631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

You can never be too careful about what you install on your computers. In this most recent example, Google Chrome users are finding themselves targeted by a new type of malware called Nigelthorn.

Nigelthorn’s Method of Attack
The scam works like this; you encounter a link to a fake YouTube video on social media. If the user clicks on this link, they will be asked to download the Nigelify extension from the Chrome Web Store before viewing the contents of the video. If the user installs this extension, this malware can run rampant on their system.

The Google Chrome Web Store has several measures put in place to keep threats from sneaking onto the store, but Nigelthorn’s code is found on an extension that has passed the Web Store’s tests. In this case, the affected extension, Nigelify, replaces all images on a page with images of Nigel Thornberry, a late 1990s/early 2000s cartoon character who has emerged as a meme in recent years. Essentially, this malware is taking advantage of people’s fondness for nostalgia.

Once Nigelthorn has been installed, it will affect the system in various ways. It can steal your data available through Facebook, but if this isn’t enough, it can also share itself out to any of your contacts via Facebook Messenger or tagging your friends to potentially infect them as well. This aggressive manner of spreading makes it quite effective at collecting a large amount of information, as well as keeping itself out there in the world, still relevant enough to be a concern.

Nigelthorn is also capable of using other malware tools in order to pull off its scam, including methods such as cryptomining and YouTube manipulation to raise money and attack more targets.

How to Prevent Infection in the First Place
Another big pain about the Nigelthorn malware is that it can be quite difficult to get rid of. If you’ve accidentally installed Nigelthorn in your web browser, it will close the extensions panel--an extreme way of keeping you from uninstalling it. The only way to get rid of this malware is to uninstall Chrome entirely, and you’ll also want to change any credentials that may have been stolen by the malware.

As is the case with most threats, the most effective countermeasure is to just not click on the link that downloads the malware in the first place. As long as a user knows not to click on suspicious links, Chrome can be reasonably safe.

For more information on the latest threats to your organization’s security, subscribe to Suffolk Computer Consultants’s blog and reach out to us at 631-905-9617.

What Are the Differences Between Business Intellig...
Businesses Thrive with Dedicated Proactive Mainten...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, March 26 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy Cloud Network Security Productivity User Tips Microsoft Cybersecurity Malware Managed IT Services Smartphones Tech Term Communications Google Communication Business Hardware Email Passwords Hackers Efficiency Backup Internet Business Management Data Software Outsourced IT Ransomware Small Business Android Hosted Solutions Browser Windows 10 Innovation Collaboration IT Services VoIP Mobile Devices IT Support Wi-Fi Mobile Device Data Backup Data Recovery Users Applications Internet of Things Social Media Smartphone Network Alert Holiday Managed IT Services Microsoft Office Cloud Computing Save Money Saving Money Wireless Employer-Employee Relationship Computer Bandwidth Access Control Apps Router Workplace Tips Password Business Intelligence Miscellaneous Twitter Patch Management Settings Vulnerability Excel Office Government Paperless Office BDR Automation Data Management Chrome Blockchain Analytics Information Phishing VoIP Virtualization Word Marketing Data Breach Gadgets Business Continuity Networking Office 365 App Gmail G Suite VPN Hacking Workers Spam Tech Terms Connectivity BYOD Dark Web Mobile Device Management IT Support Cost Management Company Culture Remote Monitoring and Management Virtual Assistant Remote Monitoring Tip of the week Remote Computing Politics Law Enforcement Medical IT Virus Computers Windows Data Security WiFi Cybercrime Productivity Mobility Scam Artificial Intelligence Managed Service How To Battery Facebook Cortana Retail Compliance Website Wireless Charging Data Protection Physical Security Managed IT Service Error Upgrade Edge Threat Access Cables Security Cameras Spotify Dongle CrashOverride Processors Value Wireless Internet Knowledge Telecommute Movies Live Streaming Chrome OS Antivirus Telephone Systems Troubleshooting File Sharing Hiring/Firing Proactive IT Files instant Messaging Telephony Lead Generation Mobile Security Touchscreen Remote Support Laptop Printing Personal Information Voice over Internet Protocol Wearables User Tip Bring Your Own Device Spyware Education Smart Technology Google Drive Help Desk Comparison Work/Life Balance Data loss Unified Communications Phone System Reporting WhatsApp Remote Control Update User Security Two-factor Authentication Managed IT Network Attached Storage Streaming Media Vulnerabilities Voice over IP Operating System Hosted Solution Microsoft Office 365 Botnet Paper SaaS Healthcare Office Tips Automobile Technology Tips Hybrid Cloud HP Database Certification Specifications Staff RAM Spam Blocking Outlook Business Technology Tech Support Server Management Downloads Staffing Analysis Cryptocurrency eCommerce WannaCry Environment Copy Authentication Apple Hard Drives Ink Amazon Telecommuting Safety Backup and Disaster Recovery Document Management Tactics Information Technology Multi-Factor Security Conferencing Websites Microsoft Teams Gadget GDPR News e-waste Email Management Profitability Sales Server Trends Licensing Online Shopping HIPAA Paste Authorization iPhone IT budget PowerPoint Printer Server E-Commerce Millennials Google Maps SSD Big Data Digital Internet Explorer Entertainment Biometrics Training Content Filtering Managing Stress Shortcut Storage Telephone System Hard Drive disposal Disaster Recovery Eliminating Downtime Tablet Machine Learning A.I. Recovery Travel Time Management Maintenance IT Management Sports Cleaning Printers Plug-In Payment Inventory Managed Service Provider Leadership Mobile Office Current Events DDoS Instagram Regulation Domains Money Computer Care Windows 10 Employer Employee Relationship Net Neutrality Fun Public Speaking Gaming Console Presentation Freedom of Information Lithium-ion battery Scalability Augmented Reality Synergy Encryption Video Games Emergency Wireless Technology 5G Yahoo IBM IaaS Worker Search Television Hacker Credit Cards The Internet of Things Emoji Budget Vendor Management Windows 7 Customer Relationship Management Autocorrect HaaS Competition Printer IP Address Avoiding Downtime Unified Threat Management Scheduling Dark Data Quick Tips Customer Service Samsung

Newsletter Sign Up