Categories: Breaking NewsHacking

Yet malicious software found on Lenovo PCs

Chinese computer manufacturers Lenovo has been caught once again using a hidden Windows feature to preinstall unwanted and unremovable rootkit.

Lenovo firm was accused several times to supplying equipment for networks of the intelligence and defense services various countries that allowed the Chinese Government to run espionage operations. In 2013, Spy agencies reportedly have a long-standing ban on Lenovo PCs due to backdoor vulnerabilities that could allow an attacker to remotely access to the computers.

Early 2015, security experts discovered that Lenovo was selling laptops pre-installed with Superfish malware.

Now it seems that the Chinese computer manufacturers has been caught once again using a hidden Windows feature to preinstall unwanted and unremovable rootkit software on certain Lenovo laptop model and desktop PCs.

The controversial feature is called “Lenovo Service Engine” (LSE), it is a function implemented in the firmware of computer sold by Lenovo.

According to the security experts, if Windows is installed on the computer, the LSE automatically downloads and installs Lenovo software. The operations start during bootstrap before the Microsoft operating system is launched, overwriting some of the Windows operating system files.

The Lenovo Service Engine injects software that updates drivers, and firmware onto Windows machine even if users completely reinstall the OS and remove pre-installed software.

On various forums, users speculate the existence of a Lenovo “bootkit” impossible to remove.

According to the company, its service doesn’t collect user data neither personally identifying information, but sends back some basic information, including the system model, date, region, and system ID.

lenovo Superfishlenovo Superfish

The company clarified that the process is done only when the machine is connected for the first time to the Internet. The service appears more invasive in laptop, the Lenovo Service Engine installs a software program called OneKey Optimizer (OKO) that bundles on several Lenovo laptops.

Lenovo explains that the OKO software is used for improving laptop performance by “updating the firmware, drivers, and pre-installed apps” as well as “scanning junk files and find factors that influence system performance.

Security experts consider functionalities implemented by the OneKey Optimizer similar to the ones used by malware to infect PCs. The OKO software is considered by experts not stable and insecure,

in April the security researcher Roel Schouwenberg reported a number of some security issues, including buffer overflows to Lenovo and Microsoft.

The company in response stopped including the LSE on its computers and issued firmware updates to fix the problems.

Lenovo has issued an official statement, which clarifies that computers sold from don’t present the issue.

Colleagues at TheHackerNews provided the instructions to remove Lenovo Service Engine:

  1. Know your System Type (whether it’s a 32-bit or 64-bit version of Windows)
  2. Browse to the Lenovo Security Advisory, and select the link for your specific Lenovo machine.
  3. Click the “Date” button for the most recent update.
  4. Search for “Lenovo LSE Windows Disabler Tool” and Click the download icon next to the version that matches your version of Windows.
  5. Open the program once it downloads. It will remove the LSE software.

Pierluigi Paganini

(Security Affairs – Lenovo, rootkit)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

China-linked UnsolicitedBooker APT used new backdoor MarsSnake in recent attacks

China-linked UnsolicitedBooker used a new backdoor, MarsSnake, to target an international organization in Saudi Arabia.…

4 hours ago

UK’s Legal Aid Agency discloses a data breach following April cyber attack

The UK’s Legal Aid Agency suffered a cyberattack in April and has now confirmed that…

7 hours ago

Sarcoma Ransomware Unveiled: Anatomy of a Double Extortion Gang

Cybersecurity Observatory of the Unipegaso's malware lab published a detailed analysis of the Sarcoma ransomware.…

9 hours ago

Mozilla fixed zero-days recently demonstrated at Pwn2Own Berlin 2025

Mozilla addressed two critical Firefox vulnerabilities that could be potentially exploited to access sensitive data…

22 hours ago

Japan passed a law allowing preemptive offensive cyber actions<gwmw style="display:none;"></gwmw>

Japan passed a law allowing preemptive offensive cyber actions, shifting from its pacifist stance to…

1 day ago