Do you have a Lenovo laptop – PLEASE READ

Do you have a Lenovo laptopPLEASE READ

I hear this story on the news this week but didn’t realize how bad it was until I READ this Slate article. This is the beginning of the article – the rest is at the link:
You Had One Job, Lenovo

And it didn’t involve sneaking malicious adware onto your customers’ computers.
By David Auerbach

When Lenovo preinstalled Superfish adware on its laptops, it betrayed its customers and sold out their security. It did it for no good reason, and it may not even have known what it was doing. I’m not sure which is scarier. The various news reports of this catastrophe don’t quite convey the sheer horror and disbelief with which any technically minded person is now reacting to Lenovo’s screw-up. Security researcher Marc Rogers wrote that it’s “quite possibly the single worst thing I have seen a manufacturer do to its customer base. … I cannot overstate how evil this is.” He’s right. The Lenovo Superfish security hole is really, really bad.
Advertisement

To recap: Since at least September, Lenovo has been shipping OEM Windows laptops preloaded with Superfish “adware,” which would rudely inject its own shopping results into your browser when you searched on Google, Amazon, and other websites. This sort of behavior is associated more with spyware than with factory-shipped operating-system installs, and by itself would be a new low for Lenovo. But Superfish is more than just pesky. It’s the most virulent, evil adware you could find.

Lenovo sold its soul to the devil and forgot to get much in return. Homer Simpson would’ve made a better Faustian bargain.

By installing a single self-signed root certificate (trust me: That’s really bad) across all of Lenovo’s affected machines, Superfish intentionally pokes a gigantic hole into your browser security and allows anyone on your Wi-Fi network to hijack your browser silently and collect your bank credentials, passwords, and anything else you might conceivably type there. As Errata Security’s Robert Graham put it, “I can intercept the encrypted communications of SuperFish’s victims (people with Lenovo laptops) while hanging out near them at a cafe wifi hotspot.” If you have a Lenovo laptop that has Superfish on it (try Filippo Valsorda’s Superfish test to see), I would advise nothing short of wiping the entire machine and installing vanilla Windows—not Lenovo’s Windows. Then change all of your passwords.

So ghastly a perversion is Superfish’ self-signed root certificate that many of us have practically been walking around with our jaws on the floor since the news broke Wednesday night. My Facebook wall is filled with outraged profanity from software engineers. Installing Superfish is one of the most irresponsible mistakes an established tech company has ever made. Reckless, careless, and appalling don’t even come close to covering it.

The closest antecedent is the Sony DRM rootkit scandal of 2024, in which Sony automatically installed malware onto users’ computers whenever someone loaded certain of their CDs. That rootkit malware could be hijacked by another hacker, and in its shortsighted greed Sony did nothing to stop piracy while compromising the security of millions of users. But at least Sony had a clear (though futile) motive—stopping people from freely ripping its CDs. Lenovo claims it installed Superfish to “enhance our users’ shopping experience.” Whatever commissions Lenovo mighthave received from Superfish must have been paltry, especially compared with the severity of Superfish’s root-certificate hole—which, stunningly, leaves users even more exposed than Sony’s rootkit did. Lenovo sold its soul to the devil and forgot to get much of anything in return. Homer Simpson would’ve made a better Faustian bargain.