crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Would You Share Your Browser History? This Ransomware Will

Ransomware is a tricky piece of malware that locks down the precious files located on a victim’s computer, then (in theory) will return access to them when a ransom has been paid. Depending on the files stored on a victim’s computer, they might simply blow it off and not worry too much about losing access to a couple of pictures or videos--but what if this ransomware threatened to expose your web browsing history?

Would you pay money to keep your browsing history secret? This is the key point behind a new ransomware called LeakerLocker. LeakerLocker, an Android-exclusive variant of ransomware, attempts to extort money from its victims by threatening them with their mobile device’s browser history. It seems like a simple choice to make; $50 to keep your browsing history private. Other information claimed to be stolen includes photos, videos, Facebook messages, location history, and other sensitive information.

In essence, this ransomware uses the fear of embarrassment to get its victims to fork over some cash.

Discovered by researchers at McAfee, LeakerLocker doesn’t appear to actually encrypt any information found on the device, making it the exception to the typical ransomware variant. Instead, LeakerLocker claims that it has taken a backup of the data on the device, which it will then proceed to threaten the user with. Users have contracted this ransomware by downloading two apps on the Google Play Store, which have both been removed since: Wallpapers Blur HD and Booster & Cleaner Pro.

LeakerLocker asks for an incredible amount of permissions on your device, including the ability to read and send messages, manage calls, and access contacts. It then locks down the device and places a ransom message on the lock screen. Since users will grant LeakerLocker permissions at the time of downloading, it gains access to information which it uses to convince victims that they must pay the ransom. Whether or not is has stolen all of the information it claims to is another story altogether, but it’s been found that the ransomware can access information like email addresses, browser history, text messages, calling history, and even pictures from the camera.

As is the case with ordinary ransomware, it’s best to not pay the ransom. After all, any money that’s sent to hackers who have locked down your device is funding their next campaign--something that you don’t want on your conscience. Furthermore, there is no guarantee that you’ll even get your data back, so there is no reason to assume you can.

For more information on how to stay safe online, be it on a desktop or a mobile device, reach out to Integrated Business Technologies at (918) 770-8738. We can help your organization implement solutions that minimize the risk of running into malicious applications.


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 18 August 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Privacy Managed Service Provider Business Management Tip of the Week Internet Microsoft Saving Money Cloud Business Computing Productivity Workplace Tips Backup Best Practices IT Services Hackers Hosted Solutions Mobile Devices Hardware IT Support Business Network Malware Email Software Small Business Data Communication Smartphones Upgrade Windows Server Mobile Device Management VoIP Virtualization Microsoft Office Disaster Recovery Business Continuity Google Miscellaneous Mobile Office Computer Efficiency Vendor Management Gadgets Innovation Social Media Quick Tips Mobile Computing Holiday WiFi Windows 10 BYOD Bring Your Own Device Best Practice Passwords Operating System Wireless Technology Apple Spam Smartphone Users User Tips Trending Remote Monitoring Content Filtering Remote Computing Going Green History Alert Internet of Things The Internet of Things IT Consultant Browser Android Information Technology Current Events Firewall Big Data Office IT Solutions Unified Threat Management Save Money Lithium-ion Battery Windows 8 Printer Tech Support Humor Saving Time Gmail Avoiding Downtime App Hard Drives Analytics Customer Relationship Management Facebook Managed IT services Marketing Network Security Excel Office Tips Retail Ransomware Phishing IT service Business Growth Apps Application Virus Customer Service Maintenance Computers Fax Server Phone System Outlook Health Collaboration Data Management Budget Automation Computer Repair Router Antivirus Inbound Marketing Recovery Running Cable Social Digital Payment Mobile Device Artificial Intelligence VPN PowerPoint Risk Management Training Employer-Employee Relationship Hacking Password iPhone Co-Managed IT Outsourced IT Administration Presentation Business Owner Encryption Sports Hacker Proactive IT User Point of Sale Programming Mouse Analyitcs Money Education Document Management Safety Net Neutrality IBM Settings Hosted Solution Licensing Wireless Data storage Chrome Managed IT Cybercrime File Sharing Save Time Robot Social Networking Hiring/Firing Printing Display End of Support Tablet LiFi Website Help Desk Statistics Intranet User Error Competition Business Intelligence Network Congestion Downtime Two-factor Authentication Augmented Reality Search USB Piracy Virtual Desktop Legal Online Currency Samsung Experience Compliance Troubleshooting Debate Computer Accessories Mobile Device Managment Heating/Cooling Alt Codes Consumers Crowdfunding Scam Regulations YouTube Cybersecurity Typing IP Address Google Drive Company Culture Twitter Scheduling How To Bandwidth Disaster Touchscreen Mobility Refrigeration Cryptocurrency Google Docs Specifications Flexibility Digital Signature Software Tips Cost Management Bitcoin Memory Laptop communications Hacks Wearable Technology Data Backup Wi-Fi Documents Conferencing Halloween SaaS Entrepreneur Unified Communications Undo Alerts Macro PC Care 5G PDF Value People eBay Scary Stories Telephony Computing Remote Support Leadership New Additions Office 365 Monitors Skype Streaming Media Print Server Gaming Console Text Messaging Files Deep Learning Domains Google Wallet Work Station Congratulations Fun Writing LinkedIn Law Firm IT Video Surveillance Private Cloud Word Public Speaking Drones Windows 8.1 Update Recycling Cortana Social Engineering Best Available eWaste Buisness Public Cloud Identities Backups Knowledge Environment CIO Adminstration Bluetooth 3D Sync Solid State Drive

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...