Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Would You Share Your Browser History? This Ransomware Will


Ransomware is a tricky piece of malware that locks down the precious files located on a victim’s computer, then (in theory) will return access to them when a ransom has been paid. Depending on the files stored on a victim’s computer, they might simply blow it off and not worry too much about losing access to a couple of pictures or videos--but what if this ransomware threatened to expose your web browsing history?

Would you pay money to keep your browsing history secret? This is the key point behind a new ransomware called LeakerLocker. LeakerLocker, an Android-exclusive variant of ransomware, attempts to extort money from its victims by threatening them with their mobile device’s browser history. It seems like a simple choice to make; $50 to keep your browsing history private. Other information claimed to be stolen includes photos, videos, Facebook messages, location history, and other sensitive information.

In essence, this ransomware uses the fear of embarrassment to get its victims to fork over some cash.

Discovered by researchers at McAfee, LeakerLocker doesn’t appear to actually encrypt any information found on the device, making it the exception to the typical ransomware variant. Instead, LeakerLocker claims that it has taken a backup of the data on the device, which it will then proceed to threaten the user with. Users have contracted this ransomware by downloading two apps on the Google Play Store, which have both been removed since: Wallpapers Blur HD and Booster & Cleaner Pro.

LeakerLocker asks for an incredible amount of permissions on your device, including the ability to read and send messages, manage calls, and access contacts. It then locks down the device and places a ransom message on the lock screen. Since users will grant LeakerLocker permissions at the time of downloading, it gains access to information which it uses to convince victims that they must pay the ransom. Whether or not is has stolen all of the information it claims to is another story altogether, but it’s been found that the ransomware can access information like email addresses, browser history, text messages, calling history, and even pictures from the camera.

As is the case with ordinary ransomware, it’s best to not pay the ransom. After all, any money that’s sent to hackers who have locked down your device is funding their next campaign--something that you don’t want on your conscience. Furthermore, there is no guarantee that you’ll even get your data back, so there is no reason to assume you can.

For more information on how to stay safe online, be it on a desktop or a mobile device, reach out to Haber Group at 866.625.3560. We can help your organization implement solutions that minimize the risk of running into malicious applications.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 18 February 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Hackers Technology Privacy Malware Email Business Internet Hosted Solutions Business Computing Microsoft Computer Software Windows 10 Android Ransomware Backup IT Services Small Business Network Security Google Smartphone Windows User Tips Productivity Hardware Mobile Devices Browser Data Management Gmail Data Phishing Efficiency Business Continuity Facebook Office 365 Internet of Things Upgrade Saving Money Smartphones App Encryption Tip of the week Microsoft Office Big Data Managed IT Services Word Remote Monitoring Innovation Office Tips IT Support Cloud Computing Artificial Intelligence Data Recovery Managed Service Provider Workplace Tips Outsourced IT WiFi Content Filtering Spam Robot Miscellaneous Risk Management Business Management IT Support Social Media Firewall Productivity Customer Service Chrome Data storage Two-factor Authentication Antivirus Cybersecurity Money Server Disaster Recovery Government Employer-Employee Relationship Apple Settings Windows 10 Safety Hosted Solution Scam The Internet of Things Tablet YouTube Vulnerability communications Holiday Printing Data Security IBM Computing Wireless Virtual Private Network Google Drive End of Support Apps Customer Relationship Management Managed IT Services Wi-Fi Hacking IT Management LiFi Save Money Telephone Systems Maintenance Virtual Reality Passwords Analytics Presentation Hacker Avoiding Downtime SaaS Bandwidth Office Data Backup Outlook Wireless Technology Recovery Unified Threat Management Search Monitors Administration Business Technology HIPAA VoIP Automation Password Infrastructure Mouse Communication Mobile Device Mobile Security Augmented Reality Network Current Events Downtime Dark Web Patch Management Hotspot Automobile Uninterrupted Power Supply Paperless Office Legal Fun Undo Cybercrime Google Calendar Dark Data Alt Codes Retail Going Green Net Neutrality Application Language Gadgets Solid State Drive How To Virtualization Knowledge Networking Legislation Heating/Cooling IT service Typing Social Engineering FCC VPN Computing Infrastructure Users Hard Disk Drive Firefox Operating System Unified Communications Experience Running Cable Comparison Servers Politics BDR Cryptocurrency Virtual Desktop Title II Alerts Collaboration Techology Laptop Specifications User Document Management Server Management Tech Support Google Maps Bitcoin How To File Sharing Information Technology Online Mail Merge Licensing Unified Threat Management Google Docs Samsung Network Congestion Competition Windows 8 Halloween Black Friday Statistics Websites Google Wallet 5G Microsoft Excel Address Cooperation User Error Quick Tips Computers Scary Stories Cyber Monday Bluetooth Corporate Profile Drones Blockchain Staff Marketing Printer VoIP Display Social IP Address Sports Smart Technology WannaCry Education Permissions Wearable Technology Website Access Control Time Management Humor Deep Learning Hacks Mobile Office Distributed Denial of Service Digital Payment Cabling Data loss Budget Hard Drives SharePoint Network Management sip BYOD Bring Your Own Device Mobile Device Management Buisness Managed IT Service Managed IT Fraud Digital IT solutions Refrigeration Lenovo Applications Public Speaking Downloads Computer Care Touchscreen telephony Best Practice Vendor Management Lithium-ion battery Break Fix Shortcut Disaster Spyware Cortana Superfish IT Technicians Multi-Factor Security Training Storage Business Growth Writing Physical Security CrashOverride Twitter Mirgation Staffing Gadget Personal Information Administrator Web Server Remote Computing GPS Computer Repair Cameras Processors Tracking Health CCTV Alert Electronic Medical Records Identity Theft Travel G Suite Notifications Upgrades Supercomputer Botnet Motion Sickness Taxes Crowdsourcing 3D Printing IT Budget Machine Learning Update Emergency IT Consultant Unsupported Software Relocation Meetings Chromebook Domains Cleaning Mobile Data Private Cloud Webcam Emoji Work/Life Balance Mobile Computing Error Point of Sale Black Market Law Enforcement