Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Would You Share Your Browser History? This Ransomware Will


Ransomware is a tricky piece of malware that locks down the precious files located on a victim’s computer, then (in theory) will return access to them when a ransom has been paid. Depending on the files stored on a victim’s computer, they might simply blow it off and not worry too much about losing access to a couple of pictures or videos--but what if this ransomware threatened to expose your web browsing history?

Would you pay money to keep your browsing history secret? This is the key point behind a new ransomware called LeakerLocker. LeakerLocker, an Android-exclusive variant of ransomware, attempts to extort money from its victims by threatening them with their mobile device’s browser history. It seems like a simple choice to make; $50 to keep your browsing history private. Other information claimed to be stolen includes photos, videos, Facebook messages, location history, and other sensitive information.

In essence, this ransomware uses the fear of embarrassment to get its victims to fork over some cash.

Discovered by researchers at McAfee, LeakerLocker doesn’t appear to actually encrypt any information found on the device, making it the exception to the typical ransomware variant. Instead, LeakerLocker claims that it has taken a backup of the data on the device, which it will then proceed to threaten the user with. Users have contracted this ransomware by downloading two apps on the Google Play Store, which have both been removed since: Wallpapers Blur HD and Booster & Cleaner Pro.

LeakerLocker asks for an incredible amount of permissions on your device, including the ability to read and send messages, manage calls, and access contacts. It then locks down the device and places a ransom message on the lock screen. Since users will grant LeakerLocker permissions at the time of downloading, it gains access to information which it uses to convince victims that they must pay the ransom. Whether or not is has stolen all of the information it claims to is another story altogether, but it’s been found that the ransomware can access information like email addresses, browser history, text messages, calling history, and even pictures from the camera.

As is the case with ordinary ransomware, it’s best to not pay the ransom. After all, any money that’s sent to hackers who have locked down your device is funding their next campaign--something that you don’t want on your conscience. Furthermore, there is no guarantee that you’ll even get your data back, so there is no reason to assume you can.

For more information on how to stay safe online, be it on a desktop or a mobile device, reach out to BNMC at 978-482-2020. We can help your organization implement solutions that minimize the risk of running into malicious applications.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 17 December 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Email Malware Hackers Business Computing Hosted Solutions Internet Microsoft Software IT Services Business Ransomware Computer Windows Google Network Security Backup Smartphone Small Business Windows 10 Android App Hardware Data Management Business Continuity Data Browser Innovation Smartphones User Tips Internet of Things Office 365 Saving Money Artificial Intelligence Cloud Computing Mobile Devices Productivity Data Recovery IT Support Phishing Tip of the week Outsourced IT Managed IT Services Remote Monitoring Money Facebook Managed Service Provider Efficiency Risk Management Word Productivity Cybersecurity Settings IT Support Robot Google Drive Upgrade Office Tips Gmail Big Data Data storage Mobile Device IT Management LiFi Virtual Private Network Outlook Monitors Save Money Administration Content Filtering Telephone Systems Alert Mouse Analytics Miscellaneous Firewall Antivirus Apple SaaS Data Backup Network Encryption Employer-Employee Relationship Computing Chrome Server Government Hosted Solution Windows 10 Unified Threat Management Workplace Tips Managed IT Services YouTube End of Support communications Social Media Maintenance Vulnerability Disaster Recovery Microsoft Office Passwords Automobile Data Security VoIP Display Legislation Cybercrime Server Management Dell WiFi Microsoft Excel Marketing WannaCry Alt Codes Quick Tips Google Maps Techology Tablet Statistics Budget Mail Merge Humor Data loss Typing VoIP Current Events Business Management Unified Threat Management Automation Comparison Bluetooth desktop IT solutions Politics Virtual Reality Address Digital Cryptocurrency Avoiding Downtime Going Green Collaboration User Error Communication Specifications Running Cable Samsung Buisness Storage Spyware Bitcoin Writing Time Management Printing Virtual Desktop File Sharing Printer Black Friday Laptop Search Legal Solid State Drive Windows 8 Deep Learning Websites Emergency Dark Data Retail Network Management Access Control Cyber Monday Hard Disk Drive Spam Bring Your Own Device Downtime Business Technology Customer Service Office Touchscreen Cabling SharePoint Smart Technology Vendor Management Managed IT Gadgets Operating System How To Social Lenovo Social Engineering Information Technology Infrastructure Bandwidth Downloads Distributed Denial of Service Halloween BYOD Shortcut Users Best Practice Apps Firefox Digital Payment Superfish Safety Disaster Education Two-factor Authentication Managed IT Service Scary Stories Patch Management Google Docs Hacks Website Scam Network Congestion Customer Relationship Management Heating/Cooling Google Wallet Uninterrupted Power Supply Multi-Factor Security Unified Communications Computer Care Break Fix Sports IBM Business Growth Password Wireless Networking Computers The Internet of Things Servers Drones Google Calendar Training Dark Web VPN Corporate Profile Hacker Mobile Device Management How To Paperless Office Staffing Health Mobile Computing Administrator Black Market Processors what was your? Web Server GPS Holiday Electronic Medical Records Twitter Upgrades Cameras Tracking Remote Computing 3D Printing CCTV Document Management Tech Support Notifications Unsupported Software Identity Theft Update Travel Crowdsourcing Mobile Data G Suite Supercomputer Botnet Recovery CrashOverride Motion Sickness Taxes IT Budget Machine Learning Chromebook IT Consultant Physical Security Relocation Emoji Meetings Cleaning Work/Life Balance Personal Information Private Cloud Cortana Webcam Law Enforcement Wi-Fi Error Virtualization Ben McDonald shares Point of Sale Gadget Computer Repair

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3