Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

LeakerLocker Takes Exposure to New Heights By Sharing Your Mobile Browser History


Ransomware, the malware that locks down its victim’s files until they pay up, has always been a frustrating issue to deal with. However, a recent mobile ransomware will make the issue a little more personal… by sharing the victim’s mobile browsing history.

This introduces an important question: how much is it worth to you for your browsing history to kept secret? According to LeakerLocker, the answer is $50. This Android malware will steal the user’s browsing history, along with photos and videos from the device, any Facebook messages, and the user’s location history, all along with other sensitive information the mobile device has access to.

Admittedly, considering what many may have on their phones that they don’t want others to see, LeakerLocker utilizes a potent motivation: the fear of embarrassment. Think to yourself for a moment--do you have anything on your phone that you’d rather not anyone else know about?

LeakerLocker asks, is $50 enough to keep your secrets hidden from view?

Unlike many examples of ransomware, the researchers at McAfee have discovered that LeakerLocker seems not to encrypt any data. Rather, the ransomware allegedly takes a backup of all information on the infected device, which is then used to blackmail the owner into paying up.

This ransomware was spread via two Google Play Store apps, Wallpapers Blur HD and Booster & Channel Cleaner Pro. These fraudulent applications have since been removed. A major red flag for these apps were the incredible amount of permissions that LeakerLocker obtained through them. These apps requested the ability to both read and send messages, manage the device’s calls, and access the contact list. Once approved, LeakerLocker shuts the user out of the device and demands its ransom through the lock screen--and thanks to the access the user had just given the app, it can easily seem that paying the ransom is the only option.

However, there is no way of knowing for sure if LeakerLocker has actually accessed the data it claims to. Having said that, it has been confirmed that the ransomware can access the device’s browsing history, along with text and email messages, the device’s calling history, and yes, camera images.

As we recommend when someone is dealing with any form of ransomware, paying the ransom will almost certainly do you no good. Where’s the guarantee that the hackers haven’t scammed you out of the cost of your data, and that the money you’ve given them won’t finance their next heist?

If you have concerns with keeping your data secured and your business safe from threats like LeakerLocker and the many ransomware variants out there, reach out to us. We can help to make sure your network is as secure as possible, from the software all the way to the employees who use it. Call us at (703) 821-8200 for more information.

Google Instant Is Dead… Did You Notice?
Tip of the Week: The Windows 10 Touch Keyboard Off...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 20 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Hackers Managed Service Provider Business Computing Workplace Tips Productivity Backup Data Hardware Saving Money Business Malware Email IT Support IT Services Hosted Solutions Google Efficiency Quick Tips Smartphones Small Business Gadgets Network Security User Tips Mobile Devices Business Continuity Disaster Recovery Mobile Office Computer Network Virtualization Microsoft Office Server VoIP Social Media Windows 10 Mobile Device Management Miscellaneous Upgrade Unified Threat Management Android Windows Ransomware Smartphone Holiday Operating System Remote Computing Passwords Innovation WiFi Mobile Computing Vendor Management BYOD Remote Monitoring Communication Collaboration Marketing The Internet of Things Apps Facebook Users History Firewall Managed IT services Analytics IT Support Apple Alert Data Management Cybersecurity Save Money Managed IT Services Outsourced IT IT Consultant Phishing Gmail Office Health Big data Productivity App Content Filtering Bring Your Own Device Automation Search Tech Support Browser Lithium-ion Battery communications Hard Drives Outlook Budget Virus Artificial Intelligence Best Practice Spam Going Green BDR Managed IT Windows 8 Hiring/Firing Wireless Technology Printer Recovery Update Employer-Employee Relationship Internet of Things Bandwidth Cost Management Encryption Help Desk Maintenance Antivirus Phone System Information Technology IBM Mobile Device Money Office 365 Data Backup Government It Management Hard Drive SaaS Risk Management Proactive IT Computers Networking Customer Service Administration Travel Education Law Enforcement Save Time Document Management Data storage Running Cable Saving Time Legal Humor Intranet DDoS Avoiding Downtime Word Hosted Solution Robot Mobility Password Digital Payment Current Events Cortana Excel Hacker Windows 10 Comparison Black Market Tablet PowerPoint Social Networking Business Growth VPN Two-factor Authentication Twitter Wireless Telephone Systems Website Data Recovery Training Disaster End of Support iPhone Business Intelligence Securty Hacking Solid State Drive Flexibility Project Management Computer Repair Fax Server User Office Tips Network Congestion Public Cloud Streaming Media Paperless Office Inbound Marketing Sports Computing Cybercrime Chrome Pain Points IT service Automobile Scam Router User Error Compliance Social Engineering Computer Accessories Downtime How To Customer Relationship Management Processors Digital USB Computing Infrastructure Augmented Reality Presentation Gaming Console Mouse Start Menu Company Culture Virtual Desktop Webcam Taxes Text Messaging Monitors Software as a Service Telephony Access Control Documents Uninterrupted Power Supply Programming Heating/Cooling YouTube Data Security Settings Unified Communications Google Maps Patch Management Net Neutrality Retail eWaste Experience Cloud Computing Co-managed IT Politics Hack Trending Bitcoin Cryptocurrency Lifestyle Google Docs Laptop Statistics Safety Specifications Social Distributed Denial of Service CIO Google Drive Digital Signature Microchip Employer Employee Relationship Entertainment Reading SharePoint Licensing Regulations Thin CLient Windows XP Vulnerability Printing Tip of the week Electricity Smart Phones Botnet Society Get More Done Micrsooft Printer Server Hacks Relocation Evernote Analytic Leadership Business Technology Downloads Virtual Assistant WannaCry Identity Theft Computer Malfunction Public Speaking Time Management Notifications Device Management Reliable Computing Data Warehousing Google Calendar Entrepreneur Hard Drive Disposal Virtual Reality Motion Sickness Music Business Managemenet Upgrades Webinar Touchscreen online Currency HIPAA Upselling Tracking Electronic Payment Windows Server 2008 Bluetooth LiFi Knowledge Technology Tips Unified Threat Management Web Server Deep Learning IP Address Websites Rental Service Workers Windows 7 Memory Visible Light Communication Human Resources Tech Terms Fiber-Optic Access Wi-Fi Best Practives GPS Skype Samsung Freedom of Information Flash Microserver G Suite Advertising 3D Fraud Spyware Teamwork Physical Security Ebay Google Wallet Tablets Recycling Displays Storage PDF News Data Protection Turn Key Sync Adminstration Keyboard email scam cache Best Available Banking CCTV Pirating Information Drones Trojan Product Reviews Organize Domains File Sharing Data Loss Fake News Corporate Profile Read Language In Internet of Things Permissions Shortcut Vulnerabilities Assessment Content Management Value Business Metrics Emails Mobile Technology Writing Scalability switches Redundancy Troubleshooting Data Breach Environment Microsoft Excel VoIP Staffing Competition Business Cards Consultation Chromebook Meetings Video Surveillance Messenger Mobile Payment Cabling Private Cloud Saving ZTime LinkedIn Business Owner Audit Work/Life Balance Administrator Application Archive Download Harddrive Supercomputer Debate Books Television Worker Machine Learning IT consulting Emergency Computer Care Blockchain Point of Contact External Harddrive Cleaning Software License CrashOverride Capital Piracy 3D Printing Productuvuty

hp supplies medallionLarge2017