631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

You can never be too careful about what you install on your computers. In this most recent example, Google Chrome users are finding themselves targeted by a new type of malware called Nigelthorn.

Nigelthorn’s Method of Attack
The scam works like this; you encounter a link to a fake YouTube video on social media. If the user clicks on this link, they will be asked to download the Nigelify extension from the Chrome Web Store before viewing the contents of the video. If the user installs this extension, this malware can run rampant on their system.

The Google Chrome Web Store has several measures put in place to keep threats from sneaking onto the store, but Nigelthorn’s code is found on an extension that has passed the Web Store’s tests. In this case, the affected extension, Nigelify, replaces all images on a page with images of Nigel Thornberry, a late 1990s/early 2000s cartoon character who has emerged as a meme in recent years. Essentially, this malware is taking advantage of people’s fondness for nostalgia.

Once Nigelthorn has been installed, it will affect the system in various ways. It can steal your data available through Facebook, but if this isn’t enough, it can also share itself out to any of your contacts via Facebook Messenger or tagging your friends to potentially infect them as well. This aggressive manner of spreading makes it quite effective at collecting a large amount of information, as well as keeping itself out there in the world, still relevant enough to be a concern.

Nigelthorn is also capable of using other malware tools in order to pull off its scam, including methods such as cryptomining and YouTube manipulation to raise money and attack more targets.

How to Prevent Infection in the First Place
Another big pain about the Nigelthorn malware is that it can be quite difficult to get rid of. If you’ve accidentally installed Nigelthorn in your web browser, it will close the extensions panel--an extreme way of keeping you from uninstalling it. The only way to get rid of this malware is to uninstall Chrome entirely, and you’ll also want to change any credentials that may have been stolen by the malware.

As is the case with most threats, the most effective countermeasure is to just not click on the link that downloads the malware in the first place. As long as a user knows not to click on suspicious links, Chrome can be reasonably safe.

For more information on the latest threats to your organization’s security, subscribe to Suffolk Computer Consultants’s blog and reach out to us at 631-905-9617.

What Are the Differences Between Business Intellig...
Businesses Thrive with Dedicated Proactive Mainten...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, October 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Best Practices Cloud Privacy Cybersecurity Network Security Managed IT Services Malware Communications Tech Term Smartphones Microsoft Communication Productivity Backup Business Hosted Solutions Hardware Passwords Hackers Outsourced IT Internet VoIP Email Small Business Software Efficiency Browser Business Management Google User Tips Android Ransomware Social Media Wi-Fi Save Money Alert Router Bandwidth Twitter Computer Data Backup Data Data Recovery Smartphone Windows 10 Cloud Computing Business Intelligence Microsoft Office Employer-Employee Relationship Applications Innovation Miscellaneous Internet of Things Collaboration Saving Money IT Support Mobile Device Network Blockchain Automation Access Control Analytics Password Mobile Devices VoIP Workplace Tips Apps Managed IT Services Government Data Breach IT Services Marketing Gadgets Settings Data Management Patch Management Vulnerability Phishing Users BDR Virtualization Excel Office Virtual Assistant Scam Chrome Information Wireless Tip of the week Remote Computing Spam Mobile Device Management Company Culture Virus Politics Battery Cortana Word Computers App Windows Artificial Intelligence Hacking How To Business Continuity Networking Compliance Paperless Office Productivity Wireless Charging Data Protection Cost Management Physical Security Managed IT Service IT Support Retail Gmail Remote Monitoring Website Office 365 Tech Terms Law Enforcement Workers Dark Web Holiday VPN WiFi Cybercrime BYOD Remote Control User Security Operating System Remote Monitoring and Management Voice over IP Network Attached Storage Streaming Media Update Technology Tips Hybrid Cloud Server Phone System Paper Microsoft Office 365 Education Smart Technology Hosted Solution Specifications HP Database Medical IT Google Maps Staff RAM SaaS Spam Blocking Business Technology WannaCry Environment Analysis eCommerce Server Management Downloads Outlook Copy Apple Backup and Disaster Recovery Amazon Telecommuting Ink Authentication Two-factor Authentication Staffing Multi-Factor Security Conferencing Document Management Tactics GDPR News Websites Microsoft Teams Email Management Sales HIPAA e-waste Managed Service Spotify Licensing Online Shopping Trends Paste iPhone SSD Gadget Millennials IT budget PowerPoint Authorization Tech Support Information Technology Hiring/Firing Safety Content Filtering Digital Internet Explorer Storage Telephone System Managing Stress Printer Server Tablet Hard Drive disposal Travel Machine Learning A.I. Inventory Plug-In Work/Life Balance Facebook Shortcut IT Management Sports Entertainment Biometrics G Suite Cables Managed IT Recovery Edge Threat Error Disaster Recovery Dongle Botnet Cleaning Printers Knowledge Processors Value Office Tips Automobile Big Data Maintenance Live Streaming Telecommute Movies Telephone Systems File Sharing Lead Generation Mobile Security Proactive IT CrashOverride Files Telephony Connectivity Troubleshooting Access Bring Your Own Device Voice over Internet Protocol User Tip Laptop Printing Touchscreen Remote Support Hard Drives Google Drive Comparison Spyware Reporting Antivirus WhatsApp Data loss Unified Communications Domains Net Neutrality Search Personal Information Vendor Management Autocorrect Gaming Console Windows 10 Avoiding Downtime Public Speaking Emergency Scheduling Presentation Scalability Dark Data Lithium-ion battery Video Games Samsung Synergy IaaS Augmented Reality Worker Managed Service Provider Instagram Wireless Technology 5G Credit Cards DDoS Television Money IBM Emoji Hacker HaaS Employer Employee Relationship The Internet of Things Printer Quick Tips Fun Budget Competition Freedom of Information Customer Relationship Management Unified Threat Management IP Address Regulation Current Events Leadership Encryption Yahoo Customer Service Mobile Office Computer Care Upgrade

Newsletter Sign Up