• Register

Endpoint I.T. Blog

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

You can never be too careful about what you install on your computers. In this most recent example, Google Chrome users are finding themselves targeted by a new type of malware called Nigelthorn.

Nigelthorn’s Method of Attack
The scam works like this; you encounter a link to a fake YouTube video on social media. If the user clicks on this link, they will be asked to download the Nigelify extension from the Chrome Web Store before viewing the contents of the video. If the user installs this extension, this malware can run rampant on their system.

The Google Chrome Web Store has several measures put in place to keep threats from sneaking onto the store, but Nigelthorn’s code is found on an extension that has passed the Web Store’s tests. In this case, the affected extension, Nigelify, replaces all images on a page with images of Nigel Thornberry, a late 1990s/early 2000s cartoon character who has emerged as a meme in recent years. Essentially, this malware is taking advantage of people’s fondness for nostalgia.

Once Nigelthorn has been installed, it will affect the system in various ways. It can steal your data available through Facebook, but if this isn’t enough, it can also share itself out to any of your contacts via Facebook Messenger or tagging your friends to potentially infect them as well. This aggressive manner of spreading makes it quite effective at collecting a large amount of information, as well as keeping itself out there in the world, still relevant enough to be a concern.

Nigelthorn is also capable of using other malware tools in order to pull off its scam, including methods such as cryptomining and YouTube manipulation to raise money and attack more targets.

How to Prevent Infection in the First Place
Another big pain about the Nigelthorn malware is that it can be quite difficult to get rid of. If you’ve accidentally installed Nigelthorn in your web browser, it will close the extensions panel--an extreme way of keeping you from uninstalling it. The only way to get rid of this malware is to uninstall Chrome entirely, and you’ll also want to change any credentials that may have been stolen by the malware.

As is the case with most threats, the most effective countermeasure is to just not click on the link that downloads the malware in the first place. As long as a user knows not to click on suspicious links, Chrome can be reasonably safe.

For more information on the latest threats to your organization’s security, subscribe to Endpoint I.T.’s blog and reach out to us at (409) 835-1600.

What Are the Differences Between Business Intellig...
Businesses Thrive with Dedicated Proactive Mainten...

Comments 1

Tyson Whiddon on Tuesday, 13 November 2018 06:10

Less friendly work I literally don’t like to do with anybody who has not interest to make the friendship more strong. Spreading the fondness with the ways on the website has to concern chances of the malware.

Less friendly work I literally don’t like to do with anybody who has not interest to make the friendship more strong. Spreading the fondness with the ways on the website has to concern chances of the malware.
Already Registered? Login Here
Sunday, February 17, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Privacy Network Security Productivity User Tips Tech Term Smartphones Cybersecurity Microsoft Malware Internet Cloud Efficiency Android Hardware Google Email Communications Backup Mobile Device Innovation Communication Browser Passwords Software Wi-Fi IT Support Data Small Business Data Recovery Data Backup VoIp IT Services Business Ransomware Collaboration Network Mobile Devices Applications Windows 10 Internet of Things Smartphone Hosted Solutions Wireless Saving Money Hackers Users Outsourced IT Managed IT services Social Media Holiday Managed IT Services Business Management Cloud Computing Word Microsoft Office Employer-Employee Relationship Blockchain Router Business Intelligence Miscellaneous Workplace Tips Settings Networking Computer Patch Management Access Control Information Marketing Chrome Facebook Tip of the week VPN Medical IT Analytics BDR Dark Web Scam Twitter Gmail Data Management Battery Business Continuity Connectivity Wireless Charging Virtual Assistant Managed Service Tech Terms How To Data Security Computers Mobility Apps Automation Compliance Data Breach Virtualization Physical Security Phishing G Suite Artificial Intelligence Website Government Password Save Money Excel Managed IT Service Cost Management Virus Remote Computing Cortana Bandwidth Law Enforcement Data Protection Remote Monitoring and Management Trends Alert Apple Office 365 IT Management Database Amazon Wearables Paperless Office Staff Telecommuting Environment Hybrid Cloud Upgrade Hard Drive Microsoft Teams Profitability Lead Generation Server Management Printing Analysis instant Messaging A.I. Touchscreen iPhone Telephony Cybercrime Comparison Healthcare Digital Websites Inventory e-waste Cables Sales Certification Processors Telecommute SaaS Vulnerabilities Technology Tips Company Culture Travel File Sharing Eliminating Downtime Paper Botnet Movies Microsoft Office 365 Vulnerability Voice over IP Tactics Specifications Safety GDPR Workers Mobile Security disposal Voice over Internet Protocol Tablet Spyware Data loss Big Data Backup and Disaster Recovery Managing Stress Managed IT Education User Security BYOD Ink Files Remote Monitoring User Tip Authentication Troubleshooting Network Attached Storage Maintenance Plug-In News Conferencing Personal Information Edge Streaming Media Storage Millennials IT budget Operating System Value Retail WhatsApp Knowledge Training HP Spam Hard Drives Live Streaming Business Technology Wireless Internet WannaCry PowerPoint Politics Dongle Unified Communications Authorization Licensing eCommerce Update Server Internet Explorer Proactive IT Telephone System Office E-Commerce Downloads Error VoIP Gadgets Security Cameras Document Management Antivirus Laptop SSD Bring Your Own Device Help Desk HIPAA Machine Learning Sports Reporting Remote Support RAM Tech Support Online Shopping Outlook Threat App Cleaning Content Filtering Payment Disaster Recovery Emergency Printers WiFi Thank You Cryptocurrency Congratulations Regulation Quick Tips

Newsletter Sign Up

Latest News & Events

Endpoint I.T. is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Endpoint I.T. can do for your business.

Call Us Today
Call us today
(409) 835-1600

595 Orleans Street
STE 1111

Beaumont, Texas 77701