Get Started Today!  (813) 749-0895    SEARCH SITE

IT Professional Services and Business Continuity

Blog for IT Support and Managed Services in Tampa and Florida

Providing Business IT Support such as technical IT Helpdesk Support, Outsourced Computer Support, Technology Consulting, and Managed IT Services to small and medium-sized businesses in Tampa and Florida.

Would You Share Your Browser History? This Ransomware Will

Ransomware is a tricky piece of malware that locks down the precious files located on a victim’s computer, then (in theory) will return access to them when a ransom has been paid. Depending on the files stored on a victim’s computer, they might simply blow it off and not worry too much about losing access to a couple of pictures or videos--but what if this ransomware threatened to expose your web browsing history?

Would you pay money to keep your browsing history secret? This is the key point behind a new ransomware called LeakerLocker. LeakerLocker, an Android-exclusive variant of ransomware, attempts to extort money from its victims by threatening them with their mobile device’s browser history. It seems like a simple choice to make; $50 to keep your browsing history private. Other information claimed to be stolen includes photos, videos, Facebook messages, location history, and other sensitive information.

In essence, this ransomware uses the fear of embarrassment to get its victims to fork over some cash.

Discovered by researchers at McAfee, LeakerLocker doesn’t appear to actually encrypt any information found on the device, making it the exception to the typical ransomware variant. Instead, LeakerLocker claims that it has taken a backup of the data on the device, which it will then proceed to threaten the user with. Users have contracted this ransomware by downloading two apps on the Google Play Store, which have both been removed since: Wallpapers Blur HD and Booster & Cleaner Pro.

LeakerLocker asks for an incredible amount of permissions on your device, including the ability to read and send messages, manage calls, and access contacts. It then locks down the device and places a ransom message on the lock screen. Since users will grant LeakerLocker permissions at the time of downloading, it gains access to information which it uses to convince victims that they must pay the ransom. Whether or not is has stolen all of the information it claims to is another story altogether, but it’s been found that the ransomware can access information like email addresses, browser history, text messages, calling history, and even pictures from the camera.

As is the case with ordinary ransomware, it’s best to not pay the ransom. After all, any money that’s sent to hackers who have locked down your device is funding their next campaign--something that you don’t want on your conscience. Furthermore, there is no guarantee that you’ll even get your data back, so there is no reason to assume you can.

For more information on how to stay safe online, be it on a desktop or a mobile device, reach out to Symmetric Engineering Group at (813) 749-0895. We can help your organization implement solutions that minimize the risk of running into malicious applications.

 

Comments

No comments made yet. Be the first to submit a comment

Search

Mobile? Grab this Article!

Qr Code

Tag Cloud

IT Support IT Services Security Tip of the Week Managed IT Services IT Infrastructure Management IT Companies in Tampa Best Practices Cloud Business Mobility IT Support Services Business Continuity Business IT Solutions I.T. Management Business Computing IT Professional Services Privacy Technology Custom Business Solutions Email Microsoft Hackers Malware IT Business Solutions Business Applications Productivity Internet IT Management Business Technology Consultants Hosted Solutions Managed Service Provider Windows 10 Managed IT Service in Florida Business IT Support Managed IT Service I.T. Support Computer Managed Services in Florida Software IT Support Services in Tampa Dynamic Solutions Windows IT Risk Management I.T. Services Mobile Devices IT Outsourcing in Tampa IT Services in Florida Ransomware IT Support in Tampa Disaster Recovery Google Data IT Service Managed Services Internet of Things Workplace Tips Outsourced IT Managed IT Backup Managed Services in Tampa Bay Microsoft Office Hardware IT Managed Services Communication Tampa IT Support Gmail Network Upgrade Network Security IT Services in Tampa Mobile Device Management Tech Companies in Tampa User Tips Remote Monitoring Android App IT Service Management IT Company Business Plan Smartphone Managed Service in Tampa Phishing Vendor Management IT Outsourcing Business IT Support Services IT Outsourcing in Florida Social Media Firewall Small Business IT Solutions Unified Threat Management Data Management IT Vendor Management Save Money Innovation Apple Data Computer Services Browser Operating System Cloud Computing Content Filtering Computer Networking Mobile Device Collaboration Holiday Cybersecurity Miscellaneous IT Management Services Telephone Systems Server WiFi SaaS IT solutions Word Office 365 Bring Your Own Device Smartphones Settings Customer Relationship Management Wireless Technology Hosted Solution IT Company Data storage Robot Retail Passwords BYOD Computer Hardware Repair Big Data Facebook Data Backup Risk Management Help Desk Computer Network Services Remote Computing IBM Saving Money Data Recovery Chrome Mobility Microsoft Virtual Server Hosting in Tampa and Florida Customer Service Information Technology Productivity Office Tips Efficiency Automation Uninterrupted Power Supply BDR Solid State Drive Business Application Budget Apps Recovery IT Support Google Drive Presentation Administration Windows 10 Network Congestion Encryption Computer Support I.T. Company Managed IT Services Computer Networking Services Analytics IT Companies in Florida IT Support Helpdesk Mobile Computing Antivirus IT Management Service Website communications Virtual Desktop YouTube Laptop Search Office End of Support Small Business Managed IT Outsourcing Business Continuity Services Training LiFi Money Alert Artificial Intelligence Monitors Wireless Virtualization Mouse Digital Signature Regulations Knowledge VoIP IT Managed Service in Tampa Buisness Server Hosting in Florida Deep Learning Touchscreen Employer-Employee Relationship Cabling Mobile Device Managment Social Virtual Reality Save Time Experience Digital Help Desk Support in Tampa Humor Websites Tampa IT Services Trending Cryptocurrency IT Tech Support Infrastructure Careers Co-managed IT Hacks Backups Consulting Services Undo Spyware Help Desk Support Outsourced Computer Support CIO Bitcoin Two-factor Authentication Identities Current Events IT Service in Tampa Technology Consulting Firms User Jobs Legal Information Technology Consulting Service IT Competition Bandwidth Professional Service User Error Windows 8 Application Going Green Avoiding Downtime Hard Disk Drive IT Consulting Services IT Solutions for Small Business Education How To Alt Codes Digital Payment IT Vendor Management in Tampa IT Managed Service Provider Printing Managed it Services in Tampa History Augmented Reality Data Technology Computer Care Managed Services in Floirda Business Growth Microsoft Affiliate Program Firefox Typing Tablet Network Support in Florida The Internet of Things VoIP IT Consulting Managed Service Providers Disaster Writing Fun IT Company in Tampa Google Docs Microsoft Business Solutions Assessment Health Hacker Tip of the week Password Google Maps Healthcare IT Downtime Computing Tech Company in Tampa Gadgets Social Engineering Hacking Maintenance Managed Service in Florida Politics Halloween Consultation Servers Storage Health Care IT Services Server Hosting in Tampa Google Wallet Outlook Corporate Profile Business Continuity Service Providers Scary Stories Domains Unified Communications Net Neutrality Quick Tips Computers Computer Repair Server Management Best Practice Licensing Dark Data Automobile Business IT Solutions Users Drones Hard Drives WannaCry Spam IT Support Companies in Tampa Flexibility Sports Public Speaking Time Management Display Safety Statistics Intranet Heating/Cooling Software Tips Full Service IT Marketing Top IT Outsourcing Company Server Hosting Compliance Cortana Data loss Programming IT Support and Solutions IT Consulting Service File Sharing USB Network Management Bluetooth Sync Notifications Cost Management Cameras Tech Support Files Wi-Fi Thank You Personal Information IT Consultant How To CCTV 5G Congratulations Taxes Crowdsourcing Upgrades Supercomputer Botnet G Suite Update Government Saving Time 3D Printing CrashOverride IT Budget Business Appplications Machine Learning Electronic Medical Records Cleaning Chromebook Work/Life Balance Business Management Relocation Travel Law Enforcement Unsupported Software Cybercrime VPN Private Cloud Physical Security Motion Sickness Staffing Gadget Mobile Data Running Cable Error Meetings GPS IP Address Public Cloud Virus Twitter Webcam Tracking Emoji Telephony Mobile Office Black Market Managed Servers Processors Hiring/Firing Point of Sale Document Management Administrator Samsung Refrigeration Web Server Identity Theft Lithium-ion Battery Paperless Office I.T. Managament

Latest Blog Entry

Does your business use Windows 10? If so, there are all sorts of hidden tips and tricks that can help you gain even more value from your workstations that are running Windows 10. Here are a few of these secrets and how they can help your staff save time.

Latest News

SEG Awarded Small Business of the Year Award!

Symmetric Engineering Group was awarded the Upper Tampa Bay Chamber Small Business of the Year Award for their understanding technical service and support throughout the Tampa Bay area

Read more ...

Account Login