Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Would You Share Your Browser History? This Ransomware Will

Ransomware is a tricky piece of malware that locks down the precious files located on a victim’s computer, then (in theory) will return access to them when a ransom has been paid. Depending on the files stored on a victim’s computer, they might simply blow it off and not worry too much about losing access to a couple of pictures or videos--but what if this ransomware threatened to expose your web browsing history?

Would you pay money to keep your browsing history secret? This is the key point behind a new ransomware called LeakerLocker. LeakerLocker, an Android-exclusive variant of ransomware, attempts to extort money from its victims by threatening them with their mobile device’s browser history. It seems like a simple choice to make; $50 to keep your browsing history private. Other information claimed to be stolen includes photos, videos, Facebook messages, location history, and other sensitive information.

In essence, this ransomware uses the fear of embarrassment to get its victims to fork over some cash.

Discovered by researchers at McAfee, LeakerLocker doesn’t appear to actually encrypt any information found on the device, making it the exception to the typical ransomware variant. Instead, LeakerLocker claims that it has taken a backup of the data on the device, which it will then proceed to threaten the user with. Users have contracted this ransomware by downloading two apps on the Google Play Store, which have both been removed since: Wallpapers Blur HD and Booster & Cleaner Pro.

LeakerLocker asks for an incredible amount of permissions on your device, including the ability to read and send messages, manage calls, and access contacts. It then locks down the device and places a ransom message on the lock screen. Since users will grant LeakerLocker permissions at the time of downloading, it gains access to information which it uses to convince victims that they must pay the ransom. Whether or not is has stolen all of the information it claims to is another story altogether, but it’s been found that the ransomware can access information like email addresses, browser history, text messages, calling history, and even pictures from the camera.

As is the case with ordinary ransomware, it’s best to not pay the ransom. After all, any money that’s sent to hackers who have locked down your device is funding their next campaign--something that you don’t want on your conscience. Furthermore, there is no guarantee that you’ll even get your data back, so there is no reason to assume you can.

For more information on how to stay safe online, be it on a desktop or a mobile device, reach out to Haber Group at 866.625.3560. We can help your organization implement solutions that minimize the risk of running into malicious applications.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 23 November 2017

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Hackers Technology Email Malware Business Microsoft Hosted Solutions Computer Business Computing Internet Windows 10 Backup Ransomware Software IT Services Windows Google User Tips Productivity Hardware Network Security Smartphone Data Management Android Data Small Business Phishing Business Continuity Facebook App Upgrade Smartphones Saving Money Mobile Devices Gmail Browser Microsoft Office Office Tips Big Data Managed IT Services Cloud Computing IT Support Word Internet of Things Office 365 Tip of the week Workplace Tips Remote Monitoring Efficiency Spam Miscellaneous Data storage Social Media Cybersecurity Productivity Artificial Intelligence Data Recovery Disaster Recovery Customer Service Managed Service Provider Server Apple Settings Outsourced IT Content Filtering Employer-Employee Relationship Robot Risk Management IT Support WiFi Innovation Telephone Systems LiFi Maintenance Chrome Analytics End of Support IBM Wireless Antivirus Apps Outlook Customer Relationship Management Hacking Save Money Money Search Firewall Passwords SaaS Administration Presentation Hacker Avoiding Downtime VoIP Two-factor Authentication Office Password Mouse Wireless Technology Unified Threat Management Recovery Monitors Encryption Windows 10 Network Tablet Hosted Solution YouTube Mobile Device communications Printing Virtual Private Network Safety Computing Google Drive Managed IT Services The Internet of Things IT Management Information Technology Black Friday Statistics Virtualization Google Docs Address Halloween Quick Tips Politics Users Windows 8 User Error Google Wallet Cyber Monday Bluetooth Collaboration Data Backup Corporate Profile Scary Stories VoIP Printer How To Drones Bandwidth File Sharing User Samsung Network Congestion WannaCry Sports Time Management Wi-Fi Websites Social Access Control Virtual Reality Education Cabling Competition Humor Deep Learning Business Technology Computers Data loss Network Management 5G Hacks SharePoint Budget Managed IT Infrastructure sip Bring Your Own Device Lenovo Display Digital Buisness Touchscreen Marketing Downloads IT solutions Shortcut Disaster IP Address telephony Government Best Practice Superfish Spyware Digital Payment Multi-Factor Security Patch Management Cortana Uninterrupted Power Supply Website Mobile Office Storage BYOD Business Growth Scam Automation Google Calendar Downtime Hard Drives Current Events Legal Vulnerability Solid State Drive How To Mobile Device Management Computer Care Dark Data Alt Codes Networking Communication Cybercrime Going Green Legislation Vendor Management Heating/Cooling IT service Refrigeration VPN Knowledge Hard Disk Drive Public Speaking Firefox Lithium-ion battery Training Typing Data Security Writing Comparison Servers Augmented Reality BDR Automobile Operating System Unified Communications Experience Running Cable Cryptocurrency Techology Retail Specifications Virtual Desktop Server Management Fun Google Maps Undo Mail Merge Laptop Application Gadgets Bitcoin Unified Threat Management Social Engineering Computer Repair Business Management Cameras Processors Tracking Health CCTV Alert Document Management Tech Support Electronic Medical Records Emergency Identity Theft Travel G Suite Notifications Supercomputer Botnet Upgrades Motion Sickness Taxes Crowdsourcing IT Budget Machine Learning 3D Printing Update IT Consultant Relocation Mobile Computing Unsupported Software Meetings Chromebook Cleaning CrashOverride Mobile Data Private Cloud Webcam Emoji Domains Work/Life Balance Error Point of Sale Black Market Law Enforcement Physical Security Paperless Office Twitter Staffing Gadget Personal Information Administrator Web Server Remote Computing GPS Holiday