Would You Share Your Browser History? This Ransomware Will

mobile_ransomware_400

Ransomware is a tricky piece of malware that locks down the precious files located on a victim’s computer, then (in theory) will return access to them when a ransom has been paid. Depending on the files stored on a victim’s computer, they might simply blow it off and not worry too much about losing access to a couple of pictures or videos--but what if this ransomware threatened to expose your web browsing history?

Would you pay money to keep your browsing history secret? This is the key point behind a new ransomware called LeakerLocker. LeakerLocker, an Android-exclusive variant of ransomware, attempts to extort money from its victims by threatening them with their mobile device’s browser history. It seems like a simple choice to make; $50 to keep your browsing history private. Other information claimed to be stolen includes photos, videos, Facebook messages, location history, and other sensitive information.

In essence, this ransomware uses the fear of embarrassment to get its victims to fork over some cash.

Discovered by researchers at McAfee, LeakerLocker doesn’t appear to actually encrypt any information found on the device, making it the exception to the typical ransomware variant. Instead, LeakerLocker claims that it has taken a backup of the data on the device, which it will then proceed to threaten the user with. Users have contracted this ransomware by downloading two apps on the Google Play Store, which have both been removed since: Wallpapers Blur HD and Booster & Cleaner Pro.

LeakerLocker asks for an incredible amount of permissions on your device, including the ability to read and send messages, manage calls, and access contacts. It then locks down the device and places a ransom message on the lock screen. Since users will grant LeakerLocker permissions at the time of downloading, it gains access to information which it uses to convince victims that they must pay the ransom. Whether or not is has stolen all of the information it claims to is another story altogether, but it’s been found that the ransomware can access information like email addresses, browser history, text messages, calling history, and even pictures from the camera.

As is the case with ordinary ransomware, it’s best to not pay the ransom. After all, any money that’s sent to hackers who have locked down your device is funding their next campaign--something that you don’t want on your conscience. Furthermore, there is no guarantee that you’ll even get your data back, so there is no reason to assume you can.

For more information on how to stay safe online, be it on a desktop or a mobile device, reach out to Haber Group at 866.625.3560. We can help your organization implement solutions that minimize the risk of running into malicious applications.

Give Your Server Units Some TLC
Tip of the Week: Touch Keyboard Capabilities in Al...
 

Comments

Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Hackers Privacy Malware Business Internet Business Computing Microsoft Hosted Solutions Computer Software Windows 10 Ransomware Network Security Google Backup Smartphone User Tips Android Mobile Devices IT Services Hardware Small Business Data Management Tech Term Browser Managed IT Services Gmail Productivity Windows Business Continuity Data Internet of Things Facebook Server App Cloud Computing Saving Money Word Artificial Intelligence Cybersecurity Office 365 Data Recovery Business Management Smartphones IT Support Disaster Recovery Remote Monitoring Managed Service Provider Efficiency Encryption Upgrade Phishing Social Media Chrome Data Backup Workplace Tips Tip of the week Big Data Government Infrastructure Innovation Outsourced IT Microsoft Office Spam Windows 10 Productivity Office Tips IT Support Settings Two-factor Authentication Vulnerability Applications Antivirus Content Filtering Robot Bandwidth Money Employer-Employee Relationship YouTube Firewall communications Miscellaneous Passwords Risk Management WiFi Avoiding Downtime Communication The Internet of Things Managed IT Services VoIP IT Management Apple Customer Service Analytics Data storage Virtual Reality Hacker Tablet Apps Outlook Monitors Paperless Office Hosted Solution SaaS Mobile Security Hacking VPN Printing Automation Data Security End of Support Unified Threat Management Search Data loss Business Technology Holiday Virtual Private Network Computing IBM Presentation Wireless Password Google Drive Server Management Administration Office Mouse Vendor Management BYOD Save Money Customer Relationship Management Wireless Technology Wi-Fi Recovery LiFi Telephone Systems Storage Augmented Reality Maintenance Website Mobile Device HIPAA Network Scam Safety Alt Codes Dark Data Fraud Internet Exlporer Fun Corporate Profile Drones Training Comparison Work Title II Connectivity Downtime Voice over Internet Protocol Solid State Drive Going Green Social Engineering SharePoint VoIP Automobile Business Intelligence Social Licensing Refrigeration How To Networking Managed IT Service Modem Scary Stories User Typing Value WannaCry Specifications Compliance IP Address Cybercrime Public Speaking Optimization IT service Heating/Cooling Online IoT Hard Disk Drive Downloads IT Technicians Competition Time Management Deep Learning Humor Sports Cabling Hacks Remote Computing Cooperation Knowledge Firefox Operating System Break Fix Cookies Cryptocurrency Hotspot Professional Services Education Budget Black Friday Regulations Mobile Office Recycling BDR Servers sip Microsoft Excel Star Wars How To Multi-Factor Security Mirgation Network Management Bring Your Own Device Managed IT Staff Experience Unified Communications Undo Techology Digital Payment Dark Web Nanotechnology Bitcoin Chromebook Network Congestion Language USB Marketing Digital Lenovo Politics Cyber Monday Social Networking Mobile Device Management Running Cable eWaste Google Maps Best Practice telephony Collaboration Blockchain Cost Management Gadgets Virtual Desktop Application Mail Merge Information Technology Google Calendar Chatbots Touchscreen Buisness Cables Disaster Shortcut Writing Printer Wearable Technology Virtualization Unified Threat Management Google Docs Net Neutrality Screen Reader Continuity Statistics Windows 8 Computers Computing Infrastructure Dongle IT solutions Spyware Superfish Tech Support Document Management Smart Technology Motherboard Lithium-ion battery Laptop Business Growth File Sharing Permissions Assessment Users Address Google Wallet Computer Care Legislation Identity Smart Office 5G Wires Uninterrupted Power Supply Patch Management Current Events Samsung Retail Access Control Quick Tips User Error FCC Smart Tech Solar Bluetooth Display Alerts Service Level Agreement Cortana Hard Drives Legal Websites Identity Theft Distributed Denial of Service Router Halloween Travel Law Enforcement 3D Printing Domains Notifications G Suite Twitter Botnet Supercomputer Motion Sickness Emergency Gadget Unsupported Software Staffing Administrator FinTech Crowdsourcing Taxes Personal Information Company Culture Web Server Machine Learning IT Budget Update Mobile Data GPS Computer Repair IT Consultant Managing Stress Processors Cameras Relocation Meetings Tracking Health Cleaning Mobile Computing Alert CCTV Private Cloud Emoji Webcam Physical Security Electronic Medical Records Work/Life Balance Upgrades Error Black Market Point of Sale CrashOverride