(415) 246-0101

Microtechs Blog

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

You can never be too careful about what you install on your computers. In this most recent example, Google Chrome users are finding themselves targeted by a new type of malware called Nigelthorn.

Nigelthorn’s Method of Attack
The scam works like this; you encounter a link to a fake YouTube video on social media. If the user clicks on this link, they will be asked to download the Nigelify extension from the Chrome Web Store before viewing the contents of the video. If the user installs this extension, this malware can run rampant on their system.

The Google Chrome Web Store has several measures put in place to keep threats from sneaking onto the store, but Nigelthorn’s code is found on an extension that has passed the Web Store’s tests. In this case, the affected extension, Nigelify, replaces all images on a page with images of Nigel Thornberry, a late 1990s/early 2000s cartoon character who has emerged as a meme in recent years. Essentially, this malware is taking advantage of people’s fondness for nostalgia.

Once Nigelthorn has been installed, it will affect the system in various ways. It can steal your data available through Facebook, but if this isn’t enough, it can also share itself out to any of your contacts via Facebook Messenger or tagging your friends to potentially infect them as well. This aggressive manner of spreading makes it quite effective at collecting a large amount of information, as well as keeping itself out there in the world, still relevant enough to be a concern.

Nigelthorn is also capable of using other malware tools in order to pull off its scam, including methods such as cryptomining and YouTube manipulation to raise money and attack more targets.

How to Prevent Infection in the First Place
Another big pain about the Nigelthorn malware is that it can be quite difficult to get rid of. If you’ve accidentally installed Nigelthorn in your web browser, it will close the extensions panel--an extreme way of keeping you from uninstalling it. The only way to get rid of this malware is to uninstall Chrome entirely, and you’ll also want to change any credentials that may have been stolen by the malware.

As is the case with most threats, the most effective countermeasure is to just not click on the link that downloads the malware in the first place. As long as a user knows not to click on suspicious links, Chrome can be reasonably safe.

For more information on the latest threats to your organization’s security, subscribe to Microtechs’s blog and reach out to us at (415) 246-0101.

What Are the Differences Between Business Intellig...
Businesses Thrive with Dedicated Proactive Mainten...

Related Posts

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, December 11 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Tech Term User Tips Privacy Internet Smartphones Cybersecurity Browser Productivity Communication Microsoft Malware Cloud Efficiency Android Hardware Email Passwords IT Support Wi-Fi Google Software IT Services Windows 10 Small Business Hosted Solutions Ransomware Network Saving Money Data Backup Managed IT services Communications Applications Backup Users Data Data recovery Business Management Mobile Device Networking Innovation Social Media Collaboration Business Intelligence Outsourced IT Blockchain VoIp Information Marketing Cloud Computing Wireless Mobile Devices Internet of Things Business Managed IT Services Employer-Employee Relationship Workplace Tips Virtualization Managed Service VPN Data Management Cost Management Compliance Phishing Bandwidth Government Tech Terms Smartphone Computers Remote Computing Excel Remote Monitoring and Management Router Computer Save Money BDR Automation Data Breach Patch Management Managed IT Service Connectivity Data Protection Artificial Intelligence Gmail Wireless Charging Cortana Miscellaneous Analytics Hackers Apps Virtual Assistant Outlook Workers Digital Ink SaaS IT Management Operating System Voice over Internet Protocol Antivirus Maintenance Apple Specifications User Security Managing Stress Vulnerability Plug-In Business Continuity Telephony Technology Tips Streaming Media Touchscreen Profitability Millennials Dongle PowerPoint Chrome GDPR Server Server Management Sales Staff Internet Explorer iPhone Conferencing Settings Facebook Unified Communications G Suite Spyware Database Proactive IT Upgrade Voice over IP Big Data Downloads File Sharing Microsoft Office 365 WannaCry Telecommute Tablet Eliminating Downtime Edge Sports Storage Environment Threat Office Twitter RAM Bring Your Own Device HP Data loss Cybercrime Holiday Backup and Disaster Recovery Trends Access Control HIPAA Amazon BYOD Law Enforcement Dark Web Network Attached Storage e-waste Telecommuting Document Management Websites Printing Content Filtering Reporting Battery IT budget Inventory Business Technology Hybrid Cloud Troubleshooting Spam Tactics Microsoft Office eCommerce Physical Security Hard Drives A.I. Microsoft Teams Authentication Hard Drive Knowledge Wireless Internet User Tip Error Lead Generation Password disposal Paperless Office Safety Paper Medical IT Mobile Security Cables Update Virus How To Comparison Analysis Online Shopping Laptop SSD Movies Gadgets Company Culture Authorization Tip of the week Processors Help Desk Office 365 Machine Learning Value Quick Tips Disaster Recovery Regulation Printers Certification Thank You Congratulations Alert