Computerware

LeakerLocker Takes Exposure to New Heights By Sharing Your Mobile Browser History

ransomware_leakerlocker_400

Ransomware, the malware that locks down its victim’s files until they pay up, has always been a frustrating issue to deal with. However, a recent mobile ransomware will make the issue a little more personal… by sharing the victim’s mobile browsing history.

This introduces an important question: how much is it worth to you for your browsing history to kept secret? According to LeakerLocker, the answer is $50. This Android malware will steal the user’s browsing history, along with photos and videos from the device, any Facebook messages, and the user’s location history, all along with other sensitive information the mobile device has access to.

Admittedly, considering what many may have on their phones that they don’t want others to see, LeakerLocker utilizes a potent motivation: the fear of embarrassment. Think to yourself for a moment--do you have anything on your phone that you’d rather not anyone else know about?

LeakerLocker asks, is $50 enough to keep your secrets hidden from view?

Unlike many examples of ransomware, the researchers at McAfee have discovered that LeakerLocker seems not to encrypt any data. Rather, the ransomware allegedly takes a backup of all information on the infected device, which is then used to blackmail the owner into paying up.

This ransomware was spread via two Google Play Store apps, Wallpapers Blur HD and Booster & Channel Cleaner Pro. These fraudulent applications have since been removed. A major red flag for these apps were the incredible amount of permissions that LeakerLocker obtained through them. These apps requested the ability to both read and send messages, manage the device’s calls, and access the contact list. Once approved, LeakerLocker shuts the user out of the device and demands its ransom through the lock screen--and thanks to the access the user had just given the app, it can easily seem that paying the ransom is the only option.

However, there is no way of knowing for sure if LeakerLocker has actually accessed the data it claims to. Having said that, it has been confirmed that the ransomware can access the device’s browsing history, along with text and email messages, the device’s calling history, and yes, camera images.

As we recommend when someone is dealing with any form of ransomware, paying the ransom will almost certainly do you no good. Where’s the guarantee that the hackers haven’t scammed you out of the cost of your data, and that the money you’ve given them won’t finance their next heist?

If you have concerns with keeping your data secured and your business safe from threats like LeakerLocker and the many ransomware variants out there, reach out to us. We can help to make sure your network is as secure as possible, from the software all the way to the employees who use it. Call us at (703) 821-8200 for more information.

Google Instant Is Dead… Did You Notice?
Tip of the Week: The Windows 10 Touch Keyboard Off...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 May 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Hackers Software Business Computing Managed Service Provider Backup Workplace Tips Productivity Data Hardware Business Saving Money Malware Email IT Support Hosted Solutions IT Services Google Network Security Small Business Smartphones Efficiency Quick Tips Gadgets Mobile Devices User Tips Business Continuity Computer Disaster Recovery Mobile Office Virtualization Network Microsoft Office Social Media Android Server VoIP Smartphone Mobile Device Management Innovation Upgrade Windows 10 Miscellaneous Unified Threat Management Ransomware Windows Remote Monitoring Operating System Mobile Computing Passwords Remote Computing Communication Holiday WiFi Vendor Management BYOD Apps Collaboration The Internet of Things Marketing Cybersecurity Facebook History Managed IT services Firewall Apple Users Analytics Data Management communications Productivity IT Support Alert Phishing IT Consultant Data Recovery Automation App Save Money Managed IT Services Outsourced IT Data Backup Internet of Things Bandwidth Bring Your Own Device Health Big data Gmail Spam BDR Content Filtering Mobile Device Office Artificial Intelligence Wireless Technology Managed IT Antivirus Tech Term Search Budget Outlook Hiring/Firing Windows 8 Hard Drives Browser Lithium-ion Battery Best Practice Information Technology Cybercrime Going Green Maintenance Printer Virus Tech Support Help Desk Update Office 365 Phone System Encryption Money Recovery Employer-Employee Relationship Computers IBM Cost Management Hacking Law Enforcement Compliance Administration Risk Management Data storage It Management Save Time Customer Service Two-factor Authentication Training Government Networking Document Management Website Legal Running Cable Proactive IT Hard Drive Saving Time Humor SaaS VPN Intranet Cloud Computing Travel Education Securty Access Control Solid State Drive User Data Security Flexibility Current Events Black Market Business Intelligence Telephone Systems Digital Payment Wireless Laptop Downtime Avoiding Downtime Blockchain Data Loss DDoS Business Growth Comparison Tablet iPhone Company Culture Fax Server Data Breach Regulations Computer Repair Windows 10 Word Social Networking Paperless Office Excel Project Management Mobility Social Engineering Password Cortana Disaster End of Support Augmented Reality Hosted Solution Twitter Robot Hacker PowerPoint Streaming Media IT service Software as a Service How To Processors Uninterrupted Power Supply USB Text Messaging Private Cloud Webcam Presentation Telephony Bluetooth Net Neutrality Applications Bitcoin Data Protection Taxes Virtual Desktop Chrome Specifications Safety Business Technology Distributed Denial of Service Social Co-managed IT Cryptocurrency User Error Documents Google Docs Router Inbound Marketing Patch Management Heating/Cooling Computer Accessories Public Cloud Experience Scam Monitors Storage Cleaning Redundancy Office Tips Pain Points Trending Lifestyle Identity Theft Mouse YouTube Google Maps Retail Virtual Reality eWaste Sports Programming Digital Politics Unified Communications Statistics Settings Network Congestion Customer Relationship Management Emails Value Computing Websites Automobile Start Menu Chromebook Tech Terms Vulnerabilities Computing Infrastructure Hack Gaming Console Mobile Technology Analytic Harddrive Nanotechnology Printer Server Rental Service Computer Care Meetings Competition Recycling Debate Desktop Turn Key Microsoft Excel Electronic Payment Startup Trojan Download Web Server switches Writing GPS Business Cards Google Drive Windows Server 2008 Cabling Business Owner Music Product Reviews Wi-Fi Vulnerability Administrator Upgrades Read Unified Threat Management Backup and Disaster Recovery Organize Spyware Books Mobile Payment Workers IP Address External Harddrive Human Resources Screen Reader Electricity Printing Supercomputer Application LiFi Thin CLient Smart Tech Microchip Device Management 3D Ebay Piracy Machine Learning Windows 7 Worker Deep Learning Content Management Fiber-Optic Database cache Reading Television Samsung Work/Life Balance Business Managemenet Smart Phones HTML Conferencing Webinar WannaCry Downloads Employer Employee Relationship Digital Signature Visible Light Communication Memory Mobile Security G Suite Leadership Multi-Factor Security Corporate Profile Hacks Physical Security Teamwork IT consulting online Currency Adminstration Pirating Information Software License Time Management Freedom of Information Licensing Entertainment Devices Banking Botnet Fraud Tactics Assessment Relocation SharePoint Tablets Sync Tip of the week PDF CIO Monitoring File Sharing Google Calendar Advertising Flash LinkedIn UTM Legislation VoIP Notifications CCTV Best Available Keyboard Windows XP IT Plan Touchscreen News Staffing Google Wallet Accountants Best Practives Business Metrics Knowledge Computer Malfunction Displays Archive email scam Addiction Consultation Reliable Computing Evernote Domains Society Skype In Internet of Things Virtual Assistant Micrsooft Upselling Management Technology Tips Public Speaking Multi-factor Authentication Point of Contact Wireless Headphones Audit Shortcut Video Surveillance Migration Microserver Fake News Drones Equifax Motion Sickness Entrepreneur Scalability Data Warehousing Troubleshooting Saving ZTime Emergency Hard Drive Disposal Environment Healthcare Access Messenger Tracking HIPAA Permissions Language Device security Get More Done Productuvuty 3D Printing CrashOverride Capital

toner1.7