Tag: Superfish

Lenovo still distributing Superfish

1413884897_463198Lenovo is still peddling notebooks pre-installed with dangerous, HTTPS-breaking adware, despite saying it had abandoned the practice.

Initially, Lenovo said the Superfish ad-injector posed no threat, a position it quickly reversed and then said the company stopped bundling the software in December.

Executives promised to release a removal tool that would delete all code and data associated with the adware.

However it looks like Lenovo might not have have told the full truth.

Ars Technica found that a new $550 Lenovo G510 notebook which was ordered in early February more than four weeks after Lenovo said it stopped bundling Superfish, still had the software.

It was not as if it was old stock stuck in the channel either, the onboard Windows had a December build date.

The next promise was about the official Superfish removal tool, which the PC maker states will “ensure complete removal of Superfish and certificates for all major browsers.”

While the tool removed the dangerous certificate—and as a result closed the serious man-in-the-middle vulnerability it posed—Lenovo’s software didn’t remove all Superfish-related data.

A Lenovo spokesman wrote in an e-mail to Ars: “If an individual customer has a specific question about their experience with the removal tool, they should contact the Lenovo Service line directly.”

Lenovo gets hacked

lenovo-logoA cyberattack by a hacking group called Lizard Squad brought down Lenovo’s web site yesterday.

That’s following the revelation that Lenovo shipped adware called Superfish on some of its notebook devices.

Lizard Squad claimed responsibility for downing the Sony site at the end of last year.

Lenovo managed to get its site up and running after people that went to its site were redirected to other web sites.

Lenovo has stopped including Superfish shipping on its machine and offered people that had encountered it a software fix to remove it.

Lizard Squad managed to use a vulnerability to Lenovo’s name registrar to divert people away from the Lenovo web site.

 

Superfish site downed after Lenovo debacle

lenovo-logoThe company that is behind the technology that powers Superfish has suffered a distributed denial of service (DDoS) attack.

That’s according to Forbes, which said the technology is called Komodio and the site is down, with the company saying the DDoS attack has happened because of media interest.

Earlier this week, it was revealed that Lenovo distributed malware with some of its machines, although because of the Chinese New Year, it doesn’t appear able to comment on the debacle.

Forbes talked to the founder of Komodia, a man who formerly worked for Israeli cyber intelligence. He said that he couldn’t comment on the Lenovo debacle because he’s under contract to the Chinese company.

But the Komodia software is included on many other software programs and is pretty easy to hack.

Software include some parental control software and in other web filter programs available worldwide.

Lenovo installed malware on laptops

lenovo_hqA security firm made the alarming assertion that Lenovo had pre-installed software on notebooks it sells that makes them more likely to be hacked.

The program called Superfish, which Lenovo installed on computers intended for home use was software that auto-displays adverts.

And according to Reuters, Errata Security, an American company, said Superfish opens up encrypted connections, so letting hackers take over PCs.

Lenovo officials are on holiday for the Chinese New Year and so far have not responded to the allegations.

However, Ken Westin, a senior security analyst at Tripwire had plenty to say on the matter.

“With increasingly security and privacy conscious buyers, laptop and mobile phone manufacturers may well be doing themselves a disservice by seeking outdated advertising based monetisation strategies,” he said.

“If the findings are true and Lenovo is installing their own self-signed certificates, they have not only betrayed their customers’ trust, but also put them at increased risk,” he added.