Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

LeakerLocker Takes Exposure to New Heights By Sharing Your Mobile Browser History


Ransomware, the malware that locks down its victim’s files until they pay up, has always been a frustrating issue to deal with. However, a recent mobile ransomware will make the issue a little more personal… by sharing the victim’s mobile browsing history.

This introduces an important question: how much is it worth to you for your browsing history to kept secret? According to LeakerLocker, the answer is $50. This Android malware will steal the user’s browsing history, along with photos and videos from the device, any Facebook messages, and the user’s location history, all along with other sensitive information the mobile device has access to.

Admittedly, considering what many may have on their phones that they don’t want others to see, LeakerLocker utilizes a potent motivation: the fear of embarrassment. Think to yourself for a moment--do you have anything on your phone that you’d rather not anyone else know about?

LeakerLocker asks, is $50 enough to keep your secrets hidden from view?

Unlike many examples of ransomware, the researchers at McAfee have discovered that LeakerLocker seems not to encrypt any data. Rather, the ransomware allegedly takes a backup of all information on the infected device, which is then used to blackmail the owner into paying up.

This ransomware was spread via two Google Play Store apps, Wallpapers Blur HD and Booster & Channel Cleaner Pro. These fraudulent applications have since been removed. A major red flag for these apps were the incredible amount of permissions that LeakerLocker obtained through them. These apps requested the ability to both read and send messages, manage the device’s calls, and access the contact list. Once approved, LeakerLocker shuts the user out of the device and demands its ransom through the lock screen--and thanks to the access the user had just given the app, it can easily seem that paying the ransom is the only option.

However, there is no way of knowing for sure if LeakerLocker has actually accessed the data it claims to. Having said that, it has been confirmed that the ransomware can access the device’s browsing history, along with text and email messages, the device’s calling history, and yes, camera images.

As we recommend when someone is dealing with any form of ransomware, paying the ransom will almost certainly do you no good. Where’s the guarantee that the hackers haven’t scammed you out of the cost of your data, and that the money you’ve given them won’t finance their next heist?

If you have concerns with keeping your data secured and your business safe from threats like LeakerLocker and the many ransomware variants out there, reach out to us. We can help to make sure your network is as secure as possible, from the software all the way to the employees who use it. Call us at (703) 821-8200 for more information.

Google Instant Is Dead… Did You Notice?
Tip of the Week: The Windows 10 Touch Keyboard Off...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 19 November 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Managed Service Provider Workplace Tips Productivity Business Computing Backup Hackers Data Saving Money Hardware Business Malware IT Support Email IT Services Hosted Solutions Google Efficiency Quick Tips Smartphones Small Business Gadgets Business Continuity Mobile Devices Computer User Tips Mobile Office Disaster Recovery Virtualization Network Network Security Server Microsoft Office VoIP Social Media Windows 10 Miscellaneous Upgrade Unified Threat Management Mobile Device Management Windows Smartphone Android Ransomware Operating System Remote Computing Passwords Innovation WiFi Vendor Management BYOD Communication Remote Monitoring Holiday Mobile Computing Marketing Apps The Internet of Things History Collaboration Firewall Managed IT services Facebook Users Data Management Apple Analytics IT Support Outsourced IT Save Money Alert IT Consultant Health Office Phishing Managed IT Services Automation Productivity Big data Content Filtering Bring Your Own Device Wireless Technology Search Hiring/Firing Outlook Lithium-ion Battery Browser Hard Drives Virus Managed IT App communications Artificial Intelligence Budget Best Practice Windows 8 BDR Spam Going Green Tech Support Cybersecurity Encryption Update Gmail Recovery Employer-Employee Relationship Maintenance Help Desk Antivirus Phone System Information Technology IBM Data Backup Printer Internet of Things Saving Time Save Time It Management Money Running Cable Government Administration Proactive IT Law Enforcement Computers Data storage Legal Customer Service Travel Education SaaS Mobile Device Document Management Humor Bandwidth Hacking Avoiding Downtime Intranet Office 365 Black Market Hard Drive User Current Events Mobility Networking DDoS Telephone Systems Digital Payment Windows 10 Training Disaster Word PowerPoint Risk Management Social Networking Password Securty Cost Management VPN Solid State Drive Hacker Twitter Data Recovery Flexibility Tablet Two-factor Authentication iPhone Wireless Business Intelligence Fax Server Website Hosted Solution Computer Repair Statistics Compliance Public Cloud Pain Points Streaming Media Inbound Marketing Excel Safety User Error Business Growth Automobile Telephony Social Monitors Scam Chrome Network Congestion YouTube How To Gaming Console Router Settings Computer Accessories Unified Communications Webcam Cybercrime Comparison Customer Relationship Management Start Menu End of Support Augmented Reality Taxes Cortana Software as a Service Uninterrupted Power Supply Politics Access Control Text Messaging Processors Downtime USB Presentation Google Docs Patch Management Company Culture Laptop Google Maps Co-managed IT Virtual Desktop Net Neutrality Documents Office Tips Programming Cloud Computing Hack Heating/Cooling Paperless Office Lifestyle Project Management Sports Computing Trending Retail Experience Robot IT service Smart Phones Virtual Reality Get More Done Troubleshooting Music Google Drive Employer Employee Relationship Licensing Staffing Social Engineering Printer Server Point of Contact Environment Upgrades Bluetooth Printing LiFi Electricity Botnet Competition Computing Infrastructure Business Owner Thin CLient Rental Service Deep Learning Business Technology Memory Downloads Visible Light Communication WannaCry Computer Malfunction Application Wi-Fi Specifications Time Management Leadership Upselling Webinar Flash Google Calendar Device Management Digital Signature Advertising Motion Sickness Entertainment Google Wallet Touchscreen Tracking Displays Knowledge Technology Tips Digital Web Server online Currency Banking Best Practives Drones Websites Analytic Workers File Sharing Tech Terms Language Mouse Permissions Access Microserver Public Speaking Business Metrics Samsung switches GPS G Suite Entrepreneur Writing HIPAA Spyware Business Managemenet Physical Security Turn Key Chromebook Trojan Electronic Payment Tablets Data Protection 3D Sync Messenger Organize Data Security Ebay IP Address Work/Life Balance Recycling Cryptocurrency cache CCTV Mobile Technology Human Resources Download IT consulting Corporate Profile Adminstration In Internet of Things Books Data Loss Pirating Information Cleaning Assessment Skype Emails Mobile Payment Scalability Microchip Redundancy CIO Teamwork Windows XP VoIP Reading Content Management Regulations Data Breach Storage Society Consultation Meetings Private Cloud Harddrive Hacks PDF Micrsooft Cabling Video Surveillance Best Available Administrator Relocation Keyboard Audit External Harddrive LinkedIn Domains Identity Theft Saving ZTime Product Reviews Supercomputer Machine Learning Notifications eWaste Emergency Read Worker Computer Care Debate Value Distributed Denial of Service Reliable Computing Archive Shortcut Vulnerability CrashOverride 3D Printing Television Capital Productuvuty

hp supplies medallionLarge2017