Get Started Today!  (813) 749-0895    SEARCH SITE

IT Professional Services and Business Continuity

Blog for IT Support and Managed Services in Tampa and Florida

Providing Business IT Support such as technical IT Helpdesk Support, Outsourced Computer Support, Technology Consulting, and Managed IT Services to small and medium-sized businesses in Tampa and Florida.

Would You Share Your Browser History? This Ransomware Will

Ransomware is a tricky piece of malware that locks down the precious files located on a victim’s computer, then (in theory) will return access to them when a ransom has been paid. Depending on the files stored on a victim’s computer, they might simply blow it off and not worry too much about losing access to a couple of pictures or videos--but what if this ransomware threatened to expose your web browsing history?

Would you pay money to keep your browsing history secret? This is the key point behind a new ransomware called LeakerLocker. LeakerLocker, an Android-exclusive variant of ransomware, attempts to extort money from its victims by threatening them with their mobile device’s browser history. It seems like a simple choice to make; $50 to keep your browsing history private. Other information claimed to be stolen includes photos, videos, Facebook messages, location history, and other sensitive information.

In essence, this ransomware uses the fear of embarrassment to get its victims to fork over some cash.

Discovered by researchers at McAfee, LeakerLocker doesn’t appear to actually encrypt any information found on the device, making it the exception to the typical ransomware variant. Instead, LeakerLocker claims that it has taken a backup of the data on the device, which it will then proceed to threaten the user with. Users have contracted this ransomware by downloading two apps on the Google Play Store, which have both been removed since: Wallpapers Blur HD and Booster & Cleaner Pro.

LeakerLocker asks for an incredible amount of permissions on your device, including the ability to read and send messages, manage calls, and access contacts. It then locks down the device and places a ransom message on the lock screen. Since users will grant LeakerLocker permissions at the time of downloading, it gains access to information which it uses to convince victims that they must pay the ransom. Whether or not is has stolen all of the information it claims to is another story altogether, but it’s been found that the ransomware can access information like email addresses, browser history, text messages, calling history, and even pictures from the camera.

As is the case with ordinary ransomware, it’s best to not pay the ransom. After all, any money that’s sent to hackers who have locked down your device is funding their next campaign--something that you don’t want on your conscience. Furthermore, there is no guarantee that you’ll even get your data back, so there is no reason to assume you can.

For more information on how to stay safe online, be it on a desktop or a mobile device, reach out to Symmetric Engineering Group at (813) 749-0895. We can help your organization implement solutions that minimize the risk of running into malicious applications.

 

Comments

No comments made yet. Be the first to submit a comment

Search

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week IT Support IT Services Managed IT Services IT Infrastructure Management Best Practices IT Companies in Tampa Business Continuity Business Mobility Cloud IT Support Services Business IT Solutions Privacy I.T. Management Hackers Business Computing Technology IT Professional Services Email Microsoft Custom Business Solutions Malware Productivity Business Applications IT Business Solutions IT Management Internet Technology Consultants Business Windows 10 Managed IT Service in Florida Business IT Support Hosted Solutions Managed Service Provider Managed IT Service Computer I.T. Support Managed Services in Florida Windows Ransomware I.T. Services IT Support Services in Tampa Managed IT Network Security Software Mobile Devices Dynamic Solutions IT Risk Management Data IT Outsourcing in Tampa IT Services in Florida User Tips Backup Disaster Recovery Managed Services Remote Monitoring Android Outsourced IT IT Support in Tampa Google IT Service Internet of Things Microsoft Office Communication Data Backup Workplace Tips Smartphone Hardware Managed Services in Tampa Bay IT Managed Services Phishing Data Management App IT Services in Tampa Network Tech Companies in Tampa Upgrade Mobile Device Management Data Recovery Browser Tampa IT Support Gmail Operating System Computer Networking Word Managed Service in Tampa Cloud Computing IT Outsourcing in Florida Firewall Content Filtering IT Service Management Smartphones IT Company Business Plan Save Money Innovation IT Vendor Management Tip of the week Collaboration IT Outsourcing Business IT Support Services Cybersecurity Small Business IT Solutions Vendor Management Social Media Data Computer Services Unified Threat Management Apple Mobile Device Antivirus WiFi IT Management Services Computer Hardware Repair Office 365 Artificial Intelligence SaaS Retail Small Business Passwords BYOD Settings Holiday Encryption IT solutions Wireless Technology Miscellaneous Server Telephone Systems IT Company Efficiency Robot Bring Your Own Device Customer Relationship Management Hosted Solution Big Data Data storage Risk Management Facebook Customer Service Business Continuity Services LiFi Microsoft Virtual Server Hosting in Tampa and Florida Office Tips Outlook Laptop Money Computer Network Services Budget Virtual Private Network Apps Windows 10 Business Application Alert Training Recovery Data loss Presentation Virtualization Remote Computing Saving Money IT Consulting Solid State Drive Website IT Companies in Florida IT Support Helpdesk Information Technology YouTube Mobility Virtual Desktop Project Management Productivity IT Management Service Search Office Automation Google Drive Administration Computer Support End of Support Uninterrupted Power Supply I.T. Company BDR Computer Networking Services Wireless communications Network Congestion IT Support IBM Monitors Chrome Help Desk Mobile Computing Managed IT Outsourcing Analytics Managed IT Services Trending Assessment Gadgets Patch Management Drones Scam Co-managed IT Google Maps Virtual Reality Undo Help Desk Support in Tampa Tampa IT Services Tech Company in Tampa Top IT Outsourcing Company Maintenance CIO Consultation Two-factor Authentication Careers Politics Vulnerability Networking IT Consulting Service Consulting Services Net Neutrality User Corporate Profile Competition Help Desk Support Outsourced Computer Support User Error Quick Tips Jobs Mouse IT Service in Tampa Automobile Data Security Service IT Deep Learning Licensing Avoiding Downtime WannaCry Social Intranet Time Management Mail Merge Save Time Techology Humor Cryptocurrency IT Solutions for Small Business USB Augmented Reality Software Tips IT Vendor Management in Tampa Samsung Hacks IT Tech Support Backups Network Management VoIP VPN Data Technology File Sharing Digital Signature Address Managed Services in Floirda Sync Disaster Resistance Bitcoin Microsoft Affiliate Program Fun Identities Technology Consulting Firms VoIP Network Support in Florida Health Servers Current Events Legal Writing Downtime Information Technology Consulting Touchscreen Hacker Bandwidth Password Files Redundancy IT Company in Tampa Mobile Device Managment Proactive IT Professional Service Windows 8 Microsoft Business Solutions Cabling Hacking Digital Server Management Going Green Halloween Social Engineering IT Consulting Services Education Websites Managed Service in Florida Data Breach IT Managed Service Provider Alt Codes Infrastructure Spyware Domains Health Care IT Services Statistics Printing Scary Stories Users Best Practice Server Hosting in Tampa Technology Laws Application Typing Hard Drives Public Speaking Spam Business IT Solutions Bluetooth Computers Sports Business Technology Google Docs Marketing Safety Heating/Cooling IT Support Companies in Tampa Unified Threat Management Healthcare IT Flexibility Cortana Hard Disk Drive How To Programming Full Service IT History Computing Display Lenovo Compliance Digital Payment Server Hosting Business Growth IT Support and Solutions Storage Managed it Services in Tampa The Internet of Things Knowledge Firefox Computer Care Disaster Shortcut Google Wallet Buisness Superfish Business Continuity Service Providers Regulations Unified Communications Tablet Employer-Employee Relationship IT Managed Service in Tampa Dark Data Managed Service Providers Server Hosting in Florida Experience Computer Repair Staffing Personal Information Gadget How To 5G Error Meetings Virus GPS Upgrades Public Cloud Webcam Twitter I.T. Managament Tracking Telephony 3D Printing Update Business Appplications Point of Sale Processors Document Management Electronic Medical Records Chromebook Administrator Lithium-ion Battery Web Server Cybercrime Identity Theft Unsupported Software Thank You Cameras Physical Security Notifications Running Cable IT Consultant Mobile Data Congratulations CCTV IP Address Taxes Crowdsourcing Mobile Office Supercomputer Botnet Saving Time Emergency Emoji G Suite Hiring/Firing CrashOverride Black Market Government IT Budget Managed Servers Machine Learning Business Management Refrigeration Cleaning Work/Life Balance Relocation Travel Cost Management Tech Support Paperless Office Law Enforcement Wi-Fi Private Cloud Motion Sickness

Latest Blog Entry

Everyone has accidentally closed an important web browser tab before they were finished with it. What can you really do about it, though? You might expect that you have to search for the page again, but there’s a much easier way to do it. In your Google Chrome browser on a P...

Latest News

SEG Awarded Small Business of the Year Award!

Symmetric Engineering Group was awarded the Upper Tampa Bay Chamber Small Business of the Year Award for their understanding technical service and support throughout the Tampa Bay area

Read more ...

Account Login