Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

LeakerLocker Takes Exposure to New Heights By Sharing Your Mobile Browser History

LeakerLocker Takes Exposure to New Heights By Sharing Your Mobile Browser History

Ransomware, the malware that locks down its victim’s files until they pay up, has always been a frustrating issue to deal with. However, a recent mobile ransomware will make the issue a little more personal… by sharing the victim’s mobile browsing history.

This introduces an important question: how much is it worth to you for your browsing history to kept secret? According to LeakerLocker, the answer is $50. This Android malware will steal the user’s browsing history, along with photos and videos from the device, any Facebook messages, and the user’s location history, all along with other sensitive information the mobile device has access to.

Admittedly, considering what many may have on their phones that they don’t want others to see, LeakerLocker utilizes a potent motivation: the fear of embarrassment. Think to yourself for a moment--do you have anything on your phone that you’d rather not anyone else know about?

LeakerLocker asks, is $50 enough to keep your secrets hidden from view?

Unlike many examples of ransomware, the researchers at McAfee have discovered that LeakerLocker seems not to encrypt any data. Rather, the ransomware allegedly takes a backup of all information on the infected device, which is then used to blackmail the owner into paying up.

This ransomware was spread via two Google Play Store apps, Wallpapers Blur HD and Booster & Channel Cleaner Pro. These fraudulent applications have since been removed. A major red flag for these apps were the incredible amount of permissions that LeakerLocker obtained through them. These apps requested the ability to both read and send messages, manage the device’s calls, and access the contact list. Once approved, LeakerLocker shuts the user out of the device and demands its ransom through the lock screen--and thanks to the access the user had just given the app, it can easily seem that paying the ransom is the only option.

However, there is no way of knowing for sure if LeakerLocker has actually accessed the data it claims to. Having said that, it has been confirmed that the ransomware can access the device’s browsing history, along with text and email messages, the device’s calling history, and yes, camera images.

As we recommend when someone is dealing with any form of ransomware, paying the ransom will almost certainly do you no good. Where’s the guarantee that the hackers haven’t scammed you out of the cost of your data, and that the money you’ve given them won’t finance their next heist?

If you have concerns with keeping your data secured and your business safe from threats like LeakerLocker and the many ransomware variants out there, reach out to us. We can help to make sure your network is as secure as possible, from the software all the way to the employees who use it. Call us at (518) 203-2110 for more information.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 26 April 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Malware Business Software Business Computing User Tips Efficiency Workplace Tips Computer Google Hosted Solutions Microsoft Upgrade Windows 10 IT Support Mobile Devices Innovation Smartphone Hardware Network Security Ransomware Gmail Microsoft Office The Internet of Things Office Social Media Backup Apps Bandwidth Business Continuity Disaster Recovery Communication Hacking WiFi Facebook Operating System Android Quick Tips Apple Best Practice Firewall Alert Content Filtering Networking Cybercrime Data storage Website Windows Data Experience Employer-Employee Relationship History Two-factor Authentication Mobile Device Management Money Network Smartphones Small Business Phishing App Managed Service Provider Outlook Mobile Computing Big Data communications Safety Unified Threat Management Wireless Technology IP Address Social Virtualization Automation Printer Browser Virtual Desktop Government Wireless Memory Augmented Reality Unified Communications Keyboard Securty Deep Learning Search Document Management User Encryption Hard Drives SaaS VoIP BDR Law Enforcement Remote Computing Shortcut Cortana Vendor Management DDoS Proactive IT Network Congestion Heating/Cooling Word Save Money Monitors Music Business Management Cryptocurrency Laptop IBM Displays Competition Google Docs Presentation Education Entrepreneur Domains Cleaning Holiday YouTube Processors End of Support Black Market Office Tips Hacker LiFi Staffing BYOD Downtime Application Streaming Media Help Desk Writing Passwords Micrsooft Customer Service Visible Light Communication Disaster Data Management Business Growth Robot Advertising Router Recovery Office 365 Society Sports Spam Retail Google Wallet Analytics Information Technology Running Cable Saving Money intranet Lithium-ion battery Windows 8 Internet of Things Windows XP IT Services Managed IT services Hosted Solution Artificial Intelligence Documents Social Networking Tech Support Compliance Public Speaking Bluetooth Drones
QR-Code