor Security Specifications Plug-In Backup and Disaster Recovery Cables News Scalability Phone System Email Management Websites Microsoft Teams Licensing Voice over IP Video Games Google Maps Microsoft Office 365 Yahoo Paperless Office Tactics Worker Artificial Intelligence Trends Wireless IaaS Medical IT e-waste iPhone VoIPSavings IT budget PowerPoint Television Information Technology Proactive IT Hard Drives SSD Voice over Internet Protocol Telephone System WannaCry Credit Cards Digital Internet Explorer Sales Smart Technology Travel Mobile Devices Staffing Authentication DDoS Machine Learning Telecommuting Presentation Server Emoji Lithium-ion battery Instagram G Suite Online Shopping Augmented Reality Managed IT Services Money Telecommute Millennials Wireless Technology 5G Samsung Mobile Security IBM Laptop Printing Google Drive Hacker Quick Tips File Sharing Unified Communications IT Support Customer Relationship Management Network Attached Storage User Tip Competition Operating System Paper IP Address Big Data Spam Blocking User Security Hosted Solution Fun Customer Service Managed Service Server Management Tip of the week Environment Ink Mobile Office Upgrade Business Technology Copy Domains Windows 10 Autocorrect Remote Computing Virtualization VoIP Conferencing Paste Search Scheduling eCommerce Public Speaking

Newsletter Sign Up