Lenovo caught installing adware on new computers

Status
Not open for further replies.
I guess say no to Lenovo laptops from now onwards. The most concerning part is why the hell are they MITM-ing people.

looks like Lenovo has been installing adware onto new consumer computers from the company that activates when taken out of the box for the first time.

The adware, named Superfish, is reportedly installed on a number of Lenovo’s consumer laptops out of the box. The software injects third-party ads on Google searches and websites without the user’s permission.


Superfish appears to affect Internet Explorer and Google Chrome on these Lenovo computers.

A Lenovo community administrator, Mark Hopkins, wrote in late January that the software would be temporarily removed from current systems after irate users complained of popups and other unwanted behavior:

We have temporarily removed Superfish from our consumer systems until such time as Superfish is able to provide a software build that addresses these issues. As for units already in market, we have requested that Superfish auto-update a fix that addresses these issues.

Hopkins defended the adware, saying that it “helps users find and discover products visually” and “instantly analyzes images on the web and presents identical and similar product offers that may have lower prices.”

He also says that users can refuse the terms and conditions when setting up their laptop, which means the software will be disabled. It doesn’t sound that straight-forward, however.



Other users are reporting that the adware actually installs its own self-signed certificate authority which effectively allows the software to snoop on secure connections, like banking websites as pictured in action below.

This is a malicious technique commonly known as a man-in-the middle attack, where the certificate allows the software to decrypt secure requests, yet Lenovo appears to be shipping this software with some of its products out of the box.

If this is true — we’ve only seen screenshots so far — Superfish could be far more dangerous than just inserting advertising.

Superfish is identified by antivirus products as adware and advised to be removed. One user created a video that details how to remove the software manually, for those that are affected.

Even though Hopkins says the company has stopped installing the software on computers, it appears that’s only “temporary” until the company behind the software makes some tweaks to stop pop-ups.

Reports of Superfish being pre-loaded on Lenovo computers have appeared on forums as early as mid-2014.

If this is as widespread as it appears to be, the news is not good for Lenovo computer owners. If you own a Lenovo machine, let us know in the comments if you find the Superfish software on your machine.

We’ve contacted Lenovo for comment on the Superfish software and will update when we hear back.

Update: Mozilla Firefox does not appear to be affected by the SSL man-in-the-middle issue, because it maintains its own certificate store.

Source: http://thenextweb.com/insider/2015/02/19/lenovo-caught-installing-adware-new-computers/
 
  • Like
Reactions: Spacescreamer
I am a bit surprised by the responses here. So basically fresh install or DOS and we are safe? If they were writing it to a protected section of the boot or building this into an addon to Lenovo drivers; fresh install was not going to help.

Anyways, here's an update on:
https://bug1134506.bugzilla.mozilla.org/attachment.cgi?id=8566794

with password for cert already leaked, I can spam you with a fake ICICI link and still appear to be a legitimate site - on Chrome and IE.

And then Lenovo says it dint make any mistake:
http://news.lenovo.com/article_display.cfm?article_id=1929

There have been couple of incidents like this recently. Previously Samsung was inserting ads into the people's movies:
http://www.theverge.com/2015/2/11/8017771/samsung-smart-tvs-inserting-unwanted-ads

So basically get a movie, play it locally and still you will get ads.

And then there was this:
http://www.cnet.com/news/samsungs-warning-our-smart-tvs-record-your-living-room-chatter/
 
  • Like
Reactions: Sobirvs
I am a bit surprised by the responses here. So basically fresh install or DOS and we are safe? If they were writing it to a protected section of the boot or building this into an addon to Lenovo drivers; fresh install was not going to help.
/

The assumption is that businesses won't resort to such drastic methods. They would only use means that will afford them the luxury of denying wrongdoing at least to some level if and when they do get caught. Like in this case, they can push the blame on to the vendor and try to redeem their own skin by saying that they are going provide a tool to clean the system of the offending software.

Putting that kind of stuff into their custom driver bundles or firmware etc. would put the blame squarely on to them.

And yeah, Smart TVs are another area where security is becoming a big concern. Internet connected, voice and visual input abilities and apps that can be running in the background is a recipe for a security disaster.[DOUBLEPOST=1424424905][/DOUBLEPOST]Guys, note that the password for the root certificate has already been cracked. This greatly increases the security risk for anybody who still has this certificate left installed on their lappy.

http://blog.erratasec.com/2015/02/extracting-superfish-certificate.html
 
Last edited:
  • Like
Reactions: Spacescreamer
I am a bit surprised by the responses here. So basically fresh install or DOS and we are safe? If they were writing it to a protected section of the boot or building this into an addon to Lenovo drivers; fresh install was not going to help.

But this case was about trusted root certificate, so that's the reason I said what i wrote in my post. Sure there are billion other ways, how about microsoft just making it inbuilt in windows. But we didn't as this is something that comes with OEM's customized windows, thus removing te pre installed windows probably is the best way to remove OEM's crap.
 
Variations of Superfish seem to be already present
http://arstechnica.com/security/201...-superfish-style-code-as-attacks-get-simpler/

Softwares from Lavasoft, Comodo are already infected!

If you are using software from Commodo;
https://blog.hboeck.de/archives/865-Adware-Privdog-worse-than-Superfish.html

If you have downloaded software from download.com, Read the following;
http://www.howtogeek.com/210265/dow...bundle-superfish-style-https-breaking-adware/

Do a SuperFish test
https://filippo.io/Badfish/
 
Status
Not open for further replies.