croom new

Eclipse Integrated Systems Blog

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

You can never be too careful about what you install on your computers. In this most recent example, Google Chrome users are finding themselves targeted by a new type of malware called Nigelthorn.

Nigelthorn’s Method of Attack
The scam works like this; you encounter a link to a fake YouTube video on social media. If the user clicks on this link, they will be asked to download the Nigelify extension from the Chrome Web Store before viewing the contents of the video. If the user installs this extension, this malware can run rampant on their system.

The Google Chrome Web Store has several measures put in place to keep threats from sneaking onto the store, but Nigelthorn’s code is found on an extension that has passed the Web Store’s tests. In this case, the affected extension, Nigelify, replaces all images on a page with images of Nigel Thornberry, a late 1990s/early 2000s cartoon character who has emerged as a meme in recent years. Essentially, this malware is taking advantage of people’s fondness for nostalgia.

Once Nigelthorn has been installed, it will affect the system in various ways. It can steal your data available through Facebook, but if this isn’t enough, it can also share itself out to any of your contacts via Facebook Messenger or tagging your friends to potentially infect them as well. This aggressive manner of spreading makes it quite effective at collecting a large amount of information, as well as keeping itself out there in the world, still relevant enough to be a concern.

Nigelthorn is also capable of using other malware tools in order to pull off its scam, including methods such as cryptomining and YouTube manipulation to raise money and attack more targets.

How to Prevent Infection in the First Place
Another big pain about the Nigelthorn malware is that it can be quite difficult to get rid of. If you’ve accidentally installed Nigelthorn in your web browser, it will close the extensions panel--an extreme way of keeping you from uninstalling it. The only way to get rid of this malware is to uninstall Chrome entirely, and you’ll also want to change any credentials that may have been stolen by the malware.

As is the case with most threats, the most effective countermeasure is to just not click on the link that downloads the malware in the first place. As long as a user knows not to click on suspicious links, Chrome can be reasonably safe.

For more information on the latest threats to your organization’s security, subscribe to Eclipse Integrated Systems’s blog and reach out to us at 800-340-0505.

What Are the Differences Between Business Intellig...
Businesses Thrive with Dedicated Proactive Mainten...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, February 22 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Privacy Cloud Network Security Internet Google User Tips Hackers Productivity Malware Software Business Management Microsoft Innovation Tech Term Efficiency Hosted Solutions Backup Computer Browser Email Windows 10 Business Apps Cybersecurity Mobile Devices Smartphones Managed IT Services Hardware Productivity Smartphone Internet of Things Saving Money Data Recovery Communication Windows Collaboration Data Backup Passwords Small Business VoIP Virtualization Cybercrime Data Security Holiday communications Android Microsoft Office Mobility Network Law Enforcement Mobile Device IT Support Workplace Tips Wireless Business Continuity Ransomware Disaster Recovery Operating System Data Windows 10 IT Support Cloud Computing Miscellaneous Office 365 IT Services Users Chrome Social Media Mobile Device Management Telephone Systems Server Update Wi-Fi Password BDR Outsourced IT Gadgets Quick Tips Phishing Money Employer-Employee Relationship Application Government Information Technology App Facebook Unsupported Software Vulnerability Upgrade Best Practice Health Risk Management Google Drive Social Cost Management Politics Two-factor Authentication Spam Automation Networking Managed Service Provider Work/Life Balance Information Alert Proactive IT Computers Shortcut Office tips Current Events Streaming Media Hacking Personal Information Blockchain Bandwidth USB User Error Artificial Intelligence Antivirus Managed IT Services Data Management Marketing Save Money Patch Management Managed IT Sports Identity Theft Router Computer Care Remote Monitoring and Management Encryption Meetings History Access Control Gmail Excel G Suite Going Green Tech Support Storage Medical IT End of Support Battery Mobile Security Apple Instant Messaging Transportation Devices Private Cloud BYOD Office eWaste Internet Exlporer Cortana Business Intelligence Mobile Computing DDoS HaaS The Internet of Things Managed Service WiFi iPhone Managing Stress Wireless Technology Samsung OneNote Hosted Solution Cleaning Connectivity Automobile Wireless Charging Google Docs Compliance Training VPN Fraud Social Engineering Television Legal Touchscreen Telephony Humor Data Storage Analytics Search Audit Company Culture Remote Computing Word Save Time Data Protection Applications Maintenance Flexibility Outlook SaaS Commerce Recovery App store Windows Ink Ciminal Hacker Hard Disk Drive IT Management A.I. Profitability Virus Licensing Voice over Internet Protocol Device Security Scalability Safety Emails Avoiding Downtime Cast Threat Sales Wearable Technology PDF Worker Commute WannaCry Vulnerabilities Chromecast Wearables Books Unified Threat Management Printing FAQ Eliminating Downtime Experience Google Maps Analysis Project Management Keyboard Files IT Solutions Movies Vendor Management Proactive Travel How To Webinar PowerPoint Retail Authentication Text Messaging Cryptocurrency Sync Bring Your Own Device Workers Upgrades Laptop Google Assistant GDPR Point of Sale Charger Wireless Internet Phone System Identity Data Loss IT budget Robot Websites Tablets Amazon Spyware IT solutions Conferencing Authorization Running Cable Scam Nanotechnology Hybrid Cloud Updates SharePoint Video Games Consultant Touchpad Value Legislation Dark Web Advertising WIndows Server 2008 Unified Communications Help Desk Bluetooth Distributed Denial of Service Music Data storage Data Privacy Hiring/Firing iOS Healthcare Trending Lithium-ion battery Data Theft NFL Virtual Assistant Reputation Windows 10s HBO Downloads Gifts Employer Employee Relationship Root Cause Analysis Administrator Adobe Managed IT Service Microsoft Word Comparison Error RAM Data Breach Certification Fax Server Hard Drive Microsoft Excel Identities Virtual Reality Benefits E-Commerce Entertainment Settings Computing Plug-In Edge Black Market Solid State Drive Trends Credit Cards Troubleshooting Computer Accessories Augmented Reality Access Cables Teamwork Electronic Medical Records Uninterrupted Power Supply Operating Sysytem Screen Mirroring Internet Explorer Specifications Microsoft Office 365 Payment Budget Microsoft Teams Evernote Security Cameras Big Data Chromebook File Sharing Reporting Language Education Smart Technology Computer Fan Cache Remote Monitoring Relocation CrashOverride Emergency Monitors Disaster Paperless Office Worker Printers Twitter Regulation

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login