Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Would You Share Your Browser History? This Ransomware Will

mobile_ransomware_400

Ransomware is a tricky piece of malware that locks down the precious files located on a victim’s computer, then (in theory) will return access to them when a ransom has been paid. Depending on the files stored on a victim’s computer, they might simply blow it off and not worry too much about losing access to a couple of pictures or videos--but what if this ransomware threatened to expose your web browsing history?

Would you pay money to keep your browsing history secret? This is the key point behind a new ransomware called LeakerLocker. LeakerLocker, an Android-exclusive variant of ransomware, attempts to extort money from its victims by threatening them with their mobile device’s browser history. It seems like a simple choice to make; $50 to keep your browsing history private. Other information claimed to be stolen includes photos, videos, Facebook messages, location history, and other sensitive information.

In essence, this ransomware uses the fear of embarrassment to get its victims to fork over some cash.

Discovered by researchers at McAfee, LeakerLocker doesn’t appear to actually encrypt any information found on the device, making it the exception to the typical ransomware variant. Instead, LeakerLocker claims that it has taken a backup of the data on the device, which it will then proceed to threaten the user with. Users have contracted this ransomware by downloading two apps on the Google Play Store, which have both been removed since: Wallpapers Blur HD and Booster & Cleaner Pro.

LeakerLocker asks for an incredible amount of permissions on your device, including the ability to read and send messages, manage calls, and access contacts. It then locks down the device and places a ransom message on the lock screen. Since users will grant LeakerLocker permissions at the time of downloading, it gains access to information which it uses to convince victims that they must pay the ransom. Whether or not is has stolen all of the information it claims to is another story altogether, but it’s been found that the ransomware can access information like email addresses, browser history, text messages, calling history, and even pictures from the camera.

As is the case with ordinary ransomware, it’s best to not pay the ransom. After all, any money that’s sent to hackers who have locked down your device is funding their next campaign--something that you don’t want on your conscience. Furthermore, there is no guarantee that you’ll even get your data back, so there is no reason to assume you can.

For more information on how to stay safe online, be it on a desktop or a mobile device, reach out to BNMC at 978-482-2020. We can help your organization implement solutions that minimize the risk of running into malicious applications.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 22 August 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Cloud Best Practices Technology Email Malware Privacy Hackers Business Computing Hosted Solutions Internet Software Google Computer Business Windows Ransomware Windows 10 Microsoft IT Services App Hardware Data Innovation Saving Money Smartphone IT Support Productivity Data Management Business Continuity Cloud Computing Internet of Things Backup Mobile Devices Network Security Small Business Settings Robot Google Drive Phishing Upgrade Managed IT Services Office Tips Gmail Data storage Big Data Facebook Efficiency Analytics Apple Unified Threat Management SaaS Risk Management Managed IT Services Artificial Intelligence Network Outsourced IT Chrome Hosted Solution Server Mobile Device Workplace Tips End of Support Office 365 YouTube Remote Monitoring communications Social Media Telephone Systems IT Management Microsoft Office Word Browser Money Passwords Smartphones Productivity Monitors Save Money LiFi Managed Service Provider Cybersecurity Administration Android Content Filtering Miscellaneous IT Support Time Management How To Infrastructure Search Storage Bitcoin Printing Running Cable Writing Network Management Legal Firefox Buisness Digital Payment Disaster Data Recovery Dark Data Virtual Desktop Windows 8 Retail Maintenance Laptop Touchscreen Deep Learning Encryption Uninterrupted Power Supply Customer Service Office Spam Computing IBM Computer Care Windows 10 Vendor Management Bring Your Own Device Operating System Downtime Wireless Social Social Engineering Information Technology Corporate Profile Training Gadgets Automobile Tip of the week Best Practice Dell Bandwidth Customer Relationship Management Safety Apps WannaCry Halloween Users Heating/Cooling Google Docs Google Maps Hacks Network Congestion Education Google Wallet Data loss Scary Stories Servers Website Business Growth Password desktop Alert Computers Unified Communications Drones Digital Sports Politics Collaboration Server Management Hacker Firewall Disaster Recovery The Internet of Things Display Quick Tips Spyware File Sharing Statistics Outlook Alt Codes VoIP WiFi Solid State Drive Cybercrime VoIP Budget Employer-Employee Relationship Marketing Websites Bluetooth Humor Typing Current Events Hard Disk Drive Automation Avoiding Downtime Mouse Antivirus Virtual Reality Cryptocurrency Cabling IT solutions Going Green Communication 3D Printing IT Budget Machine Learning IT Consultant BYOD Relocation Unsupported Software Meetings Update Cleaning Work/Life Balance Private Cloud Mobile Data Webcam Managed IT Recovery Law Enforcement Error Ben McDonald shares Point of Sale Chromebook Gadget Physical Security Paperless Office Emoji Staffing Administrator Personal Information what was your? Web Server Cortana Processors GPS Holiday Business Management Wi-Fi Cameras Virtualization Tracking Computer Repair Mobile Device Management CCTV User Tips Samsung How To Document Management Tech Support Health Mobile Computing Black Market Notifications Identity Theft Travel Electronic Medical Records G Suite Twitter Crowdsourcing Upgrades CrashOverride Supercomputer Botnet Motion Sickness Taxes Remote Computing Government

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3