Let us be your IT department!
Call us Today! (703) 821-8200

Computerware

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

LeakerLocker Takes Exposure to New Heights By Sharing Your Mobile Browser History

ransomware_leakerlocker_400

Ransomware, the malware that locks down its victim’s files until they pay up, has always been a frustrating issue to deal with. However, a recent mobile ransomware will make the issue a little more personal… by sharing the victim’s mobile browsing history.

This introduces an important question: how much is it worth to you for your browsing history to kept secret? According to LeakerLocker, the answer is $50. This Android malware will steal the user’s browsing history, along with photos and videos from the device, any Facebook messages, and the user’s location history, all along with other sensitive information the mobile device has access to.

Admittedly, considering what many may have on their phones that they don’t want others to see, LeakerLocker utilizes a potent motivation: the fear of embarrassment. Think to yourself for a moment--do you have anything on your phone that you’d rather not anyone else know about?

LeakerLocker asks, is $50 enough to keep your secrets hidden from view?

Unlike many examples of ransomware, the researchers at McAfee have discovered that LeakerLocker seems not to encrypt any data. Rather, the ransomware allegedly takes a backup of all information on the infected device, which is then used to blackmail the owner into paying up.

This ransomware was spread via two Google Play Store apps, Wallpapers Blur HD and Booster & Channel Cleaner Pro. These fraudulent applications have since been removed. A major red flag for these apps were the incredible amount of permissions that LeakerLocker obtained through them. These apps requested the ability to both read and send messages, manage the device’s calls, and access the contact list. Once approved, LeakerLocker shuts the user out of the device and demands its ransom through the lock screen--and thanks to the access the user had just given the app, it can easily seem that paying the ransom is the only option.

However, there is no way of knowing for sure if LeakerLocker has actually accessed the data it claims to. Having said that, it has been confirmed that the ransomware can access the device’s browsing history, along with text and email messages, the device’s calling history, and yes, camera images.

As we recommend when someone is dealing with any form of ransomware, paying the ransom will almost certainly do you no good. Where’s the guarantee that the hackers haven’t scammed you out of the cost of your data, and that the money you’ve given them won’t finance their next heist?

If you have concerns with keeping your data secured and your business safe from threats like LeakerLocker and the many ransomware variants out there, reach out to us. We can help to make sure your network is as secure as possible, from the software all the way to the employees who use it. Call us at (703) 821-8200 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 23 September 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Managed Service Provider Workplace Tips Productivity Software Business Computing Backup Hackers Data Saving Money Hardware Business Malware Email IT Support IT Services Hosted Solutions Efficiency Google Quick Tips Gadgets Smartphones Business Continuity Small Business Mobile Devices Mobile Office Disaster Recovery User Tips Virtualization Computer Microsoft Office Server Network Network Security Miscellaneous Upgrade VoIP Social Media Windows 10 Windows Unified Threat Management Mobile Device Management Smartphone Innovation Operating System Communication WiFi Android Vendor Management Passwords BYOD Ransomware Remote Computing Mobile Computing Apps The Internet of Things Marketing Facebook Users Managed IT services Remote Monitoring Firewall History Holiday Apple Collaboration Data Management Analytics IT Consultant Alert Save Money Outsourced IT Automation Health Big data Content Filtering Managed IT Services Bring Your Own Device Office Lithium-ion Battery Windows 8 Phishing Hiring/Firing Hard Drives Tech Support Best Practice BDR Spam Going Green Outlook Productivity Wireless Technology Virus Search App Encryption Phone System Help Desk Data Backup Gmail Printer Antivirus Managed IT Recovery Browser Employer-Employee Relationship IT Support Information Technology IBM Budget Internet of Things Save Time Money Running Cable Proactive IT Humor Computers Artificial Intelligence Data storage communications SaaS Administration Customer Service Maintenance Saving Time Bandwidth Education Hacking Networking Digital Payment Telephone Systems Office 365 Fax Server Training User PowerPoint Social Networking DDoS VPN Securty Government Twitter Solid State Drive Avoiding Downtime Word Flexibility It Management Hard Drive Risk Management Password Current Events iPhone Business Intelligence Legal Hacker Windows 10 Document Management Mobile Device Tablet Computer Repair Two-factor Authentication Hosted Solution Wireless Intranet Website Travel Data Recovery Update Black Market Experience Chrome Business Growth Co-managed IT Telephony Monitors Cloud Computing Router Hack Computer Accessories YouTube Customer Relationship Management Lifestyle Comparison Settings Augmented Reality Safety Disaster Social End of Support Text Messaging Network Congestion Law Enforcement Politics Public Cloud Cybercrime Cybersecurity Pain Points Net Neutrality Cortana Laptop Excel Cost Management User Error Mobility Automobile Downtime Processors Office Tips USB Paperless Office How To Gaming Console Presentation Company Culture Trending Sports Computing Virtual Desktop Webcam Start Menu Programming Taxes Robot Statistics Documents IT service Heating/Cooling Uninterrupted Power Supply Compliance Streaming Media Retail Inbound Marketing eWaste Leadership Read cache Rental Service CCTV Deep Learning Google Maps Memory Shortcut Visible Light Communication Value Patch Management Corporate Profile Wi-Fi In Internet of Things Device Management Troubleshooting Environment Assessment Emails Staffing Flash Scalability Competition Advertising Redundancy VoIP online Currency Google Wallet Business Owner Consultation Meetings Displays Cabling Private Cloud Application Unified Communications Harddrive Project Management Banking Administrator Drones Mouse Specifications External Harddrive File Sharing Supercomputer Worker Language Machine Learning Permissions Digital Signature GPS Emergency Business Metrics Distributed Denial of Service Entertainment switches Smart Phones Get More Done Google Drive Employer Employee Relationship Writing Licensing Ebay Printer Server 3D Analytic Electricity Chromebook Botnet Recycling Messenger Work/Life Balance Public Speaking Cryptocurrency Pirating Information Adminstration Business Technology WannaCry Download Computer Malfunction Google Docs Entrepreneur IT consulting Time Management Books Content Management Cleaning Upselling HIPAA Webinar Business Managemenet Scam Microchip Motion Sickness Electronic Payment CIO Windows XP Touchscreen Reading Tracking Regulations IP Address Society Video Surveillance Knowledge Saving ZTime Digital Hacks LinkedIn Web Server Human Resources Micrsooft Best Practives Websites Relocation Workers Identity Theft Archive Debate Skype Tech Terms Microserver Access Notifications Point of Contact Teamwork Software as a Service Reliable Computing Samsung Virtual Reality G Suite Music Storage PDF Turn Key Thin CLient Spyware Social Engineering Physical Security Upgrades Tablets Bluetooth Keyboard LiFi Best Available Trojan Product Reviews Data Protection Computing Infrastructure Sync Domains Organize Capital Productuvuty Vulnerability 3D Printing CrashOverride

hp supplies medallionLarge2017