croom new

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

You can never be too careful about what you install on your computers. In this most recent example, Google Chrome users are finding themselves targeted by a new type of malware called Nigelthorn.

Nigelthorn’s Method of Attack
The scam works like this; you encounter a link to a fake YouTube video on social media. If the user clicks on this link, they will be asked to download the Nigelify extension from the Chrome Web Store before viewing the contents of the video. If the user installs this extension, this malware can run rampant on their system.

The Google Chrome Web Store has several measures put in place to keep threats from sneaking onto the store, but Nigelthorn’s code is found on an extension that has passed the Web Store’s tests. In this case, the affected extension, Nigelify, replaces all images on a page with images of Nigel Thornberry, a late 1990s/early 2000s cartoon character who has emerged as a meme in recent years. Essentially, this malware is taking advantage of people’s fondness for nostalgia.

Once Nigelthorn has been installed, it will affect the system in various ways. It can steal your data available through Facebook, but if this isn’t enough, it can also share itself out to any of your contacts via Facebook Messenger or tagging your friends to potentially infect them as well. This aggressive manner of spreading makes it quite effective at collecting a large amount of information, as well as keeping itself out there in the world, still relevant enough to be a concern.

Nigelthorn is also capable of using other malware tools in order to pull off its scam, including methods such as cryptomining and YouTube manipulation to raise money and attack more targets.

How to Prevent Infection in the First Place
Another big pain about the Nigelthorn malware is that it can be quite difficult to get rid of. If you’ve accidentally installed Nigelthorn in your web browser, it will close the extensions panel--an extreme way of keeping you from uninstalling it. The only way to get rid of this malware is to uninstall Chrome entirely, and you’ll also want to change any credentials that may have been stolen by the malware.

As is the case with most threats, the most effective countermeasure is to just not click on the link that downloads the malware in the first place. As long as a user knows not to click on suspicious links, Chrome can be reasonably safe.

For more information on the latest threats to your organization’s security, subscribe to Eclipse Integrated Systems’s blog and reach out to us at 800-340-0505.

What Are the Differences Between Business Intellig...
Businesses Thrive with Dedicated Proactive Mainten...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, August 19 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Cloud Business Computing Hackers Network Security Google Malware Internet Software Business Management Microsoft Tech Term Hosted Solutions Computer User Tips Windows 10 Backup Innovation Productivity Apps Cybersecurity Productivity Business Managed IT Services Email Windows Mobile Devices Efficiency Saving Money Virtualization Browser Cybercrime Smartphone Hardware Smartphones VoIP Operating System Internet of Things Law Enforcement Communication Data Recovery Data Backup Small Business Disaster Recovery communications Business Continuity Android Microsoft Office IT Support Collaboration Data Security Passwords Ransomware Mobility Social Media Mobile Device Management Telephone Systems Phishing Chrome Server Miscellaneous Office 365 BDR Wireless Holiday Quick Tips Workplace Tips Network Money IT Support Cost Management Google Drive Employer-Employee Relationship Social Outsourced IT Data Government Wi-Fi Application Information Technology App Health Update Cloud Computing Risk Management Unsupported Software Vulnerability Password Best Practice IT Services Gadgets Users Save Money Sports Two-factor Authentication Work/Life Balance Managed IT Facebook Automation Office tips Current Events Spam Proactive IT USB Artificial Intelligence Antivirus Alert Streaming Media Managed Service Provider Windows 10 Computers Blockchain User Error Upgrade Identity Theft Hacking Shortcut Patch Management Politics Data Management End of Support Battery Managed IT Services Remote Computing Meetings Private Cloud Audit Excel Networking Going Green Company Culture Recovery Save Time HaaS Apple iPhone Managing Stress Devices SaaS Commerce Automobile eWaste Computer Care Tech Support Cortana Gmail Mobile Computing DDoS Personal Information WiFi Transportation Internet Exlporer Legal Mobile Security Search The Internet of Things Google Docs Analytics Bandwidth Information Wireless Technology Wireless Charging Office Hosted Solution Fraud Business Intelligence Television Data Storage Flexibility Samsung OneNote Cleaning VPN Router Data Protection Encryption Social Engineering Maintenance Telephony Humor History Compliance Outlook Evernote Downloads Training File Sharing Language Books Data Theft Virtual Assistant Windows 10s Employer Employee Relationship Root Cause Analysis Windows Ink Ciminal Experience Managed IT Service Touchscreen IT Management Instant Messaging Access Licensing Device Security Text Messaging RAM Uninterrupted Power Supply Operating Sysytem Cast Sales How To Hard Drive Wearable Technology Benefits Point of Sale Trends Settings Storage Computing Plug-In Solid State Drive Budget Internet Explorer Computer Accessories Augmented Reality Google Maps Project Management Phone System Cables Electronic Medical Records IT Solutions FAQ Smart Technology Computer Fan Travel Microsoft Teams Avoiding Downtime BYOD Retail Chromebook Reporting Sync Workers Advertising A.I. Video Games App store Remote Monitoring and Management Hacker Hard Disk Drive Chromecast Threat Data Loss IT budget Music Virus Voice over Internet Protocol Safety Emails Files Charger WannaCry Tablets Spyware G Suite Unified Threat Management Conferencing Reputation Printing Running Cable Medical IT Updates SharePoint Movies Laptop Legislation Analysis Keyboard Virtual Reality Bluetooth PowerPoint Distributed Denial of Service Vendor Management Proactive Webinar WIndows Server 2008 GDPR Robot NFL Entertainment Bring Your Own Device Upgrades HBO Gifts Black Market Google Assistant Adobe Microsoft Word Touchpad Comparison Marketing Identity Managed Service Education Fax Server Connectivity Data storage Microsoft Excel Identities Big Data Websites Amazon IT solutions Trending Data Breach Value Scam Nanotechnology Lithium-ion battery Word Edge Hybrid Cloud Consultant Credit Cards Administrator Applications PDF Worker Commute Teamwork Unified Communications Mobile Device Screen Mirroring Specifications Scalability Data Privacy Hiring/Firing iOS Worker Twitter Error Relocation Regulation Cache Remote Monitoring CrashOverride Emergency Monitors Disaster Dark Web

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login