Homeland Security Urges Lenovo Customers To Remove Superfish 134
HughPickens.com (3830033) writes "Reuters reports that the US Department of Homeland Security has advised Lenovo customers to remove "Superfish" software from their computers. According to an alert released through its National Cyber Awareness System the software makes users vulnerable to SSL spoofing and could allow a remote attacker to read encrypted web browser traffic, spoof websites and perform other attacks on Lenovo PCs with the software installed. Lenovo inititally said it stopped shipping the software because of complaints about features, not a security vulnerability. "We have thoroughly investigated this technology and do not find any evidence to substantiate security concerns," the company said in a statement to Reuters early on Thursday. On Friday, Lenovo spokesman Brion Tingler said the company's initial findings were flawed and that it was now advising customers to remove the software and providing instructions for uninstalling "Superfish". "We should have known about this sooner," Tingler said in an email. "And if we could go back, we never would have installed this software on our machines. But we can't, so we are dealing with this head on.""
Homeland Security wakes up (Score:5, Informative)
Re:Homeland Security wakes up (Score:5, Informative)
Superfish also installed in FVD Firefox addon. (Score:1)
The last time I checked Superfish was installed in the Flash Video Downloader available from the official Mozilla Addons download website.
In the FVD source I have locally, the files of interest are superfish_titles.txt and superfish.js which are both in the modules/ directory.
Re: (Score:2)
Not their job.
So why do they Urges Lenovo Customers To Remove Superfish now?
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
use OpenBSD!
Actually installing any Linux fragrance would completely wipe-out this stinky big fish crap.
Re: (Score:2)
Re: (Score:2)
I've thought about that approach a bit. Diversifying limits the scope of any infection, but it also increases the chance of any individual infection. With a network of heterogenous systems, you need to also ensure that the network is set up to keep the systems isolated (which is even more important in a homogeneous environment anyway, so no big deal).
The best approach would be to use whatever OS is best capable of handling a specific task. But if you're not very familiar with each of the OSs deployed on you
Re: Just use OpenBSD, for crying out loud! (Score:2)
You're so funny :)
You would lose 99% of computer-using population at the "download an installation image from the website and burn it to a CD or make a bootable USB stick". That is before you had to tell them to change the device boot order in BIOS. Which is before they would run into an installer where you can't click on anything and that might as well speak hebrew to them. Which is before they realized half their hardware isn't recognized. Which is before they realize Flash doesn't work. Etc, etc etc...
Re: (Score:1)
What makes you think openbsd hasn't been corrupted by some third party? Just because of the size of the target? Even squirrels get shot for food, and that's a small target. You are betting on security thru obscurity, not a safe bet.
Silly goose - haven't you heard? FreeBSD is the cure to all problems. To the point where you can say you have a bunion on your foot, yup, FreeBSD will fix that for ya. It's like a modern washday miracle!
Re: (Score:2)
What makes you think openbsd hasn't been corrupted by some third party? Just because of the size of the target? Even squirrels get shot for food, and that's a small target. You are betting on security thru obscurity, not a safe bet.
Silly goose - haven't you heard? FreeBSD is the cure to all problems. To the point where you can say you have a bunion on your foot, yup, FreeBSD will fix that for ya. It's like a modern washday miracle!
Well you see FreeBSD does everything you need, so there's no need to stand up ever again. So the bunion on your foot won't matter.
Re: (Score:2)
"Lenovo began installing Superfish VisualDiscovery software on some of its computers as early as 2010 [wikipedia.org]". And Homeland Security, with all their skillful teams, their heavy means, could not figure out that dirty adware before 2015?
You assume that homeland security do something useful. The reality is they sit around and wait for some major crisis in the mainstream media. Then they jump up and issue statements, press-releases, and suggestions in a futile attempt to appear relevant and useful.
Re: (Score:2)
They run FEMA - heck of a job! ... I've got nothing.
They also send people around to toy shops to check for copyright violations on Rubik's cubes.
They also
Re: (Score:2)
DHS Internal Memo (Classified) (Score:2)
Hey! We found a chance to get positive PR! Such a rare occurence...contact the spin department!
Re: (Score:2, Offtopic)
Exactly, I'm not sure why this story is gracing the front page, I think the Initial story and Lenovo removing it story cover it. Also an MS update removes it anyway.
Re: (Score:1)
I'd suggest to recommend uninstalling windows too (Score:2, Insightful)
as most viruses and trojans today are written for windows.
Re:I'd suggest to recommend uninstalling windows t (Score:5, Insightful)
Re: (Score:2)
Linux would certainly rise the entry level for malware writers, which would make malware writing a less promising market.
Re: (Score:2)
Re:I'd suggest to recommend uninstalling windows t (Score:4, Interesting)
Linux would certainly rise the entry level for malware writers, which would make malware writing a less promising market.
Today's Linux, maybe. The Linux that's been rewritten so 90%+ of the population will use it... doubtful. You'd probably have to make sudo escalation as easy as UAC escalation and once you run as administrator/root it's pretty much game over no matter what system you're on.
Re: (Score:2)
Re: (Score:2)
For the typical Windows/Mac/Ubuntu user who would install malware, the only time they ever type an OS-related password on their system is to perform superuser tasks. Most people don't use passwords on their personal computers and have automatic login set up. The fact that the sudo password is the same as their account password is irrelevant because they only ever use it to perform superuser tasks anyway.
Re: (Score:1)
I remind you of the rant Linus Torvalds had with SUSE where his daughter needed to know the root password to install printers.
I think a not so super level is required for limited system change rights.
Re: (Score:2)
Not even today's Linux. How many distros actually have AppArmor/SELinux enabled?
Re:I'd suggest to recommend uninstalling windows t (Score:4, Insightful)
That may be true.
It's not applicable in this case, because this is OEM-installed adware. Everything it does can be implemented just fine on a Linux system. The solution is really the same for this sort of thing regardless of whether you're talking Windows or Linux -- don't use the OEM-provided pile of crapware that comes with the machine; install a brand-new copy of just the OS.
Re: (Score:2)
true.
Re: (Score:3)
To be fair, 90% OSes in the world are Windows. What do you think would happen if 90% OSes were Linux (besides my complete satisfaction)?
I can't say for sure - but I doubt people would be touting the security of Windows.
Re: I'd suggest to recommend uninstalling windows (Score:1)
Easy. Shit ware, Trojaned app stores, and fake certicates would come pre-installed on them with Linux too.
Folks put your linux advocacy aside as linux has Trojans too. They simply aren't targeted as linux users are smarter and can delete them. Not because modern windows is somehow less secure.
Hasn't been true since XP SP 1 died. Windows today is as secure if not more than linux design wise. It has ACL lists, low rights sandboxing options and so on.
Re: (Score:2)
That 90% OS's is of course, one great big fat lie. Let's try and count mobile devices in that and as they greatly outnumber desktops and that doesn't include servers either. So yeah, windows, they are well below 50% and falling fast with regard to OS installations. When it comes to Lenovo and superfish and their intent was to 'supplement the shopping experience', seriously piss of you public relations shit heads, that makes them a dead product manufacturer for at least a decade, simply not to be trusted, r
"...if 90% OSes were Linux..." (Score:2)
To be fair, 90% OSes in the world are Windows. What do you think would happen if 90% OSes were Linux (besides my complete satisfaction)?
Then the year of the Linux desktop would be 3 years away instead of 5 years away.
Re: (Score:2)
Re: (Score:2)
as most viruses and trojans today are written for windows.
Are you suggesting that Lenovo couldn't have done this if Linux was preinstalled?
Re: (Score:2)
Are you suggesting that Lenovo couldn't have done this if Linux was preinstalled?
Lenovo wouldn't have dared doing it.
Re: (Score:2)
Wut? I know Linus is a bit of a hard case, but I kinda doubt that Lenovo shivers in their corporate boots every time they here his name mentioned.
Re: (Score:2)
Re: (Score:2)
What about all those nefarious apps in the Android app store? Do you recommend not using Android either?
Head on? (Score:5, Informative)
They've been doing nothing but putting spin on this since it blew up in their face. Claiming they installed it to enhance the user's experience instead of because they were paid to. Claiming there's no security risk. Claiming they stopped it because of complaints of the "features", rather than because their customers believed it to be intrusive and dangerous. Claiming it can be simply and completely removed with a standard uninstall, which does not remove the custom certificate and vulnerability. Retracting statements and making apologies while dodging the actual issue.
I don't expect many will accept this as a suitable definition of "head on".
Re:Head on? (Score:4, Insightful)
I smell a class action (Score:2)
Re: (Score:2)
They've been doing nothing but putting spin on this since it blew up in their face.
Spin. Present day corporatese for lies and deception.
My, how those ugly accusations have been made to sound pretty.
Re: (Score:1)
Yes, they were disingenuous about the intent. The claim that there was no security risk was due to incompetence rather than trying to lie, and to be fair, no one had highlighted the TLS proxy facet until recently and that statement came a significant time ago. I think this is more incompetent bungling more than willful maliciousness. For the past that's of no significant comfort, but it does suggest they could learn from their mistakes.
Besides, Lenovo isn't the only delivery vector here. There's a crap
Re: (Score:2)
I don't expect many will accept this as a suitable definition of "head on".
In less than a day it has gone from scandal to basically resolved. Let me reword that sentence for emphasis: The company has responded to the issue within a day of complaints. Honestly how many companies have done this? How long was the Sony rootkit an issue before they released an uninstall? 2 years! How long do we wait for major security vulnerabilities to be resolved from the worlds largest software vendors? Often months, sometimes that long even after public disclosure.
PR drones are idiots, if they were
Re: (Score:2)
"In less than a day it has gone from scandal to basically resolved."
What? Not even close! What about the damage this shit does to OTHER PROGRAMS I INSTALL that Lenovo has no business touching? Their fix DOESN'T FIX THAT.
And you call the issue resolved? How easy to appease are you?
Re: (Score:2)
Care to cite examples of ongoing sustained damage that isn't resolved by removing the offending program and the associated SSL certificate?
Re: (Score:2)
Uh, yea. Trust of ANY program on your computer. Damage is done and continuing to be dealt.
Re: (Score:1)
In less than a day it has gone from scandal to basically resolved
LMFAO!!! Not even close. Its only been less than a day SINCE YOU HEARD ABOUT IT. They've been in the media for installing Superfish for the last 5 years. It just finally hit mainstream media, and they resolved it in less than a day since it blew up in their faces.
Re: (Score:2)
Some guy accurately describes the vulnerability, complete with screenshots showing a Superfish-signed online banking page, and posts it to the public Lenovo Security-Malware support forum, and they take no public action for 29 days; yet around the same time, they stopped installing the software on new machines. Only when it's a scandal do they first make statements that are designed "to defuse the situation", which, i
Other computer manufactures (Score:4, Interesting)
Re: (Score:2)
Re: (Score:1)
At least that wikipage has decent references on it. Some portions of wikipedia are no better than getting dating advise from bathroom stall scribblings.
Re: (Score:2)
At least that wikipage has decent references on it. Some portions of wikipedia are no better than getting dating advise from bathroom stall scribblings.
[ citation needed ]
Re: (Score:2)
Superfish is just the tip of the iceberg.
Corrupting a Windows machine's CA store is very common in "enterprise" environments where your employer wishes to proxy all outgoing SSL/TLS connections.
The fact that most people are completely unaware of this is disturbing, but unsurprising.
Re: (Score:2)
My employer is allowed to monitor all I do on their hardware. It is their hardware on their network in the time they pay me for.
More details needed (Score:4, Funny)
Unless you want a permanent war footing (Score:1)
I've got a Lenovo laptop (Score:2, Interesting)
Its a G series consumer model.
It doesn't have "Superfish", never has had. I followed the manual removal procedure and didn't find any references to it.
Of course, this is probably only a feature of US Lenovo laptops, Lenovo Europe has probably got an equivalent fishing/manipulation system called someting else and are keeping quiet about it. "We don't install Superfish! OhhhNooooooo!!!!!".
Superfish has offices in Palo Alto, California and (Score:2, Interesting)
Petah Tiqva, Israel.
Re: (Score:2)
Heh (Score:2)
I think it's interesting that Lenovo posts not just the "Automatic Removal Tool," but also the source code to the tool. What I want to know is this: has anyone compiled it, and managed to get their compile options/environment such that they came up with a binary that matches the downloadable tool?
Re: (Score:2)
On Windows using MSFT's compilers you'll never get the same binary twice. There's timestamps and GUIDs (the latter for uniquely associating a pdb with an executable file). Different file paths to the source tree can also cause differences. Sometimes it's straightforward to pick out & ignore the GUID, timestamp, and checksum bytes that changed, but often not.
Re: (Score:2)
Consumers need to walk (Score:2)
or Run away from companies that literally attempt to cause consumers security problems and consumers should never come back. That's the only way companies are going to learn to be buyer/customer oriented.
Another possibility.. (Score:1)
Re: (Score:2)
Mission creep (Score:2)
Why, thank you! I had no idea you cared!
Homeland security is now an expert on computer security? Will they do as wonderful a job here as they've done at airports? Will Americans soon have to flash their national IDs at the computers before being allowed on the Internet?
What the devil is Homeland Security doing issuing such a statement? Mission creep to the nth degree...
Mission creep is what they ARE (Score:2)
Enforcing copyright on Rubik's cubes - that's them. Disaster recovery - that's them.
Remove Superfish! DL our convenient uninstaller! (Score:4, Interesting)
Hello!
We, your neighbourly friends over at DHS got your back and we've provided a convient uninstaller for that nasty pieve of Chinese spyware a/k/a Superfish. Please indicate if you are a US Citizen/Resident* then click download, run and just click Yes to run as an Administrator. Kthxbye!
* US Citizens/Residents will be provided by a similar download from our technology partners at gchq-dl.gov.uk.
Re: (Score:1)
that nasty pieve of Chinese spyware a/k/a Superfish.
If anything, the technology behind Superfish is Israeli
Re: (Score:2)
Re: (Score:2)
A better way to uninstall Superfish (Score:5, Informative)
http://windows.microsoft.com/e... [microsoft.com]
And get rid of all of the other crapware that Lenovo put on your PC in one fell swoop. No doubt it will take more effort to do it this way but it will also be more complete. (I have no idea if this works outside the US.)
For further information I wold check the ideapad section at notebookreview.com where you can find reinstallation help (including the thread I just started.)
Re: (Score:3)
Re: (Score:2)
Superfish was previously included on some consumer notebook products shipped between September 2014 and February 2015 to assist customers with discovering products similar to what they are viewing. However, user feedback was not positive, and we responded quickly and decisively
What nerve!
Dirty little spammer goes corporate (Score:2)
Windows Defender takes care of it already (Score:4, Informative)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Let me just download this Windows Defender update so it can clear off the program that does MITM attacks... oh, wait...
Re: (Score:2)
Why doesn't windows defender alert you when your employer pushes their proxy's CA into your work machine's trusted CA list via group policy push?
Re: (Score:2)
DHS red alert! (Score:2)
Because, just like with robbery, the government hates competition.
Hypocracy unlimited (Score:1)
Too late. (Score:2)
Too late.
If it's already been exploited to install other malware, removing the loader for that malware isn't going to get rid of the malware that came in while the door was being held open by Superfish.