Bredy Network Management Corporation Blogs

2 minutes reading time (455 words)

Would You Share Your Browser History? This Ransomware Will


Ransomware is a tricky piece of malware that locks down the precious files located on a victim’s computer, then (in theory) will return access to them when a ransom has been paid. Depending on the files stored on a victim’s computer, they might simply blow it off and not worry too much about losing access to a couple of pictures or videos--but what if this ransomware threatened to expose your web browsing history?

Would you pay money to keep your browsing history secret? This is the key point behind a new ransomware called LeakerLocker. LeakerLocker, an Android-exclusive variant of ransomware, attempts to extort money from its victims by threatening them with their mobile device’s browser history. It seems like a simple choice to make; $50 to keep your browsing history private. Other information claimed to be stolen includes photos, videos, Facebook messages, location history, and other sensitive information.

In essence, this ransomware uses the fear of embarrassment to get its victims to fork over some cash.

Discovered by researchers at McAfee, LeakerLocker doesn’t appear to actually encrypt any information found on the device, making it the exception to the typical ransomware variant. Instead, LeakerLocker claims that it has taken a backup of the data on the device, which it will then proceed to threaten the user with. Users have contracted this ransomware by downloading two apps on the Google Play Store, which have both been removed since: Wallpapers Blur HD and Booster & Cleaner Pro.

LeakerLocker asks for an incredible amount of permissions on your device, including the ability to read and send messages, manage calls, and access contacts. It then locks down the device and places a ransom message on the lock screen. Since users will grant LeakerLocker permissions at the time of downloading, it gains access to information which it uses to convince victims that they must pay the ransom. Whether or not is has stolen all of the information it claims to is another story altogether, but it’s been found that the ransomware can access information like email addresses, browser history, text messages, calling history, and even pictures from the camera.

As is the case with ordinary ransomware, it’s best to not pay the ransom. After all, any money that’s sent to hackers who have locked down your device is funding their next campaign--something that you don’t want on your conscience. Furthermore, there is no guarantee that you’ll even get your data back, so there is no reason to assume you can.

For more information on how to stay safe online, be it on a desktop or a mobile device, reach out to BNMC at 978-482-2020. We can help your organization implement solutions that minimize the risk of running into malicious applications.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, July 23 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Malware Privacy Hackers Business Computing Internet Software Microsoft Google Mobile Devices Network Security Computer Hosted Solutions Ransomware Business Smartphone Tech Term Android Managed IT Services IT Services Hardware IT Support Windows Small Business Data Management Backup Business Continuity User Tips Browser Innovation Windows 10 Internet of Things Cloud Computing Cybersecurity Data App Encryption Business Management Server Facebook Remote Monitoring Data Recovery Saving Money Artificial Intelligence Gmail Windows 10 Money IT Support Disaster Recovery Infrastructure Managed IT Services Tip of the week Productivity Smartphones Chrome Data Backup Word Managed Service Provider Outsourced IT Vulnerability Phishing Communication Office 365 Productivity Efficiency Website Office Tips Data storage Network Passwords Big Data Robot Applications Antivirus Google Drive Settings Content Filtering Bandwidth Upgrade Government Analytics communications IT Management YouTube Employer-Employee Relationship Microsoft Office Social Media Risk Management Paperless Office Alert HIPAA The Internet of Things Unified Threat Management Vendor Management Outlook Data loss Monitors Spam Computing Telephone Systems Save Money Mobile Security Two-factor Authentication WiFi LiFi Avoiding Downtime VoIP Scam Automation Hosted Solution Firewall Maintenance End of Support Administration Mouse Virtual Reality Miscellaneous Workplace Tips Company Culture VPN Apple SaaS Wireless Data Security Storage Managing Stress Business Technology Holiday Server Management Virtual Private Network BYOD Mobile Device Unified Communications Drones Nanotechnology Development Running Cable Dell Quick Tips Techology Windows 8 Wearable Technology Network upgrade Managed IT Smart Technology Retail Motherboard Cables Cabling How To Lenovo Politics Hacker Alerts USB Buisness WannaCry Statistics Tablet Display Mail Merge Blockchain Deep Learning Fraud Cost Management Sports Downloads Customer Service Identity Continuity Virtual Desktop Google Maps Office Samsung Screen Reader Charging Laptop VoIP Unified Threat Management Smart Office Shortcut Distributed Denial of Service Wires Firefox Superfish Tech Support Alt Codes Licensing Dongle Bluetooth Comparison Address Permissions Bring Your Own Device Operating System Assessment Chromebook Solar Social Engineering Budget Smart Tech desktop User Error Social Work Digital Payment Patch Management Managed IT Service Information Technology Router Voice over Internet Protocol Cybercrime Disaster Customer Relationship Management Websites Typing Humor Cooperation Service Level Agreement Downtime Digital Specifications Collaboration Best Practice Hotspot Internet Exlporer Marketing Heating/Cooling Multi-Factor Security Current Events Compliance Business Intelligence Break Fix Safety Connectivity Gadgets Time Management Printer IT Technicians Optimization Apps Modem FinTech Uninterrupted Power Supply Networking Cryptocurrency Staff Leominster Document Management Spyware Search Black Friday Remote Computing File Sharing Emergency Google Docs Language Value Computer Care IBM Servers Google Calendar Network Congestion IT solutions Going Green Regulations Dark Web IoT Users Halloween Solid State Drive Network Management Access Control Education Hacks Mirgation Recycling Google Wallet Cookies MSP Wi-Fi Bitcoin Augmented Reality K-12 Schools Identity Theft Cyber Monday Writing Business Growth Computing Infrastructure Professional Services Training Corporate Profile Legislation Computers Printing Social Networking Microsoft Excel Legal Star Wars Scary Stories Hard Disk Drive Touchscreen SharePoint Dark Data Password Chatbots eWaste Automobile Computer Repair Relocation Supercomputer CrashOverride Motion Sickness Mobile Data Staffing How To Work/Life Balance Taxes Recovery Mobile Device Management Administrator Web Server what was your? Health Private Cloud IT Budget BDR GPS Black Market Law Enforcement IT Consultant Mobile Computing Notifications Cameras Electronic Medical Records Meetings Physical Security Tracking Twitter Upgrades Gadget Cleaning Emoji Crowdsourcing CCTV Webcam Personal Information Botnet 3D Printing Cortana Error Point of Sale Ben McDonald shares Machine Learning Processors Travel Unsupported Software Virtualization G Suite Update

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3