croom new

Eclipse Integrated Systems Blog

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

You can never be too careful about what you install on your computers. In this most recent example, Google Chrome users are finding themselves targeted by a new type of malware called Nigelthorn.

Nigelthorn’s Method of Attack
The scam works like this; you encounter a link to a fake YouTube video on social media. If the user clicks on this link, they will be asked to download the Nigelify extension from the Chrome Web Store before viewing the contents of the video. If the user installs this extension, this malware can run rampant on their system.

The Google Chrome Web Store has several measures put in place to keep threats from sneaking onto the store, but Nigelthorn’s code is found on an extension that has passed the Web Store’s tests. In this case, the affected extension, Nigelify, replaces all images on a page with images of Nigel Thornberry, a late 1990s/early 2000s cartoon character who has emerged as a meme in recent years. Essentially, this malware is taking advantage of people’s fondness for nostalgia.

Once Nigelthorn has been installed, it will affect the system in various ways. It can steal your data available through Facebook, but if this isn’t enough, it can also share itself out to any of your contacts via Facebook Messenger or tagging your friends to potentially infect them as well. This aggressive manner of spreading makes it quite effective at collecting a large amount of information, as well as keeping itself out there in the world, still relevant enough to be a concern.

Nigelthorn is also capable of using other malware tools in order to pull off its scam, including methods such as cryptomining and YouTube manipulation to raise money and attack more targets.

How to Prevent Infection in the First Place
Another big pain about the Nigelthorn malware is that it can be quite difficult to get rid of. If you’ve accidentally installed Nigelthorn in your web browser, it will close the extensions panel--an extreme way of keeping you from uninstalling it. The only way to get rid of this malware is to uninstall Chrome entirely, and you’ll also want to change any credentials that may have been stolen by the malware.

As is the case with most threats, the most effective countermeasure is to just not click on the link that downloads the malware in the first place. As long as a user knows not to click on suspicious links, Chrome can be reasonably safe.

For more information on the latest threats to your organization’s security, subscribe to Eclipse Integrated Systems’s blog and reach out to us at 800-340-0505.

What Are the Differences Between Business Intellig...
Businesses Thrive with Dedicated Proactive Mainten...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, December 17 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Cloud Network Security Internet Google Hackers User Tips Malware Business Management Software Microsoft Productivity Tech Term Hosted Solutions Efficiency Backup Innovation Computer Windows 10 Browser Apps Cybersecurity Email Business Managed IT Services Productivity Mobile Devices Saving Money Smartphones Data Recovery Communication Data Backup Windows VoIP Hardware Cybercrime Virtualization Smartphone Internet of Things Small Business Microsoft Office Business Continuity Android Disaster Recovery Collaboration Operating System Passwords IT Support Workplace Tips Law Enforcement communications Users Wireless Ransomware IT Services Data Security Miscellaneous Network Holiday IT Support Mobile Device Cloud Computing Outsourced IT Office 365 Phishing BDR Social Media Quick Tips Mobile Device Management Telephone Systems Money Windows 10 Data Chrome Mobility Server Gadgets Update Wi-Fi Password Upgrade Health Cost Management Employer-Employee Relationship Best Practice Government Google Drive Social Unsupported Software Vulnerability Application App Risk Management Information Technology Managed IT USB Hacking Artificial Intelligence Antivirus Two-factor Authentication Data Management Networking Save Money Spam Identity Theft Sports Managed Service Provider Proactive IT Politics Automation Shortcut Streaming Media Bandwidth Blockchain User Error Work/Life Balance Information Marketing Facebook Alert Managed IT Services Patch Management Current Events Computers Office tips Applications Maintenance Hosted Solution Automobile Audit Connectivity Company Culture Save Time Personal Information Outlook Compliance Legal SaaS Commerce VPN Meetings Excel Computer Care Analytics Social Engineering Search Storage Going Green Telephony Humor Apple Flexibility Devices Remote Computing BYOD Cortana eWaste WiFi Encryption Mobile Computing DDoS Recovery Router History Remote Monitoring and Management Office End of Support Battery Gmail Cleaning Google Docs Tech Support Samsung Wireless Charging OneNote Private Cloud Fraud Mobile Security Transportation Data Storage Television iPhone Managing Stress Internet Exlporer HaaS Wireless Technology Touchscreen Managed Service The Internet of Things Data Protection Business Intelligence Video Games Websites Amazon Robot Advertising Screen Mirroring Benefits Specifications Authorization Teamwork Music Evernote Settings Hybrid Cloud File Sharing Solid State Drive Language Value Dark Web Touchpad Trending Reputation Electronic Medical Records Windows Ink Ciminal Data Privacy Data storage IT Management Computer Accessories Augmented Reality Unified Communications Help Desk Licensing Device Security Data Theft Virtual Assistant Wearable Technology Lithium-ion battery Cast Smart Technology Sales Computer Fan Downloads Managed IT Service Administrator Hacker Virtual Reality Hard Disk Drive Error Safety Black Market Google Maps Emails Project Management Hard Drive IT Solutions Entertainment FAQ RAM Certification Travel Unified Threat Management Computing Plug-In Retail WannaCry Trends Troubleshooting Sync Big Data Workers Cables Access Keyboard Education Internet Explorer Microsoft Office 365 Uninterrupted Power Supply Operating Sysytem Budget Data Loss Webinar IT budget Chromebook Reporting Vendor Management Charger Microsoft Teams Scalability Tablets Upgrades Spyware App store Running Cable PDF Worker Commute Conferencing A.I. Profitability Books Updates Virus Voice over Internet Protocol Legislation Threat Access Control SharePoint Avoiding Downtime G Suite Chromecast Instant Messaging IT solutions Printing Medical IT Bluetooth Distributed Denial of Service WIndows Server 2008 Experience Files How To NFL Consultant Analysis Text Messaging HBO Scam Gifts Nanotechnology Movies Eliminating Downtime Adobe Microsoft Word Proactive Hiring/Firing Point of Sale Comparison iOS PowerPoint Authentication Bring Your Own Device Microsoft Excel Windows 10s Identities Google Assistant GDPR Fax Server Laptop Training Phone System Data Breach Word Edge Identity Employer Employee Relationship Credit Cards Root Cause Analysis Wireless Internet Disaster Printers Cache Twitter Regulation Remote Monitoring Emergency CrashOverride Monitors Relocation Worker

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login