{"id":9124,"date":"2015-02-19T11:13:34","date_gmt":"2015-02-19T16:13:34","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=9124"},"modified":"2015-02-19T16:11:55","modified_gmt":"2015-02-19T21:11:55","slug":"lenovo-installs-adware-on-new-computers","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/lenovo-installs-adware-on-new-computers\/","title":{"rendered":"Lenovo Installs Adware on New Computers"},"content":{"rendered":"<header>\n<p class=\"entry-title\"><em>The following article appeared in Gizmodo, February 19, 2015<\/em><\/p>\n<blockquote>\n<h1 class=\"entry-title\">Lenovo Installs Adware\u00a0on New Computers\u00a0That Could Steal\u00a0Private Data<\/h1>\n<\/blockquote>\n<\/header>\n<section>\n<div class=\"entry-content\">\n<div>\n<div class=\"post-content entry-content \">\n<blockquote>\n<p class=\"has-media media-640\"><span class=\"img-border\"><img decoding=\"async\" class=\"img-large\" src=\"https:\/\/secure-assets.readability.com\/440f794c4ab5a1b984e93df44333dc5cebbc86db\/687474703a2f2f692e6b696e6a612d696d672e636f6d2f6761776b65722d6d656469612f696d6167652f75706c6f61642f732d2d656e707a576244512d2d2f7a6c787934756370766d646465336364636a64702e6a7067\" alt=\"Lenovo Installs Adware\u00a0on New Computers\u00a0That Could Steal\u00a0Private Data\u00a0\" width=\"636\" \/><\/span><\/p>\n<p class=\"first-text\">Oh no, Lenovo. Users are <a href=\"https:\/\/forums.lenovo.com\/t5\/Lenovo-P-Y-and-Z-series\/Lenovo-Pre-instaling-adware-spam-Superfish-powerd-by\/td-p\/1726839\">reporting on the company&#8217;s\u00a0forums<\/a>,\u00a0its computers are coming installed with adware straight out of the box\u2014that can monitor secure connections.<\/p>\n<p>According to a number of Lenovo users, the software called Superfish is installed on factory-fresh laptops. The adware injects third-party ads into Google searches and on to websites without the user&#8217;s permission\u2014on Chrome and Internet Explorer, at least. That, alone, is bad but not awful. But other users have <a href=\"https:\/\/twitter.com\/SwiftOnSecurity\/status\/568307140659523585\" target=\"_blank\">pointed out<\/a> that the adware can also install its own self-signed certificate authority\u2014creating spurious SSL certificates\u2014allowing it to monitor secure connections.<\/p>\n<p><a href=\"https:\/\/twitter.com\/kennwhite\/status\/568270748638318593\" target=\"_blank\">Security expert Kenn White<\/a> has posted images on Twitter showing that, as an example, the software provides a certificate issued <em>to<\/em> Bank of America, but issued <em>by<\/em> Superfish\u2014wheras usually that would be done by a trusted body like VeriSign. Given Superfish&#8217;s whole purpose is to check and forward browsing data to ad companies, allowing it access secure content in this way is clearly a Bad Thing.But it gets worse. It seems Superfish uses the same private key for its root certificate on every machine it&#8217;s installed on, <a href=\"http:\/\/www.theverge.com\/2015\/2\/19\/8067505\/lenovo-installs-adware-private-data-hackers\" target=\"_blank\">explains <\/a><em><a href=\"http:\/\/www.theverge.com\/2015\/2\/19\/8067505\/lenovo-installs-adware-private-data-hackers\" target=\"_blank\">The Verge<\/a><\/em>. If someone could crack that key, it would be possible to create certificates that any Superfish-fuelled Lenovo computer\u2014probably, at this point, most of them\u2014would trust, allowing malicious code to wriggle in unannounced.<\/p>\n<p>Appearing in forums in January, a Lenovo community administrator called Mark Hopkins wrote that Lenovo has &#8220;temporarily removed Superfish from our consumer systems&#8221; but defended its presence, explaining that it &#8220;helps users find and discover products visually&#8221; and &#8220;instantly analyzes images on the web and presents identical and similar product offers that may have lower prices.&#8221; Now a rather serious security hole has been identified, it might think differently.<\/p>\n<p>We&#8217;ve got in touch with Lenovo to find out what its current stance on Superfish is. [<a href=\"http:\/\/thenextweb.com\/insider\/2015\/02\/19\/lenovo-caught-installing-adware-new-computers\/\" target=\"_blank\">The Next Web<\/a>, <a href=\"http:\/\/www.theverge.com\/2015\/2\/19\/8067505\/lenovo-installs-adware-private-data-hackers\" target=\"_blank\">Verge<\/a>]<\/p><\/blockquote>\n<p><a href=\"http:\/\/goo.gl\/MD7YEY\" target=\"_blank\"><strong>Source Gizmodo<\/strong><\/a><\/p>\n<p>Note: If you want to check your computer for Superfish adware, visit\u00a0<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/lastpass.com\/superfish\/\" target=\"_blank\">https:\/\/lastpass.com\/superfish\/<\/a><\/span><\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>The following article appeared in Gizmodo, February 19, 2015 Lenovo Installs Adware\u00a0on New Computers\u00a0That Could Steal\u00a0Private Data Oh no, Lenovo. Users are reporting on the company&#8217;s\u00a0forums,\u00a0its computers are coming installed with adware straight out of the box\u2014that can monitor secure connections. According to a number of Lenovo users, the software called Superfish is installed on factory-fresh laptops. The\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/lenovo-installs-adware-on-new-computers\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1655,1670,1656,1654,1674],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/9124"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=9124"}],"version-history":[{"count":3,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/9124\/revisions"}],"predecessor-version":[{"id":9131,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/9124\/revisions\/9131"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=9124"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=9124"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=9124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}