631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

You can never be too careful about what you install on your computers. In this most recent example, Google Chrome users are finding themselves targeted by a new type of malware called Nigelthorn.

Nigelthorn’s Method of Attack
The scam works like this; you encounter a link to a fake YouTube video on social media. If the user clicks on this link, they will be asked to download the Nigelify extension from the Chrome Web Store before viewing the contents of the video. If the user installs this extension, this malware can run rampant on their system.

The Google Chrome Web Store has several measures put in place to keep threats from sneaking onto the store, but Nigelthorn’s code is found on an extension that has passed the Web Store’s tests. In this case, the affected extension, Nigelify, replaces all images on a page with images of Nigel Thornberry, a late 1990s/early 2000s cartoon character who has emerged as a meme in recent years. Essentially, this malware is taking advantage of people’s fondness for nostalgia.

Once Nigelthorn has been installed, it will affect the system in various ways. It can steal your data available through Facebook, but if this isn’t enough, it can also share itself out to any of your contacts via Facebook Messenger or tagging your friends to potentially infect them as well. This aggressive manner of spreading makes it quite effective at collecting a large amount of information, as well as keeping itself out there in the world, still relevant enough to be a concern.

Nigelthorn is also capable of using other malware tools in order to pull off its scam, including methods such as cryptomining and YouTube manipulation to raise money and attack more targets.

How to Prevent Infection in the First Place
Another big pain about the Nigelthorn malware is that it can be quite difficult to get rid of. If you’ve accidentally installed Nigelthorn in your web browser, it will close the extensions panel--an extreme way of keeping you from uninstalling it. The only way to get rid of this malware is to uninstall Chrome entirely, and you’ll also want to change any credentials that may have been stolen by the malware.

As is the case with most threats, the most effective countermeasure is to just not click on the link that downloads the malware in the first place. As long as a user knows not to click on suspicious links, Chrome can be reasonably safe.

For more information on the latest threats to your organization’s security, subscribe to Suffolk Computer Consultants’s blog and reach out to us at 631-905-9617.

What Are the Differences Between Business Intellig...
Businesses Thrive with Dedicated Proactive Mainten...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, August 17 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Privacy Cloud Cybersecurity Managed IT Services Malware Communications Tech Term Backup Network Security Microsoft Smartphones Hardware Ransomware Passwords Communication Software Business Management Hackers Outsourced IT Hosted Solutions Business VoIP Wi-Fi Email Small Business Google Alert Android Social Media Productivity Save Money Applications Internet Smartphone Computer Employer-Employee Relationship Microsoft Office Router Data Backup Data Recovery Twitter Business Intelligence Patch Management Office Settings Mobile Devices Vulnerability Government Network IT Services Automation BDR Collaboration Data Analytics Data Management IT Support VoIP Apps Bandwidth Blockchain Phishing Virtualization Browser Data Breach Innovation Efficiency User Tips Miscellaneous Saving Money Password Windows 10 Cloud Computing Excel Internet of Things Hacking Gmail Paperless Office Tech Terms IT Support Company Culture Cost Management Politics Compliance Remote Monitoring Virtual Assistant Productivity Law Enforcement Chrome Tip of the week Remote Computing Gadgets Virus Access Control Windows Holiday WiFi Cybercrime Word Business Continuity Managed IT Services Computers Scam Website Office 365 Artificial Intelligence How To Retail Battery Information Networking Cortana Spam Wireless Charging Wireless Physical Security Managed IT Service Workers App Data Protection Mobile Device Management VPN Dongle G Suite Antivirus Edge Threat GDPR Live Streaming Two-factor Authentication Hiring/Firing Processors Value Managed Service Knowledge BYOD Telecommute Movies Files Telephony Phone System Lead Generation Mobile Security Workplace Tips Telephone Systems File Sharing Education Smart Technology Connectivity Bring Your Own Device Remote Support Work/Life Balance Laptop Printing Dark Web User Tip WhatsApp Tech Support Spyware Managed IT Google Drive Comparison SaaS Data loss Unified Communications Voice over IP Botnet Operating System Plug-In Remote Control User Security Safety Office Tips Network Attached Storage Automobile Streaming Media Staffing Technology Tips Cables Hybrid Cloud Hosted Solution Marketing Paper RAM HP Database Specifications Staff eCommerce Gadget Hard Drives WannaCry Environment Proactive IT Spam Blocking Business Technology Information Technology Server Management Downloads Big Data Telecommuting Backup and Disaster Recovery Voice over Internet Protocol Copy Apple Ink Websites Microsoft Teams Users News Server Document Management Tactics Reporting Multi-Factor Security Conferencing Printer Server Licensing Online Shopping Facebook Shortcut HIPAA e-waste Remote Monitoring and Management Email Management Sales Entertainment Biometrics Google Maps Trends Millennials Recovery SSD Paste iPhone Disaster Recovery IT budget PowerPoint Printers Managing Stress Telephone System Maintenance Digital Internet Explorer Medical IT Content Filtering Cleaning Travel CrashOverride Hard Drive disposal Analysis Tablet Access Machine Learning A.I. Inventory Amazon Spotify IT Management Sports Computer Care DDoS Instagram Public Speaking Net Neutrality Money Presentation Personal Information Lithium-ion battery Employer Employee Relationship Gaming Console Fun Storage Augmented Reality Wireless Technology 5G Freedom of Information IBM Scalability Video Games Hacker Synergy Error The Internet of Things Yahoo Budget Worker Encryption Regulation IaaS Emergency Customer Relationship Management Credit Cards Competition Television Search Mobile Device IP Address Emoji Printer Vendor Management HaaS Customer Service Autocorrect Upgrade Mobile Office Unified Threat Management Avoiding Downtime Dark Data Scheduling Domains Current Events Leadership Samsung Windows 10 Managed Service Provider

Newsletter Sign Up