BNMC Blog

There’s Nothing “Smashing” About the Nigelthorn Malware

There’s Nothing “Smashing” About the Nigelthorn Malware

Once again, there is an example of why all users need to be careful about what they install. This time, however, users of the Google Chrome browser are the ones being specifically targeted by a particularly nasty attack known as “Nigelthorn.”

Nigelthorn’s Method of Attack
When scrolling on Facebook, a user may see what appears to be a link to a YouTube video, but is actually a fake. This fraudulent video will then inform the user that in order for it to be played, an extension from the Chrome Web Store, called “Nigelify,” has to be installed. In reality, installing the extension allows the malware into the user’s system.

In order to fool its way past the Chrome Web Store defenses, Nigelthorn’s code is implanted into an extension that has already passed the Web Store’s checks. The first extension to be infected was one called “Nigelify,” which would replace all the pictures on the page a user was viewing with images of Nigel Thornberry, a late 1990’s/early 2000’s cartoon character who has found new life as a meme.

Once Nigelthorn is installed, it can have various effects on the infected system. For instance, not only will this attack vector steal the data that is available through Facebook, it will also share itself via Facebook Messenger, or by tagging the original victim’s friends. This makes it very effective at spreading from victim to victim, as all it takes it to infect the next person in line is for them to install the infected extension as well.

Nigelthorn has also been found to use other common tools that are found in malware in order to accomplish the goal of its developer, including cryptomining and YouTube manipulation for financial gain.

Getting Rid of Nigelthorn (and Avoiding It in the First Place)
What’s worse is that once Nigelthorn has been installed, it is notoriously hard to get rid of. If you have inadvertently installed Nigelthorn, it will automatically close the extensions panel, preventing you from uninstalling it. This means that removing it will likely require you to uninstall Chrome. If you are unlucky enough to be infected, you should change your Google and Facebook credentials in case they were stolen by the malware.

As for avoiding Nigelthorn, the surest is to not click on the link. As long as the user in question knows not to click on fishy links or install additional extensions willy-nilly, using Chrome is still workably safe.

For more information about potential threats to your business’ cybersecurity, and how to stop them, keep reading out blogs, and don’t hesitate to call us at 978-482-2020 for more help.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, October 18 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Email Privacy Malware Hackers Business Computing Computer Internet Microsoft Software Network Security IT Services Hosted Solutions Tech Term Google Business Ransomware Mobile Devices User Tips Backup Efficiency Managed IT Services Smartphone Productivity Small Business Android Innovation Saving Money Business Continuity Data Recovery Hardware Data Management Cloud Computing Windows Internet of Things IT Support Browser Data Backup Managed IT Services Communication App Windows 10 Data Cybersecurity Business Management Remote Monitoring Microsoft Office Encryption Passwords Windows 10 Artificial Intelligence Gmail Server Facebook IT Support Workplace Tips Money Infrastructure Vulnerability Office 365 Website Outsourced IT Applications Word Upgrade Disaster Recovery Analytics Employer-Employee Relationship communications Productivity Smartphones Chrome Tip of the week Managed Service Provider Network Phishing Antivirus YouTube Social Media Government Risk Management Maintenance Google Drive Bandwidth IT Management Office Tips Content Filtering Miscellaneous BYOD Big Data Robot Save Money Settings Data storage End of Support Scam Data loss Users Outlook Unified Threat Management Spam Computing Virtual Reality Operating System Telephone Systems WiFi HIPAA desktop LiFi Hosted Solution SaaS VPN Mobile Security Firewall Administration Mouse Holiday Data Security Server Management Business Technology Business Intelligence Laptop Alert Virtual Private Network Touchscreen The Internet of Things Apple Display Wireless Storage Company Culture VoIP Monitors Mobile Device Vendor Management Information Paperless Office Two-factor Authentication Managing Stress Automation Avoiding Downtime Slack Specifications Nanotechnology Development Customer Relationship Management Wearable Technology Network upgrade Heating/Cooling Multi-Factor Security Motherboard Cables Halloween Alt Codes Safety Content Alerts USB Bring Your Own Device Remote Computing Digital Signage Fraud Break Fix Cost Management Time Management Printer Identity Continuity Network Congestion Monitoring Search Black Friday Screen Reader Charging Digital Payment Social Networking Smart Office Budget Servers Google Calendar Wires Digital Scary Stories Typing Humor Streaming Emergency Licensing Dongle Disaster Information Technology Running Cable Best Practice Writing Troubleshooting Dark Web Assessment Collaboration Current Events Wi-Fi Network Management Access Control Solar Computers Spying Cyber Monday Smart Tech Buisness Work Update Analysis Legislation Router Voice over Internet Protocol Document Management Spyware Sports Cryptocurrency Cooperation Service Level Agreement Uninterrupted Power Supply Virtual Desktop Apps Dark Data Compliance Computer Care IBM Google Docs Retail Hotspot Microsoft Excel Internet Exlporer File Sharing IT solutions Going Green SharePoint Employee-Employer Relationship Managed IT Smart Technology Connectivity Education Hacks Politics Quick Tips Techology IT Technicians Optimization Solid State Drive Customer Service Managed Service Statistics Tablet Modem FinTech Identity Theft Bitcoin How To Lenovo Staff Leominster Google Wallet Downloads Regulations Training Corporate Profile Business Growth Office Samsung LED Mail Merge Language Blockchain Value Printing Cybercrime Legal PowerPoint Shortcut Distributed Denial of Service IoT Automobile Downtime Password Tech Support VoIP Unified Threat Management Mirgation Recycling Hard Disk Drive Chromebook Bluetooth Comparison Cookies MSP Marketing Windows 8 Firefox Superfish Augmented Reality K-12 Schools Dell Unified Communications Drones Social Networking WannaCry Gadgets Hacker Social Engineering Co-Managed IT Address Computing Infrastructure Permissions Professional Services Cabling Deep Learning Onboarding Patch Management Managed IT Service Star Wars Google Maps Websites User Error Chatbots eWaste Emoji IT Budget Upgrades Gadget Web Server what was your? GPS Crowdsourcing IT Consultant Mobile Computing Personal Information Botnet Cortana 3D Printing Cameras BDR Tracking Meetings Cleaning Processors Machine Learning Virtualization Regulation Unsupported Software CCTV Webcam Printers Computer Repair Relocation Error Mobile Data Recovery How To Work/Life Balance Point of Sale Ben McDonald shares Travel Health Private Cloud Black Market G Suite Supercomputer CrashOverride Law Enforcement Staffing Notifications Motion Sickness Electronic Medical Records Twitter Administrator Mobile Device Management Physical Security Taxes

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3