Skip to main content

Lenovo Accused of Shipping PCs With Adware That Breaks HTTPS Browsing


Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54

By Eduard Kovacs on February 19, 2015
 Many Lenovo users started complaining last year about a piece of adware being pre-installed on their new computers. After a close analysis, experts have determined that the application poses serious security risks. The culprit appears to be WindowShopper - Discover Visually, a browser add-on developed by visual search company Superfish. The application analyzes images displayed on Web pages and searches for similar or nearly identical items so that users can compare prices and find deals. The add-on basically injects third-party ads into Web pages. Full Article

50 replies

Rakanisheu Retired
Not the first time either, the Lenovo browser guard is also blocked by a number of AV companies (Webroot included). It's one of the reasons why I do like to build my own PC's. 

nic
Forum|alt.badge.img+56
  • Retired Webrooter
  • 6752 replies
  • February 19, 2015
There's a Forbes article that has steps to check and see if it is on your machine, and steps to remove it:
http://www.forbes.com/sites/thomasbrewster/2015/02/19/superfish-need-to-know/
 
To find out if you’re affected, locate Windows’ list of trusted certificates by opening up the Control Panel and searching for “certificates”. This will bring up Administrative Tools and a “manage computer certificates” option. Click on the “Trusted Root Certification Authorities” option and then “Certificates”. This will bring up a list of certificates. If you see one with Superfish Inc attached to it, you may be vulnerable.
 
Even users who do find it, uninstalling the program does not get rid of the problem, as that will not remove the certificate. So for anyone concerned that Superfish is still swimming around their computer, the best option might be to back everything up on their systems and install a new operating system. It might be a good excuse to upgrade to a more secure OS anyway.

nic
Forum|alt.badge.img+56
  • Retired Webrooter
  • 6752 replies
  • February 19, 2015
Here's the official (mealy-mouthed) statement from Lenovo on the matter: http://news.lenovo.com/article_display.cfm?article_id=1929

nic
Forum|alt.badge.img+56
  • Retired Webrooter
  • 6752 replies
  • February 19, 2015
Here's a site you can use to check and see if you have the Superfish certificate on your Lenovo machine:
https://filippo.io/Badfish/

nic
Forum|alt.badge.img+56
  • Retired Webrooter
  • 6752 replies
  • February 19, 2015
The most thorough article I've read so far:
http://arstechnica.com/security/2015/02/lenovo-pcs-ship-with-man-in-the-middle-adware-that-breaks-https-connections/
 
The key problems are:
1. It installs a root certificate
2. That certificate is the same on all machines
3. The password for the private key was easily cracked
 
That means anyone using a computer with this certificate on it can be fooled by any site into believing it is legit:
 


Forum|alt.badge.img+5
  • New Voice
  • 24 replies
  • February 19, 2015
Followed all instructions through Firefox removal and restart. Test seems stuck on the bad result.  When I go to the can I be fished website I get Error 404.  Am I ok? thanks

  • 1122 replies
  • February 19, 2015
https:///t5/Security-Industry-News/Lenovo-Security-Issue/m-p/51940
 
Could there be an indirect connection?

nic
Forum|alt.badge.img+56
  • Retired Webrooter
  • 6752 replies
  • February 19, 2015
@ wrote:
Followed all instructions through Firefox removal and restart. Test seems stuck on the bad result.  When I go to the can I be fished website I get Error 404.  Am I ok? thanks
This website will load either way and have an image that lets you know if you're safe or not: https://filippo.io/Badfish/
 
Also you'll want to test with Chrome or IE, as Firefox uses its own certs and won't show you if your computer is affected or not.

nic
Forum|alt.badge.img+56
  • Retired Webrooter
  • 6752 replies
  • February 19, 2015

Forum|alt.badge.img+5
  • New Voice
  • 24 replies
  • February 20, 2015
I appreciate your advice on this.  If followed the removal instructions and get and get clean messages from the https://filippo.io/Badfish/ website from IE and firefox, but chrome still says "Yes your connections can be tampered with".  Do you know how to fix chrome?
Thanks

Forum|alt.badge.img+5
  • New Voice
  • 24 replies
  • February 20, 2015
Now the fillipo site is saying I'm probably ok.  Don't know what changed, but I guess I'm good.  Thanks again for the help.  I can't believe lenovo pulled this stunt, but thanks to the WSA community for the help.

Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54

Company backs away from earlier claim there was no merit to security concerns.

by Dan Goodin - Feb 19, 2015
 
Lenovo officials are starting to come around to something most people in security circles are saying in an almost unanimous voice—the pre-installation of a fake HTTPS certificate on consumer laptops puts banking passwords and other sensitive information at risk of theft by man-in-the-middle hackers.
 
"We agree that this was not something we want to have on the system, and we realized we needed to do more," Lenovo CTO Peter Hortensius said in an interview with The Wall Street Journal, referring to adware from a company called Superfish. "Obviously in this case we didn't do enough."
 
Full Article

Rakanisheu Retired
Maybe a good time to pickup a cheap Lenovo :D Format it and put on a clean copy of Windows. Job done!

Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54
 
@ wrote:
Maybe a good time to pickup a cheap Lenovo :D Format it and put on a clean copy of Windows. Job done!
Good idea actually. They are certainly backtracking now and are providing removal instructions Lenovo Provides Instructions for Removing Superfish But like you say putting a clean copy of Windows would be safer and then you could feel  more confident as well.

  • Community Guide
  • 5988 replies
  • February 21, 2015
The following article is a update:
++++++++++++++++++++++++++

Microsoft helps Lenovo, deletes Superfish 'crapware' and rogue cert.

By Gregg Keizer
 

New Windows Defender signature seeks out and destroys spying app and the self-signed certificate at the root of security fiasco.

 
Microsoft today updated its free Windows Defender and Security Essentials antivirus programs with a signature that sniffs out and deletes the rogue certificate linked to Superfish Visual Discovery, the "crapware" that blew up in Lenovo's face this week.
The signature, pegged Trojan:Win32/Superfish.A, scrubs a Windows PC of both the Superfish program and the self-signed certificate used to intercept secured traffic, according to Filippo Valsorda, a systems engineer at CloudFlare, a California security firm.
 
full article

Miquell
Community Leader
  • Community Leader
  • 828 replies
  • February 23, 2015
@ wrote:
Maybe a good time to pickup a cheap Lenovo :D Format it and put on a clean copy of Windows. Job done!
Good idea Roy :D
Personally format is the first thing I'd probably do if I have to buy any Lenovo ;)

Ssherjj
Moderator
Forum|alt.badge.img+62
  • Moderator
  • 21955 replies
  • February 23, 2015
Hi Webrooters!

I've got a Lenovo that's been formatted to Windows 7 Pro but it's going on 7 years old! So I didn't have that Superfish issue! Otherwise I'd pretty pretty upset! It's been a great laptop. Nic did say I was safe from Superfish! 😉

  • 1122 replies
  • February 23, 2015
Not so fast, Sherry!
 
It’s disturbing, going back to the article I referred to in my previous post, how as early as the mid-2000s, at the time of Lenovo’s acquisition of IBM’s PC business, western intelligence agencies were already banning Lenovos in their workplaces due to “several backdoor vulnerabilities (they had) apparently discovered during…tests”.
 
Now I’m not saying that Lenovo necessarily had any consciously nefarious motives in their more recent “trial” (Lenovo’s choice of word!) of Superfish/Komodia software on their consumer machines, but if our intelligence agencies are to be believed they would certainly seem to have form in introducing—nefariously or not—security vulnerabilities onto their devices.
 
Nor am I saying that America’s NSA are necessarily any better. But it does make me seriously wonder if I should have done a clean format of the disk on both my Lenovos at the time of purchase.

Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54
I have found these articles here which I posted today to be pretty worrying, it mentions 2 vendors Comodo and Lavasoft but it makes you wonder what else will come up.
 
Security software found using Superfish-style code, as attacks get simpler
 
That was an odd one @ the link worked a moment ago, I tried it again and it didn't but I have edited it so give it a go now.

  • 1122 replies
  • February 23, 2015
Jasper, your link https:///t5/forums/postpage/board-id/news does not take us to the article but to a "Post Message" window in Webroot Community Security Industry News window. Could you possibly edit the link so we can read the article? Many thanks!
 
I've checked my root certificates on my (Lenovo!) XP and I have found three Comodo root certificates (to the best of my knowledge, I do not run any Comodo software programmes):
1. issued by and issued to "COMODO Certification Authority"
2. issued by and issued to "COMODO ECC Certification Authority"
3. issued by and issued to "COMODO RSA Certification Authority"
 
Are they dangerous? And could it cause issues with my computer if I click "Delete" for each of them?
 
Fortunately I can find no Comodo or Lavasoft root certificates on my Windows 7 device.

Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54
Done, thank you Muddy7 for pointing it out.

  • 1122 replies
  • February 23, 2015
@ wrote:
Done, thank you Muddy7 for pointing it out.
No, the link in https:///t5/Security-Industry-News/Security-software-found-using-Superfish-style-code-as-attacks/m-p/188726/highlight/true#M12873 of "Security software found using Superfish-style code, as attacks get simpler" is strangely still taking me to a "Post Message" window in Webroot Community Security Industry News 😞

Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54
IT is fixed now, sorry for the confusion.

  • 1122 replies
  • February 23, 2015
Thanks.
 
Yes, the link works now.
 
Very disturbing. Makes you wonder what is on your computer. I have no idea what those Comodo root certificates are doing  there (see my post above).

Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54
I have some recollection of a problem with some of the certificates which Comodo was issuing quite a while ago but I cannot remember the details at present but it may be possible the certificates were issued with something you installed.

Reply