This recently discovered malware is a blackmailer. It threatens it victims to pay $50, or their private informations, data and web history will be exposed to all of their contacts.
![Beware! LeakerLocker Malware Will Expose Your Personal Data to Everyone](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSpHd9NoKGACG2-sIDbflBipjX4dc3yF738OzWJ0q9Sqfj0LW0JD4iHyx4pScN1UBIKFl2gtcWxAY-OdsmkQt7rdCT2-oQj229ZZ1dC05yIJgirMplBE8NSyzqS3p46RA367-ASpQAD9Rm/s2560/%255BUNSET%255D)
That's what LeakerLocker malware does, and dissapointingly, it was found in the Google Play Store - which ought to be virus free. LeakerLocker Modus operandi is quite different from other ransomware's who encrypt its victims’ files. Rather, LeakerLocker creates a backup of victims’ data stored on the device. Then the blackmail starts where the developers of the malware demand $50 in exchange for not leaking your personal info - which includes web history, emails, location history and more - to your phone and email contacts.
LeakerLocker Malware was found in "Wallpaper Blur HD" and "Booster & Cleaner Pro" applications on Google Play Store. With the latter been downloaded 10,000 times, the former having 5,000 downloads by Android users and both having good - but manipulated - reviews. So, about 15,000 people have already fallen victim to this LeakerLocker malware, which has been in the Google Play Store since April this year.
HOW LEAKERLOCKER MALWARE OPERATES
Immediately you download any of these vulnerable apps, LeakerLocker asks for a large number of permissions, including the ability to manage calls, read and send text messages, and access contacts. After granting it access, the malware communicates with a receiver, thus initiating the malicious activity and locking the Home screen of the device with an extortion threat. Analysis of the malware code shows that it is capable of accessing an email address, some contact information, Chrome browser history, text messages and calls, and photos from the camera.
HOW LEAKERLOCKER PAYMENT IS MADE
LeakerLocker demands the ransom via credit card. However, researchers have advised victims not to pay up, because there’s no guarantee that the information will be released or not. McAfee researchers have reported the malware to Google, and the offending apps have been removed from the Google Play Store.
That's what LeakerLocker malware does, and dissapointingly, it was found in the Google Play Store - which ought to be virus free. LeakerLocker Modus operandi is quite different from other ransomware's who encrypt its victims’ files. Rather, LeakerLocker creates a backup of victims’ data stored on the device. Then the blackmail starts where the developers of the malware demand $50 in exchange for not leaking your personal info - which includes web history, emails, location history and more - to your phone and email contacts.
LeakerLocker Malware was found in "Wallpaper Blur HD" and "Booster & Cleaner Pro" applications on Google Play Store. With the latter been downloaded 10,000 times, the former having 5,000 downloads by Android users and both having good - but manipulated - reviews. So, about 15,000 people have already fallen victim to this LeakerLocker malware, which has been in the Google Play Store since April this year.
HOW LEAKERLOCKER MALWARE OPERATES
Immediately you download any of these vulnerable apps, LeakerLocker asks for a large number of permissions, including the ability to manage calls, read and send text messages, and access contacts. After granting it access, the malware communicates with a receiver, thus initiating the malicious activity and locking the Home screen of the device with an extortion threat. Analysis of the malware code shows that it is capable of accessing an email address, some contact information, Chrome browser history, text messages and calls, and photos from the camera.
HOW LEAKERLOCKER PAYMENT IS MADE
LeakerLocker demands the ransom via credit card. However, researchers have advised victims not to pay up, because there’s no guarantee that the information will be released or not. McAfee researchers have reported the malware to Google, and the offending apps have been removed from the Google Play Store.
Copy the link below and Share with your Friends:
No comments:
Post a Comment