Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Would You Share Your Browser History? This Ransomware Will

Ransomware is a tricky piece of malware that locks down the precious files located on a victim’s computer, then (in theory) will return access to them when a ransom has been paid. Depending on the files stored on a victim’s computer, they might simply blow it off and not worry too much about losing access to a couple of pictures or videos--but what if this ransomware threatened to expose your web browsing history?

Would you pay money to keep your browsing history secret? This is the key point behind a new ransomware called LeakerLocker. LeakerLocker, an Android-exclusive variant of ransomware, attempts to extort money from its victims by threatening them with their mobile device’s browser history. It seems like a simple choice to make; $50 to keep your browsing history private. Other information claimed to be stolen includes photos, videos, Facebook messages, location history, and other sensitive information.

In essence, this ransomware uses the fear of embarrassment to get its victims to fork over some cash.

Discovered by researchers at McAfee, LeakerLocker doesn’t appear to actually encrypt any information found on the device, making it the exception to the typical ransomware variant. Instead, LeakerLocker claims that it has taken a backup of the data on the device, which it will then proceed to threaten the user with. Users have contracted this ransomware by downloading two apps on the Google Play Store, which have both been removed since: Wallpapers Blur HD and Booster & Cleaner Pro.

LeakerLocker asks for an incredible amount of permissions on your device, including the ability to read and send messages, manage calls, and access contacts. It then locks down the device and places a ransom message on the lock screen. Since users will grant LeakerLocker permissions at the time of downloading, it gains access to information which it uses to convince victims that they must pay the ransom. Whether or not is has stolen all of the information it claims to is another story altogether, but it’s been found that the ransomware can access information like email addresses, browser history, text messages, calling history, and even pictures from the camera.

As is the case with ordinary ransomware, it’s best to not pay the ransom. After all, any money that’s sent to hackers who have locked down your device is funding their next campaign--something that you don’t want on your conscience. Furthermore, there is no guarantee that you’ll even get your data back, so there is no reason to assume you can.

For more information on how to stay safe online, be it on a desktop or a mobile device, reach out to Haber Group at 866.625.3560. We can help your organization implement solutions that minimize the risk of running into malicious applications.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 24 September 2017

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Cloud Best Practices Email Hackers Privacy Technology Malware Business Hosted Solutions Windows 10 Computer Internet Business Computing Microsoft Backup Software Ransomware Hardware Google IT Services Productivity Windows Smartphone Data Mobile Devices Business Continuity Gmail App Phishing Network Security User Tips Data Management Facebook Upgrade Saving Money IT Support Small Business Internet of Things Microsoft Office Big Data Word Cloud Computing Android Efficiency Office Tips Smartphones Workplace Tips Data storage Disaster Recovery WiFi Managed Service Provider Browser Remote Monitoring Spam Miscellaneous Apple Settings Social Media Content Filtering Managed IT Services Customer Service Robot Data Recovery Innovation Server Office 365 Analytics Unified Threat Management Tip of the week Monitors Employer-Employee Relationship Outlook Artificial Intelligence Money Search Outsourced IT Safety The Internet of Things Administration VoIP Mobile Device IT Support Password Managed IT Services Encryption IT Management Telephone Systems IBM Network Wireless Apps Customer Relationship Management Hosted Solution Hacking YouTube Firewall Cybersecurity communications Passwords Printing End of Support Presentation Risk Management Hacker Avoiding Downtime Office Wireless Technology Productivity Google Drive Save Money Recovery LiFi SaaS Windows 10 Chrome Patch Management Uninterrupted Power Supply Mobile Device Management Refrigeration Scary Stories Drones Tablet Public Speaking Bandwidth Digital Payment Vulnerability Solid State Drive Lithium-ion battery Social Sports How To Augmented Reality Heating/Cooling IT service Automation Education VPN Humor Hard Disk Drive Deep Learning Hacks Undo Firefox Fun Servers Budget BDR Communication Computer Care Gadgets Virtual Private Network sip Vendor Management Bring Your Own Device Application Virtualization Buisness Server Management Mouse Google Maps Writing IT solutions Training Users Mail Merge Automobile telephony Best Practice Statistics Retail Cortana Address Storage Maintenance Business Growth Current Events Downtime Quick Tips Bluetooth Legal Social Engineering User Cybercrime Data Backup Dark Data Corporate Profile Wi-Fi Alt Codes Going Green Competition VoIP Antivirus Politics Knowledge Collaboration WannaCry 5G Typing Time Management Operating System Cabling How To Unified Communications Experience Running Cable Marketing Business Technology File Sharing Data loss Two-factor Authentication Cryptocurrency Network Management Samsung Computing Network Congestion Virtual Desktop Managed IT Websites Infrastructure IP Address Laptop Lenovo Digital Virtual Reality Bitcoin Touchscreen Information Technology Computers Website Shortcut Google Docs Disaster Mobile Office Windows 8 Hard Drives Halloween Superfish Spyware Google Wallet Display IT Budget Machine Learning 3D Printing CrashOverride Update Government IT Consultant Relocation Unsupported Software Meetings Chromebook BYOD Cleaning Private Cloud Mobile Data Webcam Emoji Work/Life Balance Error Point of Sale Black Market Law Enforcement Physical Security Mobile Computing Paperless Office Twitter Staffing Gadget Administrator Personal Information Remote Computing Web Server GPS Holiday Business Management Computer Repair Processors Cameras Tracking Emergency Health Alert CCTV Document Management Tech Support Electronic Medical Records Identity Theft Travel Notifications G Suite Supercomputer Botnet Upgrades Motion Sickness Crowdsourcing Domains Taxes