{"id":10404,"date":"2015-12-02T18:16:16","date_gmt":"2015-12-02T23:16:16","guid":{"rendered":"http:\/\/www.thundercloud.net\/infoave\/new\/?p=10404"},"modified":"2015-12-02T18:23:24","modified_gmt":"2015-12-02T23:23:24","slug":"the-pharmer-in-the-dell-redux","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/the-pharmer-in-the-dell-redux\/","title":{"rendered":"The Pharmer in the Dell:  Redux"},"content":{"rendered":"<h1><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" src=\"http:\/\/thundercloud.net\/infoave\/images\/2016\/pharmer.png\" alt=\"\" width=\"83\" height=\"153\" \/>The Pharmer in the Dell: Redux<\/h1>\n<p>Ten years ago, in 2005, Dell tried sneaking malware\/PUPs onto their computers and <a href=\"http:\/\/thundercloud.net\/infoave\/pharmer-rant.htm\" target=\"_blank\"><span style=\"text-decoration: underline;\">we wrote it up and called them out<\/span>.<\/a>\u00a0In 2012 we <span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/the-pharmer-in-the-dell-rewind\/\" target=\"_blank\">republished the article<\/a> <\/span>( with some changes ) because Dell again tried to trick consumers into purchasing computers with pre-installed malware and\/or PUPs.<\/p>\n<p>Well, the more things change, the more they stay the same. Dell is calling &#8220;Foul!&#8221; because, they claim, they had no idea Dell certificate was very similar to the <span style=\"text-decoration: underline;\"><a href=\"http:\/\/www.pcworld.com\/article\/2887392\/lenovo-hit-with-lawsuit-over-superfish-snafu.html\" target=\"_blank\">Superfish malware that Lenovo installed<\/a><\/span> on their computer a couple of years ago. Dell got caught (as did Lenovo) and are trying to walk it back.<\/p>\n<p>Our friends at <span style=\"text-decoration: underline;\"><a href=\"http:\/\/thundercloud.net\/emsisoft\/\" target=\"_blank\">Emsisoft<\/a> <\/span>have written a great article about Dell&#8217;s faux pas and we&#8217;ve republished it (below). We found this article spot on and informative; we hope you do as well.<\/p>\n<blockquote>\n<h2>Superfish reloaded: eDellRoot certificate punching a huge security hole in your new Dell computer<\/h2>\n<p>If you have recently bought a new Dell computer, it could come with a very dangerous security flaw. The flaw means that that malicious websites or software could be automatically trusted by Dell\u2019s security software. It also means you are vulnerable, when using public Wi-Fi networks, to so-called \u201dman-in-the-middle\u201d attacks.<\/p>\n<p>Dell has acknowledged that a self-signed root certificate called eDellRoot, pre-installed on its new PCs, introduces the security vulnerability. The certificate was implemented as part of a support tool and intended to make it faster and easier for its customers to service their system. However, being a \u201cself-signed\u201d certificate, eDellRoot enables attackers to intercept traffic from an affected Dell laptop and any HTTPS-enabled website. The hacker can then act as proxy between the laptop and the website by re-encrypting the traffic with a rogue certificate that\u2019s signed with the eDellRoot private key.<\/p>\n<p>It\u2019s not yet clear how many models are affected, although users have reported finding it on Dell XPS 15 and XPS 13 models, as well as a Latitude and an Inspiron 5000 series model.<\/p>\n<p>Dell is now providing customers with removal instructions and says it will not add it to new devices going forward. The removal instructions can be downloaded here.<\/p>\n<h4>Dell fishing for trouble with this latest security flaw<\/h4>\n<p>It is an extremely embarrassing situation for the company, which publicly criticised its competitor Lenovo in February this year when Lenova pre-installed a program called Superfish that included a self-signed root certificate.<\/p>\n<p>As one Dell XPS 15 laptop user says, \u201cTo add insult to injury, it\u2019s not even apparent what purpose the certificate serves. At least with Superfish we knew that their rogue root CA was needed to inject ads into your web pages; the reason Dell\u2019s is there is unclear.\u201d<\/p>\n<p>If you have recently bought a Dell computer and want to see if you are affected by this, go to Start -&gt; type \u201ccertmgr.msc\u201d -&gt; (accept on UAC prompt) -&gt; Trusted Root Certification Authorities -&gt; Certificates and check if you have an entry with the name \u201ceDellRoot\u201d.<\/p><\/blockquote>\n<p>(Quoted article above is courtesy of <span style=\"text-decoration: underline;\"><a href=\"http:\/\/www.thundercloud.net\/emsisoft\/\" target=\"_blank\">Emsisoft<\/a>,<\/span> You can read the original article <span style=\"text-decoration: underline;\"><a href=\"http:\/\/goo.gl\/XMBiKa\">here<\/a><\/span>. )<\/p>\n<h3><span style=\"text-decoration: underline;\"><a href=\"http:\/\/thundercloud.net\/infoave\/join.htm\">Our Premium Weekly Newsletter is now FREE! Sign up today.<\/a><\/span><\/h3>\n\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Pharmer in the Dell: Redux Ten years ago, in 2005, Dell tried sneaking malware\/PUPs onto their computers and we wrote it up and called them out.\u00a0In 2012 we republished the article ( with some changes ) because Dell again tried to trick consumers into purchasing computers with pre-installed malware and\/or PUPs. Well, the more things change, the\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/the-pharmer-in-the-dell-redux\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1433,1669,1656,1654,1674],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/10404"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=10404"}],"version-history":[{"count":4,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/10404\/revisions"}],"predecessor-version":[{"id":10412,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/10404\/revisions\/10412"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=10404"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=10404"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=10404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}