Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Would You Share Your Browser History? This Ransomware Will

mobile_ransomware_400

Ransomware is a tricky piece of malware that locks down the precious files located on a victim’s computer, then (in theory) will return access to them when a ransom has been paid. Depending on the files stored on a victim’s computer, they might simply blow it off and not worry too much about losing access to a couple of pictures or videos--but what if this ransomware threatened to expose your web browsing history?

Would you pay money to keep your browsing history secret? This is the key point behind a new ransomware called LeakerLocker. LeakerLocker, an Android-exclusive variant of ransomware, attempts to extort money from its victims by threatening them with their mobile device’s browser history. It seems like a simple choice to make; $50 to keep your browsing history private. Other information claimed to be stolen includes photos, videos, Facebook messages, location history, and other sensitive information.

In essence, this ransomware uses the fear of embarrassment to get its victims to fork over some cash.

Discovered by researchers at McAfee, LeakerLocker doesn’t appear to actually encrypt any information found on the device, making it the exception to the typical ransomware variant. Instead, LeakerLocker claims that it has taken a backup of the data on the device, which it will then proceed to threaten the user with. Users have contracted this ransomware by downloading two apps on the Google Play Store, which have both been removed since: Wallpapers Blur HD and Booster & Cleaner Pro.

LeakerLocker asks for an incredible amount of permissions on your device, including the ability to read and send messages, manage calls, and access contacts. It then locks down the device and places a ransom message on the lock screen. Since users will grant LeakerLocker permissions at the time of downloading, it gains access to information which it uses to convince victims that they must pay the ransom. Whether or not is has stolen all of the information it claims to is another story altogether, but it’s been found that the ransomware can access information like email addresses, browser history, text messages, calling history, and even pictures from the camera.

As is the case with ordinary ransomware, it’s best to not pay the ransom. After all, any money that’s sent to hackers who have locked down your device is funding their next campaign--something that you don’t want on your conscience. Furthermore, there is no guarantee that you’ll even get your data back, so there is no reason to assume you can.

For more information on how to stay safe online, be it on a desktop or a mobile device, reach out to BNMC at 978-482-2020. We can help your organization implement solutions that minimize the risk of running into malicious applications.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 19 October 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Email Malware Hackers Hosted Solutions Business Computing Ransomware Internet Microsoft Software Computer Network Security Google Windows IT Services Backup Business Smartphone Windows 10 App Hardware Data Business Continuity Innovation Android Cloud Computing Mobile Devices Saving Money IT Support Data Management Productivity Small Business Tip of the week Phishing User Tips Internet of Things Word Efficiency Cybersecurity Data Recovery Artificial Intelligence Robot Google Drive Upgrade Settings Managed IT Services Data storage Remote Monitoring Office Tips Gmail Browser Big Data Smartphones Facebook Administration Antivirus Content Filtering Productivity Analytics Risk Management Network IT Support Encryption Windows 10 End of Support Unified Threat Management Managed IT Services Chrome Hosted Solution Server Outsourced IT Workplace Tips Vulnerability Microsoft Office YouTube communications Social Media Money IT Management Outlook Mobile Device Monitors Office 365 Virtual Private Network Save Money Disaster Recovery Passwords Miscellaneous Telephone Systems Alert LiFi Apple SaaS Managed Service Provider Samsung Writing Printing Data Backup Spyware Legal Time Management Dark Data Windows 8 File Sharing IT solutions Search Retail Solid State Drive Websites Emergency Employer-Employee Relationship Network Management Customer Service Running Cable Office Hard Disk Drive Computing Operating System Buisness Business Technology Vendor Management Touchscreen Cabling Social Virtual Desktop Laptop Managed IT Social Engineering Information Technology Best Practice Deep Learning Lenovo How To Infrastructure Spam Shortcut Safety Google Docs Digital Payment Bring Your Own Device Downtime Superfish Firefox Network Congestion Disaster Hacks Patch Management Gadgets Maintenance Google Wallet Business Growth Scam Customer Relationship Management Heating/Cooling Computers Uninterrupted Power Supply Password Bandwidth Apps Halloween Users IBM Drones Computer Care Wireless Hacker Networking Servers Display Education Scary Stories VPN Corporate Profile Training Alt Codes Automobile Website Data Security Server Management Dell Unified Communications Sports WannaCry Budget Quick Tips Humor Google Maps Typing Techology The Internet of Things Statistics Automation Current Events Mail Merge Data loss Mouse VoIP Cryptocurrency Unified Threat Management Virtual Reality VoIP Cybercrime Bluetooth Communication desktop Going Green WiFi Politics Address Marketing Digital Avoiding Downtime Storage Firewall Bitcoin Collaboration CCTV Document Management Tech Support Unsupported Software Update Notifications Identity Theft Mobile Data Recovery Travel Crowdsourcing G Suite Supercomputer Botnet CrashOverride Chromebook Motion Sickness Government Taxes IT Budget Machine Learning Physical Security Emoji BYOD IT Consultant Relocation Personal Information Cortana Meetings Work/Life Balance Cleaning Private Cloud Wi-Fi Virtualization Webcam Law Enforcement Error Computer Repair Ben McDonald shares Mobile Device Management Point of Sale Gadget How To Health Black Market Mobile Computing Paperless Office Staffing Administrator Electronic Medical Records Twitter what was your? Web Server Processors GPS Holiday Upgrades Business Management Remote Computing Cameras Tracking 3D Printing User Error

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3