631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

You can never be too careful about what you install on your computers. In this most recent example, Google Chrome users are finding themselves targeted by a new type of malware called Nigelthorn.

Nigelthorn’s Method of Attack
The scam works like this; you encounter a link to a fake YouTube video on social media. If the user clicks on this link, they will be asked to download the Nigelify extension from the Chrome Web Store before viewing the contents of the video. If the user installs this extension, this malware can run rampant on their system.

The Google Chrome Web Store has several measures put in place to keep threats from sneaking onto the store, but Nigelthorn’s code is found on an extension that has passed the Web Store’s tests. In this case, the affected extension, Nigelify, replaces all images on a page with images of Nigel Thornberry, a late 1990s/early 2000s cartoon character who has emerged as a meme in recent years. Essentially, this malware is taking advantage of people’s fondness for nostalgia.

Once Nigelthorn has been installed, it will affect the system in various ways. It can steal your data available through Facebook, but if this isn’t enough, it can also share itself out to any of your contacts via Facebook Messenger or tagging your friends to potentially infect them as well. This aggressive manner of spreading makes it quite effective at collecting a large amount of information, as well as keeping itself out there in the world, still relevant enough to be a concern.

Nigelthorn is also capable of using other malware tools in order to pull off its scam, including methods such as cryptomining and YouTube manipulation to raise money and attack more targets.

How to Prevent Infection in the First Place
Another big pain about the Nigelthorn malware is that it can be quite difficult to get rid of. If you’ve accidentally installed Nigelthorn in your web browser, it will close the extensions panel--an extreme way of keeping you from uninstalling it. The only way to get rid of this malware is to uninstall Chrome entirely, and you’ll also want to change any credentials that may have been stolen by the malware.

As is the case with most threats, the most effective countermeasure is to just not click on the link that downloads the malware in the first place. As long as a user knows not to click on suspicious links, Chrome can be reasonably safe.

For more information on the latest threats to your organization’s security, subscribe to Suffolk Computer Consultants’s blog and reach out to us at 631-905-9617.

What Are the Differences Between Business Intellig...
Businesses Thrive with Dedicated Proactive Mainten...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, December 19 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Best Practices Cloud Privacy Cybersecurity Network Security Malware User Tips Tech Term Managed IT Services Communications Backup Productivity Microsoft Communication Smartphones Internet Passwords Software Hackers Browser Business Management Google Efficiency Outsourced IT Business Hosted Solutions Hardware Email Small Business Android Data Backup VoIP Ransomware Wi-Fi Data Recovery Cloud Computing Smartphone IT Services Applications Microsoft Office Alert IT Support Mobile Device Social Media Save Money Windows 10 Network Data Business Intelligence Apps Bandwidth Employer-Employee Relationship Collaboration Managed IT Services Users Innovation Miscellaneous Saving Money Router Mobile Devices Internet of Things Twitter Computer Blockchain Automation Government Analytics Settings Information Patch Management Marketing Vulnerability VoIP Data Management Gadgets Phishing Virtualization Business Continuity Networking Holiday Data Breach Workplace Tips Access Control Wireless Password Excel BDR Office Hacking Wireless Charging Physical Security Managed IT Service Remote Monitoring and Management Company Culture Data Protection Gmail Paperless Office Politics Computers Cost Management Productivity IT Support Remote Monitoring Windows Dark Web Artificial Intelligence Law Enforcement Website Office 365 Managed Service Tip of the week Remote Computing WiFi Cybercrime Chrome Scam Virus Retail Compliance Word Spam Battery Mobile Device Management Tech Terms Connectivity Cortana Workers VPN How To Virtual Assistant App BYOD Tablet Paper Help Desk Phone System Travel Technology Tips Hybrid Cloud Reporting Education Smart Technology HP Hiring/Firing Database Update Staff RAM Tech Support WannaCry Environment Microsoft Office 365 SaaS Safety Server Management Downloads Knowledge Work/Life Balance Ink Certification Live Streaming Backup and Disaster Recovery Medical IT Document Management Tactics Managed IT Outlook Staffing Files Telephony Websites Microsoft Teams Analysis Telephone Systems File Sharing HIPAA e-waste Botnet Authentication User Tip Office Tips Trends Automobile Amazon Remote Support Information Technology Google Drive Comparison IT budget PowerPoint Mobility Gadget Big Data WhatsApp SSD GDPR Digital Internet Explorer Profitability Voice over IP Managing Stress Remote Control User Security Hard Drive Hard Drives disposal Authorization Printer Server Machine Learning A.I. Hosted Solution Storage Entertainment Biometrics Specifications IT Management Sports Facebook Shortcut Upgrade Inventory Edge Server Threat Eliminating Downtime Recovery eCommerce Dongle G Suite Disaster Recovery Spam Blocking Business Technology Processors Value Cleaning Printers Telecommuting Telecommute Google Maps Movies Plug-In Maintenance Copy Apple Mobile Security Error Access Multi-Factor Security Conferencing Cables CrashOverride News Lead Generation Sales Laptop Printing Wireless Internet Licensing Online Shopping Bring Your Own Device Email Management Spyware Troubleshooting Millennials Data loss Unified Communications Proactive IT Antivirus Two-factor Authentication Paste iPhone Operating System Touchscreen Content Filtering Network Attached Storage Spotify Streaming Media Voice over Internet Protocol Telephone System Instagram Augmented Reality DDoS Money Gaming Console Wireless Technology 5G Employer Employee Relationship IBM Hacker Scalability The Internet of Things Fun Video Games Freedom of Information Synergy Budget IaaS Competition Worker Customer Relationship Management Television IP Address Credit Cards Encryption Yahoo Emoji HaaS Printer Customer Service Mobile Office Search Vendor Management Domains Emergency Unified Threat Management Autocorrect Quick Tips Leadership Avoiding Downtime Current Events Windows 10 Scheduling Public Speaking Dark Data Regulation Computer Care Presentation Samsung Managed Service Provider Personal Information Lithium-ion battery Net Neutrality

Newsletter Sign Up