Lenovo Security & Man-in-the-middle attacks

Talk about "WhatEVER !"..
Post Reply
Message
Author
Mrs.Sveigdalen
Posts: 8
Joined: Wed Sep 15, 2010 11:28 pm
Location: Lilyhammer

Lenovo Security & Man-in-the-middle attacks

#1 Post by Mrs.Sveigdalen » Thu Feb 19, 2015 12:36 am

I was very frustrated to wake up and find these articles today:

https://forums.lenovo.com/t5/Security-M ... true#M1697

http://thenextweb.com/insider/2015/02/1 ... computers/

While I do fully reimage PCs I deploy and I manage them with SCCM, I don't do much of **anything** to the many tablet PCs we get from Lenovo besides put a client on them. To see these articles makes me furious because I know this what I will be stuck working on, pulling reports and doing security analysis work. It is a good reminder of the level of vulnerability when one does not control one's installed software :(

-jenn

Puppy
Senior ThinkPadder
Senior ThinkPadder
Posts: 2256
Joined: Sat Oct 30, 2004 4:52 am
Location: Prague, Czech Republic

Re: Lenovo Security & Man-in-the-middle attacks

#2 Post by Puppy » Thu Feb 19, 2015 4:04 am

Mrs.Sveigdalen wrote:It is a good reminder of the level of vulnerability when one does not control one's installed software :(
It is the same with preinstalled Google Chrome spyware. Always have to remove (not easy) and verify it before connect to the Internet.
ThinkPad (1992 - 2012): R51, X31, X220, Tablet 8

Dekks
Junior Member
Junior Member
Posts: 434
Joined: Thu Jun 26, 2014 9:38 am
Location: Birmingham, UK

Re: Lenovo Security & Man-in-the-middle attacks

#3 Post by Dekks » Thu Feb 19, 2015 10:52 am

It's not on Thinkpads only the Lenovo consumer laptops manufactured Jan 2015 or earlier. Firefox doesn't use the Superfish cert as it maintains its own cert store. The Laptop lines that have been compromised are Flex, P, Y and Z series devices.

If anyone asks how to remove it you have to a) uninstall the app 2) open certmgr.msc drill down to the 2nd tree under and remove the Superfish cert.
Arch//Openbox R61//GNOME 3 X201i/X230 Tablet //Spectrwm T61/X61/X61 Debian 9/X32
Work - Win7/X220T BunsenLabs T43
Retired T60p/T60/X30/X31/X61S RIP T400/T21/X61T/X200T

Mrs.Sveigdalen
Posts: 8
Joined: Wed Sep 15, 2010 11:28 pm
Location: Lilyhammer

Re: Lenovo Security & Man-in-the-middle attacks

#4 Post by Mrs.Sveigdalen » Thu Feb 19, 2015 3:42 pm

Thanks for that piece of information.

Btw, when Superfish is removed, do you know if it's downloaded and reinstalled through the ThinkVantage Update Retriever? Or any other updating function?
~Jenn
T430s - Tablet 2 - and last but not least: User Norway Pad

Puppy
Senior ThinkPadder
Senior ThinkPadder
Posts: 2256
Joined: Sat Oct 30, 2004 4:52 am
Location: Prague, Czech Republic

Re: Lenovo Security & Man-in-the-middle attacks

#5 Post by Puppy » Thu Feb 19, 2015 5:10 pm

Mrs.Sveigdalen wrote: Btw, when Superfish is removed, do you know if it's downloaded and reinstalled through the ThinkVantage Update Retriever?
It is not listed in updates and I believe Lenovo would remove it now if it was. I guess the company delivering the adware is spoiled after this case.
ThinkPad (1992 - 2012): R51, X31, X220, Tablet 8

600X
Senior Member
Senior Member
Posts: 683
Joined: Tue May 21, 2013 3:31 am
Location: Burlington, NC

Re: Lenovo Security & Man-in-the-middle attacks

#6 Post by 600X » Thu Feb 19, 2015 5:45 pm

According to the official Lenovo statement, Superfish has disabled all server side interaction, thus effectively deactivating the product.
Daily: T440s
Classics: 600X (850MHz), A31p (FlexView), X41, T60 (LED FlexView), R61 (QXGA FlexView), X301 (AFFS)

killer
ThinkPadder
ThinkPadder
Posts: 1483
Joined: Mon May 28, 2007 5:26 am
Location: West Sussex, UK

Re: Lenovo Security & Man-in-the-middle attacks

#7 Post by killer » Thu Feb 19, 2015 6:20 pm

Having only read about this earlier today I did a search through Windows Registry for 'Superfish'. There were 4 entries, which I deleted.

I then searched my entire PC for 'superfish' and nothing was found.

Maybe it is hidden in the chips ... super fish and chips? :lol:
T540p Win 7 Pro 64

X1 Carbon Win 7 Pro 64 for my wife.

Time flies like an arrow; fruit flies like a banana.

Dogs must be carried on the escalator. Where can I find a dog?

Dekks
Junior Member
Junior Member
Posts: 434
Joined: Thu Jun 26, 2014 9:38 am
Location: Birmingham, UK

Re: Lenovo Security & Man-in-the-middle attacks

#8 Post by Dekks » Thu Feb 19, 2015 6:33 pm

This is a big PR disaster, nothing like it since the Sony root kit.
Arch//Openbox R61//GNOME 3 X201i/X230 Tablet //Spectrwm T61/X61/X61 Debian 9/X32
Work - Win7/X220T BunsenLabs T43
Retired T60p/T60/X30/X31/X61S RIP T400/T21/X61T/X200T

exTPfan
Sophomore Member
Posts: 198
Joined: Fri Nov 23, 2007 5:38 pm
Location: Ann Arbor, MI

Re: Lenovo Security & Man-in-the-middle attacks

#9 Post by exTPfan » Fri Feb 20, 2015 1:14 am

Dekks wrote:Firefox doesn't use the Superfish cert as it maintains its own cert store.
That's not correct: "EFF reported that its SSL Observatory has found 44,000 Lenovo owners who are using the Superfish certificate, and that's just on the Firefox browser alone. Extrapolating from Firefox market share, we can assume that there are at least a few hundred thousand users who are now using insecure connections that can be exploited by attackers. " tomshardware.com
Work: T42p (XP, UXGA IPS); T60p (XP, UXGA IPS); T60/61 FPad (Win 7, UXGA IPS).
Play: X1 (first gen, Win 7); T450s (Win 7).

Norway Pad
ThinkPadder
ThinkPadder
Posts: 1162
Joined: Mon Jul 13, 2009 2:50 pm
Location: Meridian, ID & Oyer, Norway
Contact:

Re: Lenovo Security & Man-in-the-middle attacks

#10 Post by Norway Pad » Fri Feb 20, 2015 1:15 am

And for those who want to attempt a real man-in-the-middle attack on a Superfish "infected" laptop, the route seems open: http://blog.erratasec.com/2015/02/extra ... e.html?m=1

A PR disaster, indeed. Luckily it seems like only consumer grade laptops are affected.
Lenovo Newsroom wrote:Superfish may have appeared on these models:
G Series: G410, G510, G710, G40-70, G50-70, G40-30, G50-30, G40-45, G50-45
U Series: U330P, U430P, U330Touch, U430Touch, U530Touch
Y Series: Y430P, Y40-70, Y50-70
Z Series: Z40-75, Z50-75, Z40-70, Z50-70
S Series: S310, S410, S40-70, S415, S415Touch, S20-30, S20-30Touch
Flex Series: Flex2 14D, Flex2 15D, Flex2 14, Flex2 15, Flex2 14(BTM), Flex2 15(BTM), Flex 10
MIIX Series: MIIX2-8, MIIX2-10, MIIX2-11
YOGA Series: YOGA2Pro-13, YOGA2-13, YOGA2-11BTM, YOGA2-11HSW
E Series: E10-30
Edit: Found this one, elaborating on the background of Superfish and it's CEO. http://www.forbes.com/sites/thomasbrews ... veillance/ Interesting read. It must be noted that there are some speculations here, but there is an apparent track back into the kind of industry that Superfish arises from.
Bjorn
THINKPAD collector. Only missing a proper RetroThinkpad.

Dekks
Junior Member
Junior Member
Posts: 434
Joined: Thu Jun 26, 2014 9:38 am
Location: Birmingham, UK

Re: Lenovo Security & Man-in-the-middle attacks

#11 Post by Dekks » Fri Feb 20, 2015 6:08 am

exTPfan wrote:
Dekks wrote:Firefox doesn't use the Superfish cert as it maintains its own cert store.
That's not correct: "EFF reported that its SSL Observatory has found 44,000 Lenovo owners who are using the Superfish certificate, and that's just on the Firefox browser alone. Extrapolating from Firefox market share, we can assume that there are at least a few hundred thousand users who are now using insecure connections that can be exploited by attackers. " tomshardware.com
Yup that's came out overnight, just reading the details now.
Arch//Openbox R61//GNOME 3 X201i/X230 Tablet //Spectrwm T61/X61/X61 Debian 9/X32
Work - Win7/X220T BunsenLabs T43
Retired T60p/T60/X30/X31/X61S RIP T400/T21/X61T/X200T

nikki605
Senior Member
Senior Member
Posts: 612
Joined: Fri Dec 08, 2006 2:39 pm
Location: Tampa, FL
Contact:

Re: Lenovo Security & Man-in-the-middle attacks

#12 Post by nikki605 » Sat Feb 21, 2015 8:48 am

You can test here to see if your Lenovo has Superfish

https://filippo.io/Badfish/

I have a Lenovo T410 laptop and an M83 desktop. I used the link to test both machines and neither one had Superfish installed.
Gary A.

lenovo: T410 (2516-CTO) | i7-620M | 8GB | 320GB 7200rpm | WXGA+ | WiFi 6300 | Bluetooth | Webcam | DVD-RW | 9 Cell | Win7 Pro x64 | Full System Specs
IBM: T21 (2647-47U) | PIII 1GHz | 512MB | 60GB 5400rpm | 3Com Mini PCI Ethernet/56K | DVD-RW | WinXP Pro SP3 | Full System Specs

ajkula66
SuperUserGeorge
SuperUserGeorge
Posts: 15733
Joined: Sun Feb 25, 2007 11:28 am
Location: Brodheadsville, Pennsylvania

Re: Lenovo Security & Man-in-the-middle attacks

#13 Post by ajkula66 » Sat Feb 21, 2015 11:06 am

Official Lenovo removal tool with instructions:

http://support.lenovo.com/us/en/product ... /superfish
...Knowledge is a deadly friend when no one sets the rules...(King Crimson)

Cheers,

George (your grouchy retired FlexView farmer)

AARP club members:A31p, T43pSF

Abused daily: R61

PMs requesting personal tech support will be ignored.

Puppy
Senior ThinkPadder
Senior ThinkPadder
Posts: 2256
Joined: Sat Oct 30, 2004 4:52 am
Location: Prague, Czech Republic

Re: Lenovo Security & Man-in-the-middle attacks

#14 Post by Puppy » Sat Feb 21, 2015 11:30 am

Windows Defender removes it now, including the certificate http://www.zdnet.com/article/microsoft- ... infection/
ThinkPad (1992 - 2012): R51, X31, X220, Tablet 8

Post Reply
  • Similar Topics
    Replies
    Views
    Last post

Return to “Off-Topic Stuff”

Who is online

Users browsing this forum: No registered users and 2 guests