Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

LeakerLocker Takes Exposure to New Heights By Sharing Your Mobile Browser History

LeakerLocker Takes Exposure to New Heights By Sharing Your Mobile Browser History

Ransomware, the malware that locks down its victim’s files until they pay up, has always been a frustrating issue to deal with. However, a recent mobile ransomware will make the issue a little more personal… by sharing the victim’s mobile browsing history.

This introduces an important question: how much is it worth to you for your browsing history to kept secret? According to LeakerLocker, the answer is $50. This Android malware will steal the user’s browsing history, along with photos and videos from the device, any Facebook messages, and the user’s location history, all along with other sensitive information the mobile device has access to.

Admittedly, considering what many may have on their phones that they don’t want others to see, LeakerLocker utilizes a potent motivation: the fear of embarrassment. Think to yourself for a moment--do you have anything on your phone that you’d rather not anyone else know about?

LeakerLocker asks, is $50 enough to keep your secrets hidden from view?

Unlike many examples of ransomware, the researchers at McAfee have discovered that LeakerLocker seems not to encrypt any data. Rather, the ransomware allegedly takes a backup of all information on the infected device, which is then used to blackmail the owner into paying up.

This ransomware was spread via two Google Play Store apps, Wallpapers Blur HD and Booster & Channel Cleaner Pro. These fraudulent applications have since been removed. A major red flag for these apps were the incredible amount of permissions that LeakerLocker obtained through them. These apps requested the ability to both read and send messages, manage the device’s calls, and access the contact list. Once approved, LeakerLocker shuts the user out of the device and demands its ransom through the lock screen--and thanks to the access the user had just given the app, it can easily seem that paying the ransom is the only option.

However, there is no way of knowing for sure if LeakerLocker has actually accessed the data it claims to. Having said that, it has been confirmed that the ransomware can access the device’s browsing history, along with text and email messages, the device’s calling history, and yes, camera images.

As we recommend when someone is dealing with any form of ransomware, paying the ransom will almost certainly do you no good. Where’s the guarantee that the hackers haven’t scammed you out of the cost of your data, and that the money you’ve given them won’t finance their next heist?

If you have concerns with keeping your data secured and your business safe from threats like LeakerLocker and the many ransomware variants out there, reach out to us. We can help to make sure your network is as secure as possible, from the software all the way to the employees who use it. Call us at (518) 203-2110 for more information.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 14 October 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Business Malware Business Computing Software User Tips Efficiency Workplace Tips Google Computer Hosted Solutions Microsoft Upgrade IT Support Mobile Devices Innovation Smartphone Windows 10 Hardware Network Security Ransomware Gmail Microsoft Office Office Operating System Backup Apps Business Continuity Disaster Recovery Communication The Internet of Things Social Media Hacking WiFi Bandwidth Facebook Managed Service Provider Outlook Firewall Wireless Technology Content Filtering Android Cybercrime Apple Website Best Practice Alert Employer-Employee Relationship Networking History Data storage Two-factor Authentication Windows Small Business Data Experience Phishing App Mobile Computing Big Data communications Safety Money Unified Threat Management Mobile Device Management Network Smartphones Quick Tips Sports Government Society Google Wallet Spam Retail Augmented Reality Keyboard User Information Technology Running Cable Search Internet of Things Hard Drives Windows 8 Hosted Solution Windows XP IT Services Managed IT services Remote Computing Shortcut Artificial Intelligence Documents DDoS Compliance Heating/Cooling Word Tech Support Drones Bluetooth Social Browser Automation Business Management Printer Virtual Desktop Wireless Memory Competition Unified Communications Securty Encryption Deep Learning Presentation Entrepreneur Document Management Law Enforcement SaaS VoIP BDR Domains Cortana Vendor Management Hacker Proactive IT Network Congestion Application Save Money Monitors Customer Service Music Cryptocurrency Laptop IBM Displays Router Google Docs Education Office 365 Cleaning Holiday YouTube Processors End of Support Analytics Saving Money Black Market intranet Office Tips LiFi Staffing Lithium-ion battery BYOD Downtime Passwords Streaming Media Help Desk Writing Social Networking Micrsooft Visible Light Communication Disaster Public Speaking Business Growth Data Management IP Address Virtualization Robot Advertising Recovery
QR-Code