<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Lenovo Superfish scandal: Why it’s one of the worst consumer computing screw-ups ever.</title>
	<atom:link href="http://www.epanorama.net/blog/2015/02/22/lenovo-superfish-scandal-why-its-one-of-the-worst-consumer-computing-screw-ups-ever/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2015/02/22/lenovo-superfish-scandal-why-its-one-of-the-worst-consumer-computing-screw-ups-ever/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 26 Apr 2026 11:16:35 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/02/22/lenovo-superfish-scandal-why-its-one-of-the-worst-consumer-computing-screw-ups-ever/comment-page-1/#comment-1351578</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 03 Mar 2015 18:47:08 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=30301#comment-1351578</guid>
		<description><![CDATA[Conn. AG launches Lenovo-Superfish &#039;crapware&#039; probe
http://www.computerworld.com/article/2889928/conn-ag-launches-lenovo-superfish-crapware-probe.html

Credit: TAKA@P.P.R.S
Asks companies to provide information in 20 days about contracts, &#039;financial arrangements,&#039; testing, much more

Three days after Chinese computer maker Lenovo promised to flush &quot;crapware&quot; from its consumer PCs, Connecticut&#039;s state attorney general announced a probe into the company&#039;s practice of bundling adware.

&quot;It&#039;s extremely concerning that, based on published reports, Lenovo installed this software -- which appears to have no meaningful benefit to the consumer -- on devices without the purchaser&#039;s knowledge,&quot;]]></description>
		<content:encoded><![CDATA[<p>Conn. AG launches Lenovo-Superfish &#8216;crapware&#8217; probe<br />
<a href="http://www.computerworld.com/article/2889928/conn-ag-launches-lenovo-superfish-crapware-probe.html" rel="nofollow">http://www.computerworld.com/article/2889928/conn-ag-launches-lenovo-superfish-crapware-probe.html</a></p>
<p>Credit: TAKA@P.P.R.S<br />
Asks companies to provide information in 20 days about contracts, &#8216;financial arrangements,&#8217; testing, much more</p>
<p>Three days after Chinese computer maker Lenovo promised to flush &#8220;crapware&#8221; from its consumer PCs, Connecticut&#8217;s state attorney general announced a probe into the company&#8217;s practice of bundling adware.</p>
<p>&#8220;It&#8217;s extremely concerning that, based on published reports, Lenovo installed this software &#8212; which appears to have no meaningful benefit to the consumer &#8212; on devices without the purchaser&#8217;s knowledge,&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/02/22/lenovo-superfish-scandal-why-its-one-of-the-worst-consumer-computing-screw-ups-ever/comment-page-1/#comment-1351347</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 03 Mar 2015 08:10:32 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=30301#comment-1351347</guid>
		<description><![CDATA[Oh No, Lenovo! Lizard Squad on the attack, flashes swiped emails
Emo-takeover better not be a viral marketing stunt to win our hearts
http://www.theregister.co.uk/2015/02/25/lenovo_hacked_lizard_squad/

Lenovo&#039;s domain name lenovo.com appears to have fallen victim to cyber-mischief-makers Lizard Squad.

The domain&#039;s nameserver settings were suspiciously updated today to point at DNS servers belonging to web hosting biz CloudFlare. 

It appears Lenovo has managed to claw back control of its domain, and is now pointing it at a legit server behind the IP address 64.26.251.145. CloudFlare security researcher Marc Rogers just tweeted

Finally, it&#039;s feared Lenovo&#039;s domain registrar, Webnic.cc, was compromised by attackers to accomplish today&#039;s DNS hijacking. Webnic.cc is down at time of writing.]]></description>
		<content:encoded><![CDATA[<p>Oh No, Lenovo! Lizard Squad on the attack, flashes swiped emails<br />
Emo-takeover better not be a viral marketing stunt to win our hearts<br />
<a href="http://www.theregister.co.uk/2015/02/25/lenovo_hacked_lizard_squad/" rel="nofollow">http://www.theregister.co.uk/2015/02/25/lenovo_hacked_lizard_squad/</a></p>
<p>Lenovo&#8217;s domain name lenovo.com appears to have fallen victim to cyber-mischief-makers Lizard Squad.</p>
<p>The domain&#8217;s nameserver settings were suspiciously updated today to point at DNS servers belonging to web hosting biz CloudFlare. </p>
<p>It appears Lenovo has managed to claw back control of its domain, and is now pointing it at a legit server behind the IP address 64.26.251.145. CloudFlare security researcher Marc Rogers just tweeted</p>
<p>Finally, it&#8217;s feared Lenovo&#8217;s domain registrar, Webnic.cc, was compromised by attackers to accomplish today&#8217;s DNS hijacking. Webnic.cc is down at time of writing.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/02/22/lenovo-superfish-scandal-why-its-one-of-the-worst-consumer-computing-screw-ups-ever/comment-page-1/#comment-1351346</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 03 Mar 2015 08:09:11 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=30301#comment-1351346</guid>
		<description><![CDATA[$250K: That&#039;s what Lenovo earned to RAT YOU OUT with Superfish
Report suggests Lenovo can be bought for peanuts as Mozilla kills dirty cert
http://www.theregister.co.uk/2015/03/03/lenovo_bagged_250k_from_superfish_deal_report/

Lenovo bagged a paltry US$250,000 from the deal that saw it install the Superfish certificate slurper onto PCs, according to reports.

The PC maker was last month caught installing the ad/bloat/malware into its consumer PCs, sparking a very considerable backlash once the software&#039;s ability to intercept encrypted website communications was revealed.

Forbes sources&#039; now say Lenovo made between US$200,000 to US$250,000 from the deal to pre-install Superfish, a paltry amount given its net profit was US$253 million in the three months to December.

At $250,000 the return on investment for Superfish is abominable: Lenovo initially defended the installation as a helpful tool for online shoppers, but quickly back-pedalled and started wheeling out senior execs at all hours of day and night to make apologetic utterances.

Mozilla, meanwhile, has decided to blast Superfish with its hot lizard breath. The outfit will eradicate self-signed Superfish certificates from the latest version of its Firefox web browser

The Superfish PR disaster has also snowballed into a lawsuit]]></description>
		<content:encoded><![CDATA[<p>$250K: That&#8217;s what Lenovo earned to RAT YOU OUT with Superfish<br />
Report suggests Lenovo can be bought for peanuts as Mozilla kills dirty cert<br />
<a href="http://www.theregister.co.uk/2015/03/03/lenovo_bagged_250k_from_superfish_deal_report/" rel="nofollow">http://www.theregister.co.uk/2015/03/03/lenovo_bagged_250k_from_superfish_deal_report/</a></p>
<p>Lenovo bagged a paltry US$250,000 from the deal that saw it install the Superfish certificate slurper onto PCs, according to reports.</p>
<p>The PC maker was last month caught installing the ad/bloat/malware into its consumer PCs, sparking a very considerable backlash once the software&#8217;s ability to intercept encrypted website communications was revealed.</p>
<p>Forbes sources&#8217; now say Lenovo made between US$200,000 to US$250,000 from the deal to pre-install Superfish, a paltry amount given its net profit was US$253 million in the three months to December.</p>
<p>At $250,000 the return on investment for Superfish is abominable: Lenovo initially defended the installation as a helpful tool for online shoppers, but quickly back-pedalled and started wheeling out senior execs at all hours of day and night to make apologetic utterances.</p>
<p>Mozilla, meanwhile, has decided to blast Superfish with its hot lizard breath. The outfit will eradicate self-signed Superfish certificates from the latest version of its Firefox web browser</p>
<p>The Superfish PR disaster has also snowballed into a lawsuit</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/02/22/lenovo-superfish-scandal-why-its-one-of-the-worst-consumer-computing-screw-ups-ever/comment-page-1/#comment-1350984</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Mar 2015 11:01:41 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=30301#comment-1350984</guid>
		<description><![CDATA[Webnic Registrar Blamed for Hijack of Lenovo, Google Domains
http://krebsonsecurity.com/2015/02/webnic-registrar-blamed-for-hijack-of-lenovo-google-domains/

Two days ago, attackers allegedly associated with the fame-seeking group Lizard Squad briefly hijacked Google’s Vietnam domain (google.com.vn). On Wednesday, Lenovo.com was similarly attacked. Sources now tell KrebsOnSecurity that both hijacks were possible because the attackers seized control over Webnic.cc, the Malaysian registrar that serves both domains and 600,000 others.

On Feb. 23, google.com.vn briefly redirected visitors to a page that read, “Hacked by Lizard Squad, greetz from antichrist, Brian Krebs, sp3c, Komodo, ryan, HTP &amp; Rory Andrew Godfrey (holding it down in Texas).” The message also included a link to the group’s Twitter page and its Lizard Stresser online attacks-for-hire service.]]></description>
		<content:encoded><![CDATA[<p>Webnic Registrar Blamed for Hijack of Lenovo, Google Domains<br />
<a href="http://krebsonsecurity.com/2015/02/webnic-registrar-blamed-for-hijack-of-lenovo-google-domains/" rel="nofollow">http://krebsonsecurity.com/2015/02/webnic-registrar-blamed-for-hijack-of-lenovo-google-domains/</a></p>
<p>Two days ago, attackers allegedly associated with the fame-seeking group Lizard Squad briefly hijacked Google’s Vietnam domain (google.com.vn). On Wednesday, Lenovo.com was similarly attacked. Sources now tell KrebsOnSecurity that both hijacks were possible because the attackers seized control over Webnic.cc, the Malaysian registrar that serves both domains and 600,000 others.</p>
<p>On Feb. 23, google.com.vn briefly redirected visitors to a page that read, “Hacked by Lizard Squad, greetz from antichrist, Brian Krebs, sp3c, Komodo, ryan, HTP &amp; Rory Andrew Godfrey (holding it down in Texas).” The message also included a link to the group’s Twitter page and its Lizard Stresser online attacks-for-hire service.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/02/22/lenovo-superfish-scandal-why-its-one-of-the-worst-consumer-computing-screw-ups-ever/comment-page-1/#comment-1350920</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Mar 2015 09:18:40 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=30301#comment-1350920</guid>
		<description><![CDATA[Lenovo: We SWEAR we&#039;re done with bloatware, adware and scumware
By Windows 10 launch our systems will be PURE, honest
http://www.theregister.co.uk/2015/02/27/lenovo_makes_bold_play_for_the_clean_pc_market_after_superfish_snaufu/

Barely a week after the breaking of the Superfish scandal, Lenovo has done a complete reverse ferret on bloatware - promising that by the time Windows 10 comes out its systems will be as pure as they can be.

“The events of last week reinforce the principle that customer experience, security and privacy must be our top priorities,” the firm said in a statement supplied to the Register today. “With this in mind, we will significantly reduce preloaded applications. Our goal is clear: To become the leader in providing cleaner, safer PCs.&quot;

The company has been in frantic firefighting mode since the discovery of the SSL-busting Superfish code in a wide range of its consumer PCs caused an uproar. It has since issued automated tools to get rid of Superfish and has worked with antivirus vendors to get the Komodia library and certificate in the adware removed.]]></description>
		<content:encoded><![CDATA[<p>Lenovo: We SWEAR we&#8217;re done with bloatware, adware and scumware<br />
By Windows 10 launch our systems will be PURE, honest<br />
<a href="http://www.theregister.co.uk/2015/02/27/lenovo_makes_bold_play_for_the_clean_pc_market_after_superfish_snaufu/" rel="nofollow">http://www.theregister.co.uk/2015/02/27/lenovo_makes_bold_play_for_the_clean_pc_market_after_superfish_snaufu/</a></p>
<p>Barely a week after the breaking of the Superfish scandal, Lenovo has done a complete reverse ferret on bloatware &#8211; promising that by the time Windows 10 comes out its systems will be as pure as they can be.</p>
<p>“The events of last week reinforce the principle that customer experience, security and privacy must be our top priorities,” the firm said in a statement supplied to the Register today. “With this in mind, we will significantly reduce preloaded applications. Our goal is clear: To become the leader in providing cleaner, safer PCs.&#8221;</p>
<p>The company has been in frantic firefighting mode since the discovery of the SSL-busting Superfish code in a wide range of its consumer PCs caused an uproar. It has since issued automated tools to get rid of Superfish and has worked with antivirus vendors to get the Komodia library and certificate in the adware removed.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/02/22/lenovo-superfish-scandal-why-its-one-of-the-worst-consumer-computing-screw-ups-ever/comment-page-1/#comment-1350903</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Mar 2015 08:32:47 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=30301#comment-1350903</guid>
		<description><![CDATA[How Superfish’s Security-Compromising Adware Came to Inhabit Lenovo’s PCs
http://www.nytimes.com/2015/03/02/technology/how-superfishs-security-compromising-adware-came-to-inhabit-lenovos-pcs.html

Until its advertising software was discovered deep inside Lenovo personal computers two weeks ago, a little company called Superfish had maintained a surprisingly low profile for an outfit once named America’s fastest-growing software start-up.

In 2013, Superfish revenues had increased more than 26,000 percent over the previous three years to $35.3 million. It had advertising deals with some of the biggest names in e-commerce — Amazon, eBay and Alibaba among them.

But as the start-up, based in Palo Alto, Calif., searched for new income sources last year, it landed a deal with Lenovo, the world’s largest PC maker, to put its software — often called adware — on several Lenovo consumer PCs.

That deal has proved disastrous. Not only has it called into question the business practices of both Lenovo and Superfish, it has shined an unflattering light on makers of this sort of advertising technology.

Superfish’s software, a security researcher revealed, was logging every online movement of the people using those Lenovo machines and hijacking the security system that is supposed to protect online communications and commerce. The Department of Homeland Security even warned Lenovo PC users to remove the software because of the risk it presented.

Superfish’s technology, security experts now say, is a particularly aggressive example of the targeted advertising technology that tracks consumers’ online movements without their knowledge.

What made its adware particularly bad, experts say, is that it fooled Lenovo customers into thinking that private sessions with their email service, or bank — secured with encryption that is often represented by the tiny padlock that appears in their web browser — were private, when Superfish, and potentially hackers, could see everything.

“The padlock is a means of telling you that who you are talking to is who you think you are talking to. Superfish made that mechanism ineffective,”]]></description>
		<content:encoded><![CDATA[<p>How Superfish’s Security-Compromising Adware Came to Inhabit Lenovo’s PCs<br />
<a href="http://www.nytimes.com/2015/03/02/technology/how-superfishs-security-compromising-adware-came-to-inhabit-lenovos-pcs.html" rel="nofollow">http://www.nytimes.com/2015/03/02/technology/how-superfishs-security-compromising-adware-came-to-inhabit-lenovos-pcs.html</a></p>
<p>Until its advertising software was discovered deep inside Lenovo personal computers two weeks ago, a little company called Superfish had maintained a surprisingly low profile for an outfit once named America’s fastest-growing software start-up.</p>
<p>In 2013, Superfish revenues had increased more than 26,000 percent over the previous three years to $35.3 million. It had advertising deals with some of the biggest names in e-commerce — Amazon, eBay and Alibaba among them.</p>
<p>But as the start-up, based in Palo Alto, Calif., searched for new income sources last year, it landed a deal with Lenovo, the world’s largest PC maker, to put its software — often called adware — on several Lenovo consumer PCs.</p>
<p>That deal has proved disastrous. Not only has it called into question the business practices of both Lenovo and Superfish, it has shined an unflattering light on makers of this sort of advertising technology.</p>
<p>Superfish’s software, a security researcher revealed, was logging every online movement of the people using those Lenovo machines and hijacking the security system that is supposed to protect online communications and commerce. The Department of Homeland Security even warned Lenovo PC users to remove the software because of the risk it presented.</p>
<p>Superfish’s technology, security experts now say, is a particularly aggressive example of the targeted advertising technology that tracks consumers’ online movements without their knowledge.</p>
<p>What made its adware particularly bad, experts say, is that it fooled Lenovo customers into thinking that private sessions with their email service, or bank — secured with encryption that is often represented by the tiny padlock that appears in their web browser — were private, when Superfish, and potentially hackers, could see everything.</p>
<p>“The padlock is a means of telling you that who you are talking to is who you think you are talking to. Superfish made that mechanism ineffective,”</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/02/22/lenovo-superfish-scandal-why-its-one-of-the-worst-consumer-computing-screw-ups-ever/comment-page-1/#comment-1349235</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 27 Feb 2015 08:42:58 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=30301#comment-1349235</guid>
		<description><![CDATA[Lizard Squad Claims Attack On Lenovo Days After Superfish
http://it.slashdot.org/story/15/02/26/1515218/lizard-squad-claims-attack-on-lenovo-days-after-superfish

Lizard Squad has claimed responsibility for a defacement of Lenovo&#039;s website. This follows last week&#039;s revelations that Lenovo installed Superfish adware on consumer laptops, which included a self-signed certificate authority that could have allowed man-in-the-middle attacks. 


Lenovo website hacked and defaced by Lizard Squad in Superfish protest
http://www.theguardian.com/technology/2015/feb/26/lenovo-website-hacked-and-defaced-by-lizard-squad-in-superfish-protest

The hacking collective took over the Lenovo site for several hours on Wednesday, redirecting users to a slideshow of bored teenagers

Lenovo, the PC maker at the centre of the Superfish controversy, suffered its own security breach on Wednesday when its main website was defaced, redirecting users to a slideshow of pictures of bored-looking teens (apparently the hackers themselves) set to the song Breaking Free from High School Musical.

The hack was apparently carried out through a “DNS hijack”, an increasingly common method whereby domain name system server, which translates a human-readable web address such as google.cominto a machine-readable IP address such as “8.8.8.8”, redirects visitors to another website – in this case, one controlled by Lizard Squad. 

“Two defacements in a single week is normally nothing, but two extremely high-profile defacements from the same registrar in the same week is a definite trend,” 

Following the hack, Lizard Squad has been posting screenshots of emails allegedly sent to Lenovo.com addresses, including one discussing Superfish. A DNS hijack can potentially gain access to emails sent during the period the site is taken over, by redirecting the email in the same way as the website. But this would not grant access to the full database of emails.

In a statement, Lenovo said: “Unfortunately, Lenovo has been the victim of a cyber attack.&quot;]]></description>
		<content:encoded><![CDATA[<p>Lizard Squad Claims Attack On Lenovo Days After Superfish<br />
<a href="http://it.slashdot.org/story/15/02/26/1515218/lizard-squad-claims-attack-on-lenovo-days-after-superfish" rel="nofollow">http://it.slashdot.org/story/15/02/26/1515218/lizard-squad-claims-attack-on-lenovo-days-after-superfish</a></p>
<p>Lizard Squad has claimed responsibility for a defacement of Lenovo&#8217;s website. This follows last week&#8217;s revelations that Lenovo installed Superfish adware on consumer laptops, which included a self-signed certificate authority that could have allowed man-in-the-middle attacks. </p>
<p>Lenovo website hacked and defaced by Lizard Squad in Superfish protest<br />
<a href="http://www.theguardian.com/technology/2015/feb/26/lenovo-website-hacked-and-defaced-by-lizard-squad-in-superfish-protest" rel="nofollow">http://www.theguardian.com/technology/2015/feb/26/lenovo-website-hacked-and-defaced-by-lizard-squad-in-superfish-protest</a></p>
<p>The hacking collective took over the Lenovo site for several hours on Wednesday, redirecting users to a slideshow of bored teenagers</p>
<p>Lenovo, the PC maker at the centre of the Superfish controversy, suffered its own security breach on Wednesday when its main website was defaced, redirecting users to a slideshow of pictures of bored-looking teens (apparently the hackers themselves) set to the song Breaking Free from High School Musical.</p>
<p>The hack was apparently carried out through a “DNS hijack”, an increasingly common method whereby domain name system server, which translates a human-readable web address such as google.cominto a machine-readable IP address such as “8.8.8.8”, redirects visitors to another website – in this case, one controlled by Lizard Squad. </p>
<p>“Two defacements in a single week is normally nothing, but two extremely high-profile defacements from the same registrar in the same week is a definite trend,” </p>
<p>Following the hack, Lizard Squad has been posting screenshots of emails allegedly sent to Lenovo.com addresses, including one discussing Superfish. A DNS hijack can potentially gain access to emails sent during the period the site is taken over, by redirecting the email in the same way as the website. But this would not grant access to the full database of emails.</p>
<p>In a statement, Lenovo said: “Unfortunately, Lenovo has been the victim of a cyber attack.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/02/22/lenovo-superfish-scandal-why-its-one-of-the-worst-consumer-computing-screw-ups-ever/comment-page-1/#comment-1349025</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 26 Feb 2015 23:21:26 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=30301#comment-1349025</guid>
		<description><![CDATA[Dan Goodin / Ars Technica:
EFF unearths evidence of possible Superfish-style attacks in the wild

EFF unearths evidence of possible Superfish-style attacks in the wild
Crypto-busting apps may have been exploited against visitors of Google and dozens more.
http://arstechnica.com/security/2015/02/researchers-unearth-evidence-of-superfish-style-attacks-in-the-wild/

It&#039;s starting to look like Superfish and other software containing the same HTTPS-breaking code library may have posed more than a merely theoretical danger to Internet users. For the first time, researchers have uncovered evidence suggesting the critical weakness may have been exploited against real people visiting real sites, including Gmail, Amazon, eBay, Twitter, and Gpg4Win.org, to name just a few.

As Ars reported one week ago, ad-injecting software pre-installed on some Lenovo laptops caused most browsers to trust fraudulent secure sockets layer certificates. The software was called Superfish. In the coming days, security researchers unearthed more than a dozen other apps that posed the same threat. The common thread among all the titles was a code library provided by an Israel-based company called Komodia.

The Komodia library modified a PC&#039;s network stack by adding a new root Certificate Authority certificate. Poor choices in both the way the certificate and underlying code were designed caused most browsers to trust fraudulent certificates that otherwise would have generated warnings. 

Until now, that danger was nothing more than a troubling hypothetical, but no more. On Wednesday, researchers presented evidence attackers have exploited the weaknesses in Superfish and the other programs to launch real man-in-the-middle attacks on end users as they visited some of the most sensitive HTTPS-protected websites on the Internet. 

Dear Software Vendors: Please Stop Trying to Intercept Your Customers’ Encrypted Traffic
https://www.eff.org/deeplinks/2015/02/dear-software-vendors-please-stop-trying-intercept-your-customers-encrypted

Over the past week many more details have emerged about the HTTPS-breaking Superfish software that Lenovo pre-installed on its laptops for several months. 

Unfortunately, the security implications have gone from bad to worse the more we’ve learned. 

What’s worse is that these attacks are even easier than researchers originally thought, because of the way Komodia’s software handles invalid certificates

an attacker doesn’t even need to know which Komodia-based product a user has (and thus which Komodia private key to use to sign their evil certificate)

To make matters worse, Komodia isn’t the only software vendor that’s been tripped up by this sort of problem.

So what can we learn from this Lenovo/Superfish/Komodia/PrivDog debacle? For users, we’ve learned that you can’t trust the software that comes preinstalled on your computers—which means reinstalling a fresh OS will now have to be standard operating procedure whenever someone buys a new computer.

But the most important lesson is for software vendors, who should learn that attempting to intercept their customers’ encrypted HTTPS traffic will only put their customers’ security at risk. Certificate validation is a very complicated and tricky process which has taken decades of careful engineering work by browser developers.2 Taking certificate validation outside of the browser and attempting to design any piece of cryptographic software from scratch without painstaking security audits is a recipe for disaster.]]></description>
		<content:encoded><![CDATA[<p>Dan Goodin / Ars Technica:<br />
EFF unearths evidence of possible Superfish-style attacks in the wild</p>
<p>EFF unearths evidence of possible Superfish-style attacks in the wild<br />
Crypto-busting apps may have been exploited against visitors of Google and dozens more.<br />
<a href="http://arstechnica.com/security/2015/02/researchers-unearth-evidence-of-superfish-style-attacks-in-the-wild/" rel="nofollow">http://arstechnica.com/security/2015/02/researchers-unearth-evidence-of-superfish-style-attacks-in-the-wild/</a></p>
<p>It&#8217;s starting to look like Superfish and other software containing the same HTTPS-breaking code library may have posed more than a merely theoretical danger to Internet users. For the first time, researchers have uncovered evidence suggesting the critical weakness may have been exploited against real people visiting real sites, including Gmail, Amazon, eBay, Twitter, and Gpg4Win.org, to name just a few.</p>
<p>As Ars reported one week ago, ad-injecting software pre-installed on some Lenovo laptops caused most browsers to trust fraudulent secure sockets layer certificates. The software was called Superfish. In the coming days, security researchers unearthed more than a dozen other apps that posed the same threat. The common thread among all the titles was a code library provided by an Israel-based company called Komodia.</p>
<p>The Komodia library modified a PC&#8217;s network stack by adding a new root Certificate Authority certificate. Poor choices in both the way the certificate and underlying code were designed caused most browsers to trust fraudulent certificates that otherwise would have generated warnings. </p>
<p>Until now, that danger was nothing more than a troubling hypothetical, but no more. On Wednesday, researchers presented evidence attackers have exploited the weaknesses in Superfish and the other programs to launch real man-in-the-middle attacks on end users as they visited some of the most sensitive HTTPS-protected websites on the Internet. </p>
<p>Dear Software Vendors: Please Stop Trying to Intercept Your Customers’ Encrypted Traffic<br />
<a href="https://www.eff.org/deeplinks/2015/02/dear-software-vendors-please-stop-trying-intercept-your-customers-encrypted" rel="nofollow">https://www.eff.org/deeplinks/2015/02/dear-software-vendors-please-stop-trying-intercept-your-customers-encrypted</a></p>
<p>Over the past week many more details have emerged about the HTTPS-breaking Superfish software that Lenovo pre-installed on its laptops for several months. </p>
<p>Unfortunately, the security implications have gone from bad to worse the more we’ve learned. </p>
<p>What’s worse is that these attacks are even easier than researchers originally thought, because of the way Komodia’s software handles invalid certificates</p>
<p>an attacker doesn’t even need to know which Komodia-based product a user has (and thus which Komodia private key to use to sign their evil certificate)</p>
<p>To make matters worse, Komodia isn’t the only software vendor that’s been tripped up by this sort of problem.</p>
<p>So what can we learn from this Lenovo/Superfish/Komodia/PrivDog debacle? For users, we’ve learned that you can’t trust the software that comes preinstalled on your computers—which means reinstalling a fresh OS will now have to be standard operating procedure whenever someone buys a new computer.</p>
<p>But the most important lesson is for software vendors, who should learn that attempting to intercept their customers’ encrypted HTTPS traffic will only put their customers’ security at risk. Certificate validation is a very complicated and tricky process which has taken decades of careful engineering work by browser developers.2 Taking certificate validation outside of the browser and attempting to design any piece of cryptographic software from scratch without painstaking security audits is a recipe for disaster.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/02/22/lenovo-superfish-scandal-why-its-one-of-the-worst-consumer-computing-screw-ups-ever/comment-page-1/#comment-1348672</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 26 Feb 2015 07:24:52 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=30301#comment-1348672</guid>
		<description><![CDATA[Russell Brandom / The Verge: 	
Lenovo.com has been hacked, possibly by Lizard Squad 
http://www.theverge.com/2015/2/25/8110201/lenovo-com-has-been-hacked-apparently-by-lizard-squad

Lenovo.com has been hacked. Starting at 4PM ET, users visiting the site saw a slideshow of disaffected youths, set to the song &quot;Breaking Free&quot; from High School Musical.

The hack comes on the heels of a wave of public criticism of Lenovo, after the company bundled computers with an encryption-breaking adware program known as Superfish. Lenovo eventually released a program to remove the software and restore affected users, but the debacle left many users unhappy with the company. That lingering mistrust may have contributed to the attack.

The attackers seem to have hijacked Lenovo&#039;s domain record, an attack that would have given them the power to redirect the lenovo.com url to a new server under their control.]]></description>
		<content:encoded><![CDATA[<p>Russell Brandom / The Verge:<br />
Lenovo.com has been hacked, possibly by Lizard Squad<br />
<a href="http://www.theverge.com/2015/2/25/8110201/lenovo-com-has-been-hacked-apparently-by-lizard-squad" rel="nofollow">http://www.theverge.com/2015/2/25/8110201/lenovo-com-has-been-hacked-apparently-by-lizard-squad</a></p>
<p>Lenovo.com has been hacked. Starting at 4PM ET, users visiting the site saw a slideshow of disaffected youths, set to the song &#8220;Breaking Free&#8221; from High School Musical.</p>
<p>The hack comes on the heels of a wave of public criticism of Lenovo, after the company bundled computers with an encryption-breaking adware program known as Superfish. Lenovo eventually released a program to remove the software and restore affected users, but the debacle left many users unhappy with the company. That lingering mistrust may have contributed to the attack.</p>
<p>The attackers seem to have hijacked Lenovo&#8217;s domain record, an attack that would have given them the power to redirect the lenovo.com url to a new server under their control.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/02/22/lenovo-superfish-scandal-why-its-one-of-the-worst-consumer-computing-screw-ups-ever/comment-page-1/#comment-1348154</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 25 Feb 2015 09:12:34 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=30301#comment-1348154</guid>
		<description><![CDATA[Superfish: Lenovo ditches adware, but that doesn&#039;t fix SSL megavuln – researcher
Here&#039;s how to zap the ad-injecting crapware
http://www.theregister.co.uk/2015/02/19/superfish_lenovo_analysis/

But the problem only hit the mainstream after security researcher Marc Rogers wrote about it on Wednesday (here), provoking the angriest reaction against a tech firm since the Sony BMG rootkit affair back in 2005.

Lenovo was deliberately breaking secure connections, making it easier in the process for any attackers to spoof any HTTPS website, say researchers. Obtaining a private key from one Lenovo laptop would allow the technically knowledgeable to snoop on the web traffic of any other Lenovo users on the same network.]]></description>
		<content:encoded><![CDATA[<p>Superfish: Lenovo ditches adware, but that doesn&#8217;t fix SSL megavuln – researcher<br />
Here&#8217;s how to zap the ad-injecting crapware<br />
<a href="http://www.theregister.co.uk/2015/02/19/superfish_lenovo_analysis/" rel="nofollow">http://www.theregister.co.uk/2015/02/19/superfish_lenovo_analysis/</a></p>
<p>But the problem only hit the mainstream after security researcher Marc Rogers wrote about it on Wednesday (here), provoking the angriest reaction against a tech firm since the Sony BMG rootkit affair back in 2005.</p>
<p>Lenovo was deliberately breaking secure connections, making it easier in the process for any attackers to spoof any HTTPS website, say researchers. Obtaining a private key from one Lenovo laptop would allow the technically knowledgeable to snoop on the web traffic of any other Lenovo users on the same network.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
