Visual Search Superfish Searching Way Beyond Limits !!

Rachiyta JainCyber SecurityLeave a Comment

reztepxmcwy41kohwrnc

 

Lenovo has finally accepted to Superfish,  a vulnerability found last November in Lenovo products. Superfish  which comes preinstalled in laptops intercepted customers’ encrypted Web traffic making all secure data open. Though the harm has been done, Lenovo apologised for this error and launched tools for removal of Super fish from their system. Superfish was initially designed to optimize visual search i.e. to assist customers with discovering products similar to what they are viewing.They claim to have disabled Superfish  from their server side in January as soon as they received a negative feedback so that the product is no longer active. Superfish intercept HTTP(S) traffic using a self-signed root certificate.  This is stored in the local certificate store and provides a security concern.  Lenovo also promised to not reload its systems with Superfish again. A few unhappy customers around the world have brought Lenovo into hot waters by slapping the Company with law suits.

Models affected:

The following Lenovo notebooks may be affected:

E-Series:

E10-30

Flex-Series:

Flex2 14, Flex2 15

Flex2 14D, Flex2 15D

Flex2 14 (BTM), Flex2 15 (BTM)

Flex 10

G-Series:

G410

G510

G40-70, G40-30, G40-45

G50-70, G50-30, G50-45

M-Series:

Miix2 – 8

Miix2 – 10

Miix2 – 11

S-Series:

S310

S410

S415; S415 Touch

S20-30, S20-30 Touch

S40-70

U-Series:

U330P

U430P

U330Touch

U430Touch

U540Touch

Y-Series:

Y430P

Y40-70

Y50-70

Yoga-Series:

Yoga2-11BTM

Yoga2-11HSW

Yoga2-13

Yoga2Pro-13

Z-Series:

Z40-70

Z40-75

Z50-70

Z50-75

 

lenovo-superfish-20150223_B72D865A1851405BBC4683E5DDA94C7D

 

The sad thing is Superfish is not the only malware that has hit the system. Other present on all types of systems are as follows:

  • Sendori
  • Purelead
  • Rocket Tab
  • Super Fish
  • Lookthisup
  • Pando
  • Wajam
  • WajaNEnhance
  • DO_NOT_TRUSTFiddler_root (Fiddler is a legitimate developer tool but malware has hijacked their cert)
  • System Alerts, LLC
  • CE_UmbrellaCert

 

If you see any of these installed on your computer or in your Trusted Root Certification Authorities folder, delete them, and uninstall their corresponding programs. You should also clear the certificate caches in your browser after doing so.

To know how to visit your Trusted Root Certification Authorities folder, click here.

 

http://support.lenovo.com/us/en/product_security/superfish

Leave a Reply

Your email address will not be published. Required fields are marked *