About Us

IT Services

Understanding IT

News & Events



Contact Us

  • Register

Texas Professional IT Services LLC Blog

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

You can never be too careful about what you install on your computers. In this most recent example, Google Chrome users are finding themselves targeted by a new type of malware called Nigelthorn.

Nigelthorn’s Method of Attack
The scam works like this; you encounter a link to a fake YouTube video on social media. If the user clicks on this link, they will be asked to download the Nigelify extension from the Chrome Web Store before viewing the contents of the video. If the user installs this extension, this malware can run rampant on their system.

The Google Chrome Web Store has several measures put in place to keep threats from sneaking onto the store, but Nigelthorn’s code is found on an extension that has passed the Web Store’s tests. In this case, the affected extension, Nigelify, replaces all images on a page with images of Nigel Thornberry, a late 1990s/early 2000s cartoon character who has emerged as a meme in recent years. Essentially, this malware is taking advantage of people’s fondness for nostalgia.

Once Nigelthorn has been installed, it will affect the system in various ways. It can steal your data available through Facebook, but if this isn’t enough, it can also share itself out to any of your contacts via Facebook Messenger or tagging your friends to potentially infect them as well. This aggressive manner of spreading makes it quite effective at collecting a large amount of information, as well as keeping itself out there in the world, still relevant enough to be a concern.

Nigelthorn is also capable of using other malware tools in order to pull off its scam, including methods such as cryptomining and YouTube manipulation to raise money and attack more targets.

How to Prevent Infection in the First Place
Another big pain about the Nigelthorn malware is that it can be quite difficult to get rid of. If you’ve accidentally installed Nigelthorn in your web browser, it will close the extensions panel--an extreme way of keeping you from uninstalling it. The only way to get rid of this malware is to uninstall Chrome entirely, and you’ll also want to change any credentials that may have been stolen by the malware.

As is the case with most threats, the most effective countermeasure is to just not click on the link that downloads the malware in the first place. As long as a user knows not to click on suspicious links, Chrome can be reasonably safe.

For more information on the latest threats to your organization’s security, subscribe to Texas Professional IT Services LLC’s blog and reach out to us at (832) 514-6260.

What Are the Differences Between Business Intellig...
Businesses Thrive with Dedicated Proactive Mainten...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, October 15, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Best Practices Cloud Privacy Cybersecurity Network Security Managed IT Services Communications Malware Tech Term Smartphones Backup Productivity Communication Microsoft User Tips Internet Hackers VoIp Software Browser Business Hardware Google Android Outsourced IT Passwords Ransomware Efficiency Save Money Small Business Hosted Solutions Wi-Fi Social Media Email Innovation Smartphone Windows 10 Miscellaneous Applications Microsoft Office Data Business Management Business Intelligence Collaboration Saving Money Cloud Computing Data Backup Excel Network Settings Twitter Access Control Computer Internet of Things Phishing Data Breach Patch Management Mobile Device Automation IT Services Analytics Data Recovery Employer-Employee Relationship VoIP Data Management Users Mobile Devices Office Government Managed IT Services IT Support Apps Router Bandwidth Blockchain IT Support Managed IT Service Cost Management Virtual Assistant Gmail Holiday Office 365 Computers Wireless Charging Spam Tip of the week Information Artificial Intelligence Website Battery BDR Virtualization Password Word Cortana Vulnerability Virus Gadgets Cybercrime Scam Remote Computing Business Continuity Law Enforcement App How To Data Protection VPN Workers Dark Web Tech Terms Chrome Marketing Company Culture Workplace Tips Politics Retail Mobile Device Management Compliance Windows Physical Security Alert Networking Wireless User Security Spyware Storage Data loss Connectivity Live Streaming Edge Apple Server Management Printing Google Maps Remote Control Licensing G Suite Printer Server SSD Database Paste Files Access Authorization Dongle Unified Communications Botnet Proactive IT Business Technology HP Error Antivirus Streaming Media Entertainment WhatsApp Telephony Environment iPhone WannaCry Information Technology Reporting Paper Hiring/Firing Spam Blocking Tech Support User Tip Bring Your Own Device Printers Facebook Remote Monitoring and Management IT budget Tactics Comparison BYOD RAM Multi-Factor Security Staff Downloads Phone System Voice over IP Amazon Big Data e-waste HIPAA Medical IT Machine Learning Ink Staffing Email Management Smart Technology Hybrid Cloud Document Management Inventory Analysis IT Management Maintenance Specifications Troubleshooting Technology Tips Microsoft Teams Shortcut Remote Support Server disposal Sales Touchscreen Websites Trends News eCommerce Hard Drive SaaS PowerPoint Travel Telecommuting Cables Paperless Office Mobile Security Recovery Managed Service Internet Explorer Automobile Telephone Systems Conferencing Update Backup and Disaster Recovery Managing Stress Laptop Value Hosted Solution Tablet Remote Monitoring Microsoft Office 365 Safety A.I. Gadget Google Drive Telephone System Online Shopping File Sharing Processors GDPR Telecommute Sports Education Millennials Voice over Internet Protocol Digital Operating System Managed IT Lead Generation Network Attached Storage Threat Content Filtering Disaster Recovery Hard Drives Copy Knowledge Biometrics Authentication Movies Two-factor Authentication Cleaning Plug-In Thank You Regulation Congratulations CrashOverride Quick Tips WiFi Emergency Outlook

Latest News & Events

Texas Professional IT Services LLC is proud to announce the launch of our new website at http://www.texproit.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Texas Professional IT Services LLC can do for your business.

Call Us Today
Call us today
(832) 514-6260

1209 Decker Dr.
STE 202

Baytown, Texas 77520