• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

McLaren Health Care data breach impacted over 743,000 people

 | 

American steel giant Nucor confirms data breach in May attack

 | 

The financial impact of Marks & Spencer and Co-op cyberattacks could reach £440M

 | 

Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes' Data from Saudi Games

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 50

 | 

Security Affairs newsletter Round 529 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Iran confirmed it shut down internet to protect the country against cyberattacks

 | 

Godfather Android trojan uses virtualization to hijack banking and crypto apps

 | 

Cloudflare blocked record-breaking 7.3 Tbps DDoS attack against a hosting provider

 | 

Linux flaws chain allows Root access across major distributions

 | 

A ransomware attack pushed the German napkin firm Fasana into insolvency

 | 

Researchers discovered the largest data breach ever, exposing 16 billion login credentials

 | 

China-linked group Salt Typhoon breached satellite firm Viasat

 | 

Iran experienced a near-total national internet blackout

 | 

Malicious Minecraft mods distributed by the Stargazers DaaS target Minecraft gamers

 | 

Healthcare services company Episource data breach impacts 5.4 Million people

 | 

Watch out, Veeam fixed a new critical bug in Backup & Replication product

 | 

U.S. CISA adds Linux Kernel flaw to its Known Exploited Vulnerabilities catalog

 | 

News Flodrix botnet targets vulnerable Langflow servers

 | 

U.S. CISA adds Apple products, and TP-Link routers flaws to its Known Exploited Vulnerabilities catalog

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Hacking
  • Malware
  • Superfish adware in the Lenovo laptops is a threat to the users

Superfish adware in the Lenovo laptops is a threat to the users

Pierluigi Paganini February 19, 2015

The presence of the Superfish software in Lenovo laptops exposes the users to serious risks of hacking. The researcher Graham explained the reason.

The news of the presence of Superfish adware in the laptops sold by the Chinese Lenovo has shocked the IT industry. The company has intentionally pre-installed a malware on laptops, but which are the consequence of the presence of the malicious code in the Lenovo devices?

Superfish represents a serious menace for the users privacy and security, it could be exploited to run man-in-the-middle attack to inject malicious code or to hack the targeted system injecting ads.

The presence of the Superfish malware makes Lenovo users more exposed to hacking attacks. To give you a clear idea of what is happening I suggest you to read an excellent post written by Robert Graham, CEO of Errata Security.

Graham explained that Superfish is a malware that hijacks and throws open encrypted connections, a circumstance that could be exploited by attackers to eavesdrop the users’ traffic.

“The software throws open encryptions by giving itself authority to take over connections and declare them as trusted and secure, even when they are not.” said Graham.

By simply extracting the certificate of the Superfish adware, the researcher was able to intercept the encrypted traffic of Lenovo laptops.

The expert reverse engineered the malicious software in a debugger (or IDApro), he cracked the password with a dictionary attack hyphotesizing that the password is probably also in the clear in the memory dump.

“I extracted the certificate from the SuperFish adware and cracked the password (“komodia”) that encrypted it. I discuss how down below. The consequence is that I can intercept the encrypted communications of SuperFish’s victims (people with Lenovo laptops) while hanging out near them at a cafe wifi hotspot. Note: this is probably trafficking in illegal access devices under the proposed revisions to the CFAA, so get it now before they change the law” wrote the researcher.

Lenovo adware digital certificate key

Finally, Graham has found the password, “komodia”, in 10 seconds with a dictionary attack using some constraint to limit the number of attempts.

Lenovo adware digital certificate key2

“Note that the password “komodia” is suggestive — that’s a company that makes an SSL “redirector” for doing exactly the sort of interception that SuperFish is doing. They market it as security software so you can spy on your kids, and stuff.”

The administrator at Lenovo official forum confirmed that since Jan. 23 it has temporarily removed Superfish from its Laptops, a statement that continues to cause confusion among users and that demonstrate the negligence of the company.

“The way the Superfish functionality appears to work means that they must be intercepting traffic in order to insert the ads,” said Eric Rand from Brown Hat Security. “This amounts to a wiretap.”

The most disconcerting aspect of the story is that one of the leaders of global PC market violated in a so blatant and intentional manner the privacy of its customers.

If you want to remove the Superfish malware follow the precious guide published by the expert Filippo Valsorda.

I wrote a guide on removing Superfish since I couldn’t find one easy and comprehensive enough. Feedback VERY welcome https://t.co/QFjnP6goEf

— Filippo Valsorda (@FiloSottile) 19 Febbraio 2015

Pierluigi Paganini

(Security Affairs –  Lenovo, Factory pre-installed malware)


facebook linkedin twitter

adware Digital Certificate Factory pre-installed malware Hacking Lenovo malware privacy root certificates Superfish

you might also like

Pierluigi Paganini June 23, 2025
Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes' Data from Saudi Games
Read more
Pierluigi Paganini June 22, 2025
Qilin ransomware gang now offers a "Call Lawyer" feature to pressure victims
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    McLaren Health Care data breach impacted over 743,000 people

    Data Breach / June 23, 2025

    American steel giant Nucor confirms data breach in May attack

    Data Breach / June 23, 2025

    The financial impact of Marks & Spencer and Co-op cyberattacks could reach £440M

    Cyber Crime / June 23, 2025

    Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes' Data from Saudi Games

    Cyber warfare / June 23, 2025

    Qilin ransomware gang now offers a "Call Lawyer" feature to pressure victims

    Breaking News / June 22, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT