Get Started Today!  (813) 749-0895    SEARCH SITE

IT Professional Services and Business Continuity

Symmetric Engineering Group Blogs

Would You Share Your Browser History? This Ransomware Will

mobile_ransomware_400

Ransomware is a tricky piece of malware that locks down the precious files located on a victim’s computer, then (in theory) will return access to them when a ransom has been paid. Depending on the files stored on a victim’s computer, they might simply blow it off and not worry too much about losing access to a couple of pictures or videos--but what if this ransomware threatened to expose your web browsing history?

Would you pay money to keep your browsing history secret? This is the key point behind a new ransomware called LeakerLocker. LeakerLocker, an Android-exclusive variant of ransomware, attempts to extort money from its victims by threatening them with their mobile device’s browser history. It seems like a simple choice to make; $50 to keep your browsing history private. Other information claimed to be stolen includes photos, videos, Facebook messages, location history, and other sensitive information.

In essence, this ransomware uses the fear of embarrassment to get its victims to fork over some cash.

Discovered by researchers at McAfee, LeakerLocker doesn’t appear to actually encrypt any information found on the device, making it the exception to the typical ransomware variant. Instead, LeakerLocker claims that it has taken a backup of the data on the device, which it will then proceed to threaten the user with. Users have contracted this ransomware by downloading two apps on the Google Play Store, which have both been removed since: Wallpapers Blur HD and Booster & Cleaner Pro.

LeakerLocker asks for an incredible amount of permissions on your device, including the ability to read and send messages, manage calls, and access contacts. It then locks down the device and places a ransom message on the lock screen. Since users will grant LeakerLocker permissions at the time of downloading, it gains access to information which it uses to convince victims that they must pay the ransom. Whether or not is has stolen all of the information it claims to is another story altogether, but it’s been found that the ransomware can access information like email addresses, browser history, text messages, calling history, and even pictures from the camera.

As is the case with ordinary ransomware, it’s best to not pay the ransom. After all, any money that’s sent to hackers who have locked down your device is funding their next campaign--something that you don’t want on your conscience. Furthermore, there is no guarantee that you’ll even get your data back, so there is no reason to assume you can.

For more information on how to stay safe online, be it on a desktop or a mobile device, reach out to Symmetric Engineering Group at (813) 749-0895. We can help your organization implement solutions that minimize the risk of running into malicious applications.

Give Your Server Units Some TLC
Maintaining Your IT Is Easier With An MSP
 

Comments

Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Search

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week IT Services IT Support Managed IT Services Best Practices Cloud Technology IT Infrastructure Management IT Companies in Tampa Email Business Computing Business Continuity Malware Privacy Hackers Internet IT Support Services Business Mobility Hosted Solutions Business IT Solutions Microsoft I.T. Management Productivity IT Professional Services Managed Service Provider Custom Business Solutions Software Business Outsourced IT Mobile Devices IT Management Business Applications Computer IT Business Solutions Data Backup Network Security Ransomware Technology Consultants Data Android Managed IT Service Data Recovery Managed IT Service in Florida Windows 10 Business IT Support Managed IT Tech Term Internet of Things Windows Managed Services in Florida Google I.T. Support Dynamic Solutions I.T. Services User Tips Backup Cloud Computing Disaster Recovery IT Risk Management IT Support Services in Tampa Communication IT Services in Florida Browser Data Management Smartphone Remote Monitoring IT Outsourcing in Tampa IT Support in Tampa Innovation Encryption IT Service Managed Services Gmail Hardware Small Business BYOD App Cybersecurity Smartphones Productivity Managed Services in Tampa Bay Holiday IT Managed Services Artificial Intelligence Workplace Tips Server Microsoft Office Upgrade Social Media Business Management Mobile Device Paperless Office Save Money Mobile Device Management Tampa IT Support Firewall Tech Companies in Tampa Vendor Management Network Applications Office 365 IT Services in Tampa Phishing Bring Your Own Device Bandwidth Content Filtering Word Two-factor Authentication Data Computer Services Customer Relationship Management IT Service Management IT Company Business Plan Apple Risk Management Infrastructure Collaboration Managed Service in Tampa IT Outsourcing Tip of the week Chrome Business IT Support Services Facebook BDR IT Outsourcing in Florida Antivirus Operating System Unified Threat Management Small Business IT Solutions Efficiency Computer Networking Passwords IT Support Compliance Website IT Vendor Management Unified Communications Managed IT Services Storage Regulations Settings Telephone Systems IT Management Services Windows 10 Miscellaneous VoIP IT Company Data storage The Internet of Things Data Security Saving Money Robot Remote Computing SaaS Big Data Government Analytics Mobile Computing Hosted Solution Document Management Employer-Employee Relationship Wireless Technology Data loss Retail Money IT solutions WiFi Project Management Automation Computer Hardware Repair Vulnerability Virtual Desktop Budget User Error Google Drive Tablet Scam Internet Exlporer Monitors Computer Network Services Mouse Office Computer Support Help Desk Assessment Virtual Private Network Solid State Drive I.T. Company Virtualization Alert IT Consulting Computer Networking Services LiFi Mobile Security Mobility Augmented Reality Maintenance Business Technology Computing Virtual Reality Wireless Smart Technology IT Companies in Florida Spam IT Support Helpdesk Apps Network Congestion Microsoft Virtual Server Hosting in Tampa and Florida Administration IT Management Service Blockchain Recovery Wi-Fi Uninterrupted Power Supply Information Technology Router Presentation Licensing End of Support Managed IT Outsourcing VPN Laptop Training IBM Redundancy YouTube Business Continuity Services Office Tips Patch Management Business Application Outlook Digital Payment Search Server Management communications Flexibility HIPAA File Sharing Network Management Net Neutrality IoT Customer Service VoIP Data Technology Comparison IT Support and Solutions Hard Drive Undo Statistics Application SharePoint IT Technicians Managed Services in Floirda Files Touchscreen Microsoft Affiliate Program Data Warehousing Managed Service Providers Geography Sports Computer Repair Data Breach Cooperation History User Safety Marketing Technology Tips Nanotechnology Network Support in Florida Mobile Device Managment Mobile Domains Cabling Intranet Best Practice Digital Writing Google Docs Specifications Social Networking IT Managed Service in Tampa Business Growth Cache Competition Google Maps Cortana Bluetooth Server Hosting in Florida Social Networking Save Time Downloads Mirgation IT Company in Tampa Digital Signature Websites Hard Drives Education USB Microsoft Business Solutions Healthcare IT Microsoft Excel Tech Company in Tampa High-Speed Internet Technology Laws Staff Disaster Politics Avoiding Downtime Consultation Dark Data Cryptocurrency Humor Screen Reader Company Culture Public Speaking Mail Merge Alt Codes Hotspot Heating/Cooling Spyware Social Engineering Black Friday Motherboard Help Desk Support in Tampa Recycling Knowledge Tampa IT Services IT Tech Support Hacks Buisness Careers Backups Multi-Factor Security Migration Managed Service in Florida Star Wars Fun Development Corporate Profile Google Wallet Unified Threat Management Operations Gadgets Quick Tips Consulting Services Bitcoin Distributed Denial of Service Smart Tech Programming G Suite Managing Stress Address Typing Health Care IT Services Techology Language Server Hosting in Tampa Hacker Downtime Business Continuity Service Providers Cyber Monday Help Desk Support Automobile eWaste Experience Shortcut Deep Learning Outsourced Computer Support Technology Consulting Firms Current Events Cables WannaCry Trending IT Service in Tampa Jobs Information Technology Consulting Legal Google Calendar Chatbots Machine Learning Utility Computing Cost Management Servers Lenovo Permissions Drones Printer Wearable Technology Time Management Co-managed IT Service IT Windows 8 Professional Service Break Fix Connectivity Tech Support Enterprise Content Management Hard Disk Drive Halloween Computers Business IT Solutions Disaster Resistance Computing Infrastructure How To Modem Health Management Software Tips Going Green Samsung Password Wires CIO IT Consulting Services Legislation Identity IT Support Companies in Tampa Healthcare Top IT Outsourcing Company Superfish Fraud Full Service IT Access Control Chromebook Hacking Identity Theft IT Solutions for Small Business IT Managed Service Provider Dark Web Managed it Services in Tampa Travel Vulnerabilities Scary Stories Display Proactive IT Alerts Server Hosting Computer Care Firefox Users IT Consulting Service Software as a Service Cookies IT Vendor Management in Tampa Sync Enterprise Resource Planning Identities Printing Notifications Cameras Managed Service Private Cloud Hiring/Firing I.T. Managament Unsupported Software Motion Sickness Emergency Gadget Staffing Physical Security CCTV Error Personal Information Lithium-ion Battery Mobile Data Meetings GPS How To Cybercrime Crowdsourcing Taxes Public Cloud IT Consultant Botnet Refrigeration Supercomputer Twitter Webcam Telephony Tracking Upgrades Running Cable Thank You CrashOverride Emoji IT Budget Processors Point of Sale Update 5G 3D Printing Black Market Congratulations Managed Servers Work/Life Balance Cleaning IP Address Business Appplications Administrator Virus Web Server Electronic Medical Records Saving Time Relocation Law Enforcement Mobile Office

Latest Blog Entry

ata backup has become an essential piece of the modern business’ computing infrastructure but the act of protecting data from being lost is centuries old. Before there was recorded civilization, there were humans writing on the cave walls and carving notches into bone to aid...

Latest News

SEG Awarded Small Business of the Year Award!

Symmetric Engineering Group was awarded the Upper Tampa Bay Chamber Small Business of the Year Award for their understanding technical service and support throughout the Tampa Bay area

Read more ...

Account Login