croom new

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

You can never be too careful about what you install on your computers. In this most recent example, Google Chrome users are finding themselves targeted by a new type of malware called Nigelthorn.

Nigelthorn’s Method of Attack
The scam works like this; you encounter a link to a fake YouTube video on social media. If the user clicks on this link, they will be asked to download the Nigelify extension from the Chrome Web Store before viewing the contents of the video. If the user installs this extension, this malware can run rampant on their system.

The Google Chrome Web Store has several measures put in place to keep threats from sneaking onto the store, but Nigelthorn’s code is found on an extension that has passed the Web Store’s tests. In this case, the affected extension, Nigelify, replaces all images on a page with images of Nigel Thornberry, a late 1990s/early 2000s cartoon character who has emerged as a meme in recent years. Essentially, this malware is taking advantage of people’s fondness for nostalgia.

Once Nigelthorn has been installed, it will affect the system in various ways. It can steal your data available through Facebook, but if this isn’t enough, it can also share itself out to any of your contacts via Facebook Messenger or tagging your friends to potentially infect them as well. This aggressive manner of spreading makes it quite effective at collecting a large amount of information, as well as keeping itself out there in the world, still relevant enough to be a concern.

Nigelthorn is also capable of using other malware tools in order to pull off its scam, including methods such as cryptomining and YouTube manipulation to raise money and attack more targets.

How to Prevent Infection in the First Place
Another big pain about the Nigelthorn malware is that it can be quite difficult to get rid of. If you’ve accidentally installed Nigelthorn in your web browser, it will close the extensions panel--an extreme way of keeping you from uninstalling it. The only way to get rid of this malware is to uninstall Chrome entirely, and you’ll also want to change any credentials that may have been stolen by the malware.

As is the case with most threats, the most effective countermeasure is to just not click on the link that downloads the malware in the first place. As long as a user knows not to click on suspicious links, Chrome can be reasonably safe.

For more information on the latest threats to your organization’s security, subscribe to Eclipse Integrated Systems’s blog and reach out to us at 800-340-0505.

What Are the Differences Between Business Intellig...
Businesses Thrive with Dedicated Proactive Mainten...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, October 18 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security Google Hackers Internet Malware Business Management Software Microsoft User Tips Productivity Hosted Solutions Tech Term Innovation Computer Efficiency Backup Windows 10 Browser Cybersecurity Business Apps Email Productivity Managed IT Services Saving Money Windows Mobile Devices Smartphones Cybercrime Virtualization Smartphone VoIP Hardware Communication Small Business Operating System communications Internet of Things Data Recovery Law Enforcement Collaboration Passwords Disaster Recovery Android Workplace Tips Data Backup IT Support Microsoft Office Miscellaneous Business Continuity Data Security Ransomware Phishing Data Chrome Users Mobility Server Social Media Update Mobile Device Management Telephone Systems Cloud Computing Network Office 365 IT Support BDR Wireless Holiday Quick Tips Money Gadgets Cost Management Employer-Employee Relationship Application App Information Technology Government Windows 10 Wi-Fi Unsupported Software Vulnerability Health Password Best Practice Mobile Device Risk Management Google Drive Outsourced IT Social IT Services Blockchain Politics Automation Patch Management Spam Work/Life Balance Managed Service Provider Facebook Alert Office tips Two-factor Authentication Computers Current Events Shortcut USB Upgrade Hacking Artificial Intelligence Antivirus Streaming Media Data Management Managed IT Services Bandwidth Save Money User Error Proactive IT Sports Managed IT Identity Theft Google Docs Router Wireless Charging Recovery Encryption SaaS Commerce History Fraud Computer Care End of Support Battery Data Storage Mobile Security Gmail Tech Support Data Protection Private Cloud Information Meetings Transportation Going Green Maintenance iPhone Managing Stress Apple HaaS Business Intelligence Outlook Internet Exlporer Wireless Technology The Internet of Things Office Automobile Hosted Solution eWaste Compliance WiFi Storage Cleaning Personal Information Mobile Computing DDoS Excel Networking Samsung OneNote VPN Legal Devices Search Cortana Social Engineering Analytics Telephony Humor Touchscreen Marketing Remote Computing Audit Flexibility Television Company Culture Save Time Remote Monitoring and Management Budget Electronic Medical Records A.I. WIndows Server 2008 Computer Accessories Augmented Reality App store PDF Worker Commute Threat Access Control HBO Gifts Smart Technology Computer Fan Scalability Virus Voice over Internet Protocol Teamwork NFL Printing Medical IT Comparison Hacker Hard Disk Drive Books G Suite Adobe Microsoft Word Avoiding Downtime Instant Messaging Analysis Microsoft Excel Identities Chromecast Safety Emails Experience Movies Data Breach Edge Files Unified Threat Management Text Messaging PowerPoint Authentication Wearable Technology Credit Cards WannaCry How To Proactive Word Point of Sale Google Assistant GDPR Screen Mirroring Specifications Keyboard Bring Your Own Device Applications Identity Managed Service File Sharing Language Webinar Phone System Evernote Laptop Vendor Management Windows Ink Ciminal Upgrades Connectivity Authorization IT Management Websites Amazon Advertising Value Dark Web Cast Sales Robot Video Games Hybrid Cloud Licensing Device Security Data Privacy IT solutions Music Unified Communications Touchpad Google Maps Project Management Trending Consultant Downloads Running Cable IT Solutions FAQ Data storage Scam Nanotechnology Reputation Data Theft Virtual Assistant Error BYOD Retail Lithium-ion battery Hiring/Firing iOS Managed IT Service SharePoint Travel Virtual Reality Hard Drive Administrator Windows 10s RAM Bluetooth Distributed Denial of Service Sync Workers Training Data Loss IT budget Entertainment Trends Troubleshooting Charger Employer Employee Relationship Root Cause Analysis Black Market Computing Plug-In Internet Explorer Microsoft Office 365 Conferencing Benefits Cables Tablets Spyware Settings Education Chromebook Reporting Legislation Access Solid State Drive Big Data Microsoft Teams Fax Server Updates Uninterrupted Power Supply Operating Sysytem Cache Relocation Remote Monitoring Emergency CrashOverride Monitors Disaster Printers Twitter Regulation Worker

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login