crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Would You Share Your Browser History? This Ransomware Will

Ransomware is a tricky piece of malware that locks down the precious files located on a victim’s computer, then (in theory) will return access to them when a ransom has been paid. Depending on the files stored on a victim’s computer, they might simply blow it off and not worry too much about losing access to a couple of pictures or videos--but what if this ransomware threatened to expose your web browsing history?

Would you pay money to keep your browsing history secret? This is the key point behind a new ransomware called LeakerLocker. LeakerLocker, an Android-exclusive variant of ransomware, attempts to extort money from its victims by threatening them with their mobile device’s browser history. It seems like a simple choice to make; $50 to keep your browsing history private. Other information claimed to be stolen includes photos, videos, Facebook messages, location history, and other sensitive information.

In essence, this ransomware uses the fear of embarrassment to get its victims to fork over some cash.

Discovered by researchers at McAfee, LeakerLocker doesn’t appear to actually encrypt any information found on the device, making it the exception to the typical ransomware variant. Instead, LeakerLocker claims that it has taken a backup of the data on the device, which it will then proceed to threaten the user with. Users have contracted this ransomware by downloading two apps on the Google Play Store, which have both been removed since: Wallpapers Blur HD and Booster & Cleaner Pro.

LeakerLocker asks for an incredible amount of permissions on your device, including the ability to read and send messages, manage calls, and access contacts. It then locks down the device and places a ransom message on the lock screen. Since users will grant LeakerLocker permissions at the time of downloading, it gains access to information which it uses to convince victims that they must pay the ransom. Whether or not is has stolen all of the information it claims to is another story altogether, but it’s been found that the ransomware can access information like email addresses, browser history, text messages, calling history, and even pictures from the camera.

As is the case with ordinary ransomware, it’s best to not pay the ransom. After all, any money that’s sent to hackers who have locked down your device is funding their next campaign--something that you don’t want on your conscience. Furthermore, there is no guarantee that you’ll even get your data back, so there is no reason to assume you can.

For more information on how to stay safe online, be it on a desktop or a mobile device, reach out to Integrated Business Technologies at (918) 770-8738. We can help your organization implement solutions that minimize the risk of running into malicious applications.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 17 October 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Privacy Business Management Managed Service Provider Tip of the Week Internet Microsoft Saving Money Cloud Productivity Business Computing Workplace Tips Backup IT Services Best Practices Hackers Hosted Solutions IT Support Mobile Devices Business Hardware Network Email Malware Small Business Software Data Communication Smartphones Windows Server Upgrade Mobile Device Management Business Continuity VoIP Virtualization Microsoft Office Google Efficiency Disaster Recovery Miscellaneous Mobile Office Computer Gadgets Vendor Management Innovation Social Media Quick Tips Mobile Computing Holiday WiFi Windows 10 User Tips Best Practice Bring Your Own Device Passwords Smartphone BYOD Trending Operating System Apple Users Spam Remote Monitoring Wireless Technology Going Green The Internet of Things Internet of Things Content Filtering Remote Computing Android History Alert IT Solutions Lithium-ion Battery Save Money Big Data Current Events IT Consultant Office Information Technology Managed IT services Firewall Network Security Unified Threat Management Browser Tech Support Analytics Humor Facebook Saving Time Data Management Avoiding Downtime Hard Drives App Customer Relationship Management Ransomware Windows 8 Gmail Printer Phone System Customer Service Hacking Computers Outsourced IT Apps Collaboration Application Virus Antivirus Maintenance Fax Server Office Tips Retail Outlook Artificial Intelligence Health Phishing IT service Managed IT Marketing Business Growth Data Backup Excel Administration Password Computer Repair Presentation Proactive IT Training Budget Automation Social Co-Managed IT Mobile Device Recovery Digital Payment PowerPoint VPN Risk Management Running Cable Router iPhone Inbound Marketing Employer-Employee Relationship Website Statistics Files Augmented Reality Competition Network Congestion Piracy Data Recovery Downtime Sports Two-factor Authentication Search Point of Sale Virtual Desktop USB Mouse Business Owner Help Desk Encryption Document Management Project Management Hacker User Error Net Neutrality Programming IBM User Cybersecurity Analyitcs Money Education File Sharing Mobility Social Networking Safety Licensing Settings Hosted Solution Display Wireless Data storage Chrome Tablet Save Time Cybercrime Robot Hiring/Firing Printing Intranet Business Intelligence End of Support LiFi Computing Windows 8.1 Update Recycling Data loss Data Breach Office 365 Monitors Best Available Deep Learning Tip of the week Domains Google Wallet Technology Laws Fun Writing Bluetooth Private Cloud Word Public Speaking Drones Online Currency Unified Threat Management Cortana Social Engineering eWaste Buisness Identities Computer Accessories Public Cloud Virtual Private Network Macro Backups Knowledge Environment CIO Solid State Drive Sync Twitter Redundancy Legal Company Culture Samsung Debate Experience Compliance Troubleshooting Heating/Cooling Alt Codes Gaming Console Touchscreen Mobile Device Managment Consumers Crowdfunding Regulations YouTube Typing Networking IP Address Google Drive How To Bandwidth Refrigeration Cryptocurrency Disaster Wearable Technology Conferencing Data Security Google Docs Specifications Adminstration Flexibility PC Care Cost Management Bitcoin Digital Signature 3D Alerts Software Tips Value Techology Memory eBay Laptop communications Leadership Hacks Remote Support Streaming Media Disaster Resistance New Additions Wi-Fi Documents Skype Print Server Text Messaging Halloween SaaS Scam Entrepreneur Unified Communications Undo Work Station Managed IT Services IT Consulting Scheduling Congratulations 5G PDF LinkedIn People Law Firm IT Video Surveillance Scary Stories Telephony

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code