(415) 246-0101

Microtechs Blog

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

You can never be too careful about what you install on your computers. In this most recent example, Google Chrome users are finding themselves targeted by a new type of malware called Nigelthorn.

Nigelthorn’s Method of Attack
The scam works like this; you encounter a link to a fake YouTube video on social media. If the user clicks on this link, they will be asked to download the Nigelify extension from the Chrome Web Store before viewing the contents of the video. If the user installs this extension, this malware can run rampant on their system.

The Google Chrome Web Store has several measures put in place to keep threats from sneaking onto the store, but Nigelthorn’s code is found on an extension that has passed the Web Store’s tests. In this case, the affected extension, Nigelify, replaces all images on a page with images of Nigel Thornberry, a late 1990s/early 2000s cartoon character who has emerged as a meme in recent years. Essentially, this malware is taking advantage of people’s fondness for nostalgia.

Once Nigelthorn has been installed, it will affect the system in various ways. It can steal your data available through Facebook, but if this isn’t enough, it can also share itself out to any of your contacts via Facebook Messenger or tagging your friends to potentially infect them as well. This aggressive manner of spreading makes it quite effective at collecting a large amount of information, as well as keeping itself out there in the world, still relevant enough to be a concern.

Nigelthorn is also capable of using other malware tools in order to pull off its scam, including methods such as cryptomining and YouTube manipulation to raise money and attack more targets.

How to Prevent Infection in the First Place
Another big pain about the Nigelthorn malware is that it can be quite difficult to get rid of. If you’ve accidentally installed Nigelthorn in your web browser, it will close the extensions panel--an extreme way of keeping you from uninstalling it. The only way to get rid of this malware is to uninstall Chrome entirely, and you’ll also want to change any credentials that may have been stolen by the malware.

As is the case with most threats, the most effective countermeasure is to just not click on the link that downloads the malware in the first place. As long as a user knows not to click on suspicious links, Chrome can be reasonably safe.

For more information on the latest threats to your organization’s security, subscribe to Microtechs’s blog and reach out to us at (415) 246-0101.

What Are the Differences Between Business Intellig...
Businesses Thrive with Dedicated Proactive Mainten...

Related Posts



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, February 16 2019

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Productivity User Tips Tech Term Privacy Smartphones Internet Efficiency Malware Cybersecurity Hardware Android Innovation Google Browser Cloud Communication Data Email Microsoft Passwords Mobile Device Wi-Fi Ransomware Network Collaboration Software Small Business Mobile Devices IT Support Communications Backup IT Services Windows 10 Wireless Hosted Solutions Holiday Saving Money Data Backup Business Managed IT services Users Internet of Things Business Management Applications Data recovery Business Intelligence Hackers Networking Blockchain Social Media Marketing Information Outsourced IT VoIp Managed IT Services Cloud Computing Smartphone Employer-Employee Relationship Workplace Tips Patch Management Data Protection Managed Service Gmail Cortana Apps Data Management Miscellaneous G Suite Compliance VPN Tech Terms Remote Computing Cost Management Computers Facebook Save Money Remote Monitoring and Management Access Control Bandwidth Phishing Government Managed IT Service Microsoft Office Mobility Password Automation BDR Wireless Charging Router Medical IT Data Security Excel Analytics Computer Virtual Assistant Data Breach Artificial Intelligence Virtualization Connectivity Mobile Security Vulnerability Voice over Internet Protocol Outlook Safety Paper SaaS Personal Information User Tip Virus Telephony Security Cameras Knowledge SSD Movies Managing Stress Machine Learning Millennials Value Plug-In Business Continuity Server Touchscreen How To Comparison Operating System Spyware Profitability Gadgets Settings Ink GDPR E-Commerce Antivirus Voice over IP Maintenance Big Data Word WannaCry Edge Proactive IT Upgrade Technology Tips Streaming Media Microsoft Office 365 Apple Specifications Server Management HP Eliminating Downtime User Security Dongle PowerPoint Storage Payment Unified Communications Bring Your Own Device Staff Internet Explorer Wearables HIPAA Chrome Telecommute Database Certification Sales Downloads Network Attached Storage iPhone Conferencing Telecommuting Environment Document Management Amazon BYOD Battery Sports IT budget Dark Web instant Messaging Twitter Hard Drive RAM Hybrid Cloud Troubleshooting File Sharing eCommerce Threat Physical Security Reporting Healthcare Data loss Cybercrime Tablet Backup and Disaster Recovery Lead Generation Trends Microsoft Teams Authentication Office e-waste Paperless Office Wireless Internet Error Vulnerabilities Tip of the week Inventory Processors Cables Update Websites Online Shopping Printing Laptop Law Enforcement Spam Office 365 Tactics Analysis Training Hard Drives A.I. Company Culture Authorization Content Filtering Workers disposal Digital Help Desk Business Technology IT Management Congratulations Quick Tips Alert Disaster Recovery Printers Regulation Thank You Cryptocurrency