About Us

IT Services

Understanding IT

News & Events



Contact Us

  • Register

Texas Professional IT Services LLC Blog

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

You can never be too careful about what you install on your computers. In this most recent example, Google Chrome users are finding themselves targeted by a new type of malware called Nigelthorn.

Nigelthorn’s Method of Attack
The scam works like this; you encounter a link to a fake YouTube video on social media. If the user clicks on this link, they will be asked to download the Nigelify extension from the Chrome Web Store before viewing the contents of the video. If the user installs this extension, this malware can run rampant on their system.

The Google Chrome Web Store has several measures put in place to keep threats from sneaking onto the store, but Nigelthorn’s code is found on an extension that has passed the Web Store’s tests. In this case, the affected extension, Nigelify, replaces all images on a page with images of Nigel Thornberry, a late 1990s/early 2000s cartoon character who has emerged as a meme in recent years. Essentially, this malware is taking advantage of people’s fondness for nostalgia.

Once Nigelthorn has been installed, it will affect the system in various ways. It can steal your data available through Facebook, but if this isn’t enough, it can also share itself out to any of your contacts via Facebook Messenger or tagging your friends to potentially infect them as well. This aggressive manner of spreading makes it quite effective at collecting a large amount of information, as well as keeping itself out there in the world, still relevant enough to be a concern.

Nigelthorn is also capable of using other malware tools in order to pull off its scam, including methods such as cryptomining and YouTube manipulation to raise money and attack more targets.

How to Prevent Infection in the First Place
Another big pain about the Nigelthorn malware is that it can be quite difficult to get rid of. If you’ve accidentally installed Nigelthorn in your web browser, it will close the extensions panel--an extreme way of keeping you from uninstalling it. The only way to get rid of this malware is to uninstall Chrome entirely, and you’ll also want to change any credentials that may have been stolen by the malware.

As is the case with most threats, the most effective countermeasure is to just not click on the link that downloads the malware in the first place. As long as a user knows not to click on suspicious links, Chrome can be reasonably safe.

For more information on the latest threats to your organization’s security, subscribe to Texas Professional IT Services LLC’s blog and reach out to us at (832) 514-6260.

What Are the Differences Between Business Intellig...
Businesses Thrive with Dedicated Proactive Mainten...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, February 20, 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Privacy Cloud Network Security Productivity User Tips Cybersecurity Communications Tech Term Smartphones Microsoft Malware Efficiency Managed IT Services Communication Google Business Internet Hardware Email Software Backup Android Browser Innovation Outsourced IT Hackers Small Business Data Backup Wi-Fi Windows 10 Data Passwords Ransomware VoIp Collaboration Mobile Device Cloud Computing Social Media Applications Microsoft Office Smartphone Network Holiday IT Services Mobile Devices Internet of Things Data Recovery Business Management IT Support Save Money Hosted Solutions Apps Users Wireless Saving Money Access Control Miscellaneous Business Intelligence Managed IT Services Analytics Router Employer-Employee Relationship Office Government Blockchain Networking Bandwidth Excel Workplace Tips Office 365 Settings Twitter Patch Management Password Word Computer Information Business Continuity Automation Data Breach Phishing VoIP Data Management Marketing App Medical IT Physical Security Retail Workers Cost Management Managed IT Service Connectivity Company Culture Gmail Managed Service Virtual Assistant Politics Computers Mobile Device Management Wireless Charging Windows Facebook Alert Artificial Intelligence Compliance BDR Tip of the week IT Support Battery Virtualization Cortana Virus Website G Suite Scam Remote Computing Spam Vulnerability Data Security Law Enforcement Mobility Data Protection BYOD VPN How To Tech Terms Remote Monitoring and Management Gadgets Chrome Dark Web Cybercrime File Sharing Processors Digital Operating System Automobile Telephone Systems Hybrid Cloud Wireless Internet Education Millennials Telecommute Sports Hard Drives Hosted Solution Troubleshooting Content Filtering Network Attached Storage Threat Gadget Google Drive Analysis E-Commerce Lead Generation Managed IT Touchscreen Knowledge Security Cameras Cleaning Movies User Security Spyware Edge Cables Help Desk Live Streaming Data loss SaaS SSD Copy Update Remote Monitoring Licensing Server Management Printing Two-factor Authentication Payment Apple Unified Communications Microsoft Office 365 Files Database Wearables Botnet Dongle Business Technology HP Environment Google Maps Remote Control Voice over Internet Protocol Upgrade Disaster Recovery WhatsApp Telephony Antivirus Streaming Media GDPR Paste Outlook Biometrics Tech Support User Tip Paper instant Messaging iPhone WannaCry RAM Authentication Comparison IT budget Tactics Entertainment Plug-In Healthcare Storage Big Data e-waste Hiring/Firing Spam Blocking Certification Printer Server Voice over IP Staff Downloads HIPAA Document Management Inventory Profitability Access Machine Learning Ink Multi-Factor Security Vulnerabilities Technology Tips Microsoft Teams Authorization Specifications IT Management Maintenance Phone System Proactive IT Remote Support Server Error Information Technology Sales disposal Staffing Email Management Printers News eCommerce Websites Trends Hard Drive Paperless Office Mobile Security Bring Your Own Device Eliminating Downtime Travel Telecommuting PowerPoint Shortcut Reporting Backup and Disaster Recovery Managing Stress Conferencing Internet Explorer Personal Information Recovery Tablet Laptop Value Amazon Training Smart Technology Telephone System Online Shopping Safety A.I. Emergency Thank You CrashOverride Regulation WiFi Congratulations Cryptocurrency Quick Tips

Latest News & Events

Texas Professional IT Services LLC is proud to announce the launch of our new website at http://www.texproit.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Texas Professional IT Services LLC can do for your business.

Call Us Today
Call us today
(832) 514-6260

1209 Decker Dr.
STE 202

Baytown, Texas 77520