Nigelthorn Chrome Extension Malware
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Affected platforms
The following platforms are known to be affected:
Threat details
The Nigelthorn malware spreads via social engineering, with users encouraged to click on links that lead to fake YouTube web pages. These web pages ask users to install a Chrome browser extension that appears legitimate in order to play the video, but the extension actually communicates with a Command and Control (C2) server.
When the malicious extension is run, users are redirected to Facebook in an attempt to compromise their accounts. Facebook and Instagram account credentials, authentication tokens and cookies are all uploaded to the C2 server. Nigelthorn uses the stolen accounts to spread further by publishing malicious links in spam messages or in posts which tag the user's contacts.
Nigelthorn also runs a browser-based cryptocurrency miner and generates false views, likes and comments on YouTube videos. The malware is capable of defeating some removal attempts, by preventing the extensions manager and some other Chrome and Facebook administration tools from being opened.
Remediation advice
To prevent and detect an infection, ensure that:Remediation steps
| Type | Step |
|---|---|
|
Last edited: 17 February 2020 12:50 pm