Menu
Lenovo PCs ship with adware that puts computers at risk

Lenovo PCs ship with adware that puts computers at risk

Superfish software installed on Lenovo computers uses a self-generated root certificate to intercept HTTPS communications

Some Windows laptops made by Lenovo come pre-loaded with an adware program that exposes users to security risks.

The software, Superfish Visual Discovery, is designed to insert product ads into search results on other websites, including Google.

However, since Google and some other search engines use HTTPS (HTTP Secure), the connections between them and users' browsers are encrypted and cannot be manipulated to inject content.

To overcome this, Superfish installs a self-generated root certificate into the Windows certificate store and then acts as a proxy, re-signing all certificates presented by HTTPS sites with its own certificate. Because the Superfish root certificate is placed in the OS certificate store, browsers will trust all fake certificates generated by Superfish for those websites.

This is a classic man-in-the-middle technique of intercepting HTTPS communications that's also used on some corporate networks to enforce data leak prevention policies when employees visit HTTPS-enabled websites.

However, the problem with Superfish's approach is it uses the same root certificate with the same RSA key on all installations, according to Chris Palmer, a Google Chrome security engineer who investigated the issue. In addition, the RSA key is only 1024 bits long, which is considered cryptographically unsafe today because of advances in computing power.

The phasing out of SSL certificates with 1024-bit keys started several years ago, and the process has been accelerated recently. In January 2011, the U.S. National Institute of Standards and Technology said that digital signatures based on 1024-bit RSA keys should be disallowed after 2013.

Regardless of whether the private RSA key that corresponds to the Superfish root certificate can be cracked or not, there is the possibility that it could be recovered from the software itself, although this has not yet been confirmed.

If attackers obtain the RSA private key for the root certificate, they could launch man-in-the-middle traffic interception attacks against any user that has the application installed. This would allow them to impersonate any website by presenting a certificate signed with the Superfish root certificate that's now trusted by systems where the software is installed.

Man-in-the-middle attacks can be launched over insecure wireless networks or by compromising routers, which is not an uncommon occurrence.

"The saddest part about #superfish is it's only like 100 more lines of code to generate a unique fake CA signing cert for each system," said Marsh Ray, a security expert who works for Microsoft, on Twitter.

Another problem pointed out by users on Twitter is that even if Superfish is uninstalled, the root certificate it creates is left behind. This means affected users will have to manually remove it in order to be completely protected.

It's also not clear why Superfish is using the certificate to perform a man-in-the-middle attack on all HTTPS websites, not just search engines. A screen shot posted by security expert Kenn White on Twitter shows a certificate generated by Superfish for www.bankofamerica.com.

Superfish did not immediately respond to a request for comment.

Mozilla is considering ways to block the Superfish certificate in Firefox, even though Firefox does not trust certificates installed in Windows and uses it's own certificate store, unlike Google Chrome and Internet Explorer.

"Lenovo removed Superfish from the preloads of new consumer systems in January 2015," a Lenovo representative said in an emailed statement. "At the same time Superfish disabled existing Lenovo machines in market from activating Superfish."

The software was only preloaded on a select number of consumer PCs, the representative said, without naming those models. The company is "thoroughly investigating all and any new concerns raised regarding Superfish," she said.

It seems that this has been happening for a while. There are reports about Superfish on the Lenovo community forum going back to September 2014.

"Preinstalled software is always a concern because there's often no easy way for a buyer to know what that software is doing -- or if removing it will cause system problems further down the line," said Chris Boyd, a malware intelligence analyst at Malwarebytes, via email.

Boyd advises users to uninstall Superfish, then to type certmgr.msc into the Windows search bar, open the program and remove the Superfish root certificate from there.

"With increasingly security and privacy conscious buyers, laptop and mobile phone manufacturers may well be doing themselves a disservice by seeking outdated advertising based monetization strategies," said Ken Westin, a senior security analyst at Tripwire. "If the findings are true and Lenovo is installing their own self-signed certificates, they have not only betrayed their customers' trust, but also put them at increased risk."


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags privacymozillaLenovoonline safetypkiSuperfish

Brand Post

Featured

Slideshows

Reseller News Platinum Club celebrates leading partners in 2019

Reseller News Platinum Club celebrates leading partners in 2019

The leading players of the New Zealand channel came together to celebrate a year of achievement at the annual Reseller News Platinum Club lunch in Auckland. Following the Reseller News Innovation Awards, Platinum Club provides a platform to showcase the top performing partners and start-ups of the past 12 months.

Reseller News Platinum Club celebrates leading partners in 2019
Reseller News hosts alumnae breakfast for Women in ICT Awards

Reseller News hosts alumnae breakfast for Women in ICT Awards

Reseller News hosted its second annual alumnae breakfast for the Women in ICT Awards in New Zealand, designed to showcase the leading female leaders in the industry. Held at The Cordis in Auckland, attendees came together to hear inspiring keynotes and panel discussions, alongside high-level networking among peers. Photos by Gino Demeer.

Reseller News hosts alumnae breakfast for Women in ICT Awards
Reseller News Innovation Awards 2019: meet the winners

Reseller News Innovation Awards 2019: meet the winners

Reseller News honoured the standout players of the New Zealand channel in front of more than 480 technology leaders in Auckland on 23 October, recognising the achievements of top partners, emerging entrants and innovative start-ups.

Reseller News Innovation Awards 2019: meet the winners
Show Comments