Lenovo CTO Claims Concerns Over Superfish Are Simply 'Theoretical'

from the find-a-new-cto dept

Lenovo keeps making things worse. First it installed crappy Superfish malware/adware on a bunch of its computers. That was bad enough. But the real problem was that in a clever little “hack” to get around the fact that the adware wouldn’t work on HTTPS enabled pages, Superfish installed its own self-signed root certificate to basically create a massively dangerous man-in-the-middle attack to snoop on what you were doing on those HTTPS pages. Oh, and to make it even worse, the company made sure that everyone who had this Superfish self-signed root certificate had the exact same certificate with an easily cracked password, so that a massive and easily exploited vulnerability is in place in tons of machines out there. And Lenovo’s first response was to insist there was no evidence of any security concerns. It later, quietly, deleted that statement, but still seems to be unwilling to admit what an incredibly dangerous situation it has created.

In fact, the company is still in denial mode. Lenovo’s CTO, Peter Hortensius, was interviewed by the WSJ, and he insisted that any threats were “theoretical.”

WSJ: There seems to be a disparity between what security researchers are saying about the potential dangers of this Superfish software, and what the company has said about this app not presenting a security risk.

Hortensius: We?re not trying to get into an argument with the security guys. They?re dealing with theoretical concerns. We have no insight that anything nefarious has occurred. But we agree that this was not something we want to have on the system, and we realized we needed to do more.

Fire your CTO, Lenovo. Fire your marketing people. Fire your security team. This is a disaster. In our first post, we compared it to the Sony rootkit fiasco from a decade ago, while noting the security risk here is much, much greater. And, so far, Lenovo appears to be playing straight from the Sony rootkit response playbook. If you don’t recall, after security folks pointed out what a security disaster the rootkit was, Sony’s response was to dismiss the concerns as… theoretical:

“Most people, I think, don’t even know what a rootkit is, so why should they care about it?”

In both cases, these technologies opened up giant, massive vulnerabilities on people’s computers. In both cases, they were easily exploitable (in the Lenovo case, much, much, much more easily exploitable in a much, much, much more nefarious way). And, in both cases, senior execs from the company tried to handwave it away because they don’t know if anyone abused these problems. This ignores that (1) it’s quite possible people have been abusing these vulnerabilities for months and it’s just not public yet, and (2) more importantly, it doesn’t fucking matter because the vulnerability is still there and easily exploitable by lots and lots of people now because it’s widely known.

Handwaving this off as a “theoretical” concern is not just missing the point — it suggests a fundamental lack of understanding about rather basic security practices. As I mentioned earlier, I’ve been a very loyal Thinkpad buyer for years (though, thankfully, the machine I bought a couple months ago wasn’t one infected this way). Every time I’ve dabbled with other laptops I’ve regretted it. But Lenovo’s response to this is very quickly convincing me that the company should never get any more money from me. It’s not just the initial screwup in preinstalling such a security mess, but the completely ridiculous response to it that suggests a company that still doesn’t recognize what it has done.

Filed Under: , , , , ,
Companies: komodia, lenovo, superfish

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Lenovo CTO Claims Concerns Over Superfish Are Simply 'Theoretical'”

Subscribe: RSS Leave a comment
39 Comments
Ninja (profile) says:

But Lenovo’s response to this is very quickly convincing me that the company should never get any more money from me.

If everybody voted with their wallets and caused a lot of financial damage to the companies that act like this (see Sony, EA etc) they’d be at least more transparent and swift in their responses, or even avoid stupidity altogether. But instead people simply keep buying out of ignorance or masochism…

jackn says:

Hortensius: We’re not trying to get into an argument with the security guys. They’re dealing with theoretical concerns. We have no insight that anything nefarious has occurred. But we agree that this was not something we want to have on the system, and we realized we needed to do more.

One red flag to remember, If you do not detect or know of any fraud, there is probably fraud occuring.

This is like letting a murderer off because his bullet missed the victom.

John Fenderson (profile) says:

At a minimum

Fire your CTO, Lenovo. Fire your marketing people. Fire your security team.

That would be called the second step in the long road to trying to regain anything like trust. But the head-rolling needs to go beyond that. Every single executive who was aware of this and didn’t object to it needs to be fired for gross incompetence. Seriously, this isn’t something that you need to be an engineer to spot.

The first step would be for them to actually come out and say what they did wrong (so we know they get it), and to stop with the incredible claim that they were doing it because they thought everyone would love it. They haven’t even done that much yet.

DannyB (profile) says:

In other news

Hortensius: We’re not trying to get into an argument with the security guys. They’re dealing with theoretical concerns. We have no insight that anything nefarious has occurred. But we agree that this was not something we want to have on the system, and we realized we needed to do more.

Beef industry spokesman: We’re not trying to get into an argument with the health guys. They’re dealing with theoretical concerns. We have no insight that anything serious has occurred. But we agree that Salmonella was not something we want to have in our beef, and we realized we needed to do more.

“Most people, I think, don’t even know what a rootkit is, so why should they care about it?”

Most people, I think, don’t even know what Salmonella is, so why should they care about it?

Anonymous Coward says:

Re: In other news

It’s funny that such a standard PR dodge also happens to be the entire raison d’etre for marketing: people don’t know what this is, and it’s our job to make them want to spend money on it anyway.

On an unrelated note, I’ve been hearing lots of great things about Aquagenic Urticaria, and I can’t wait to get me a whole big mess of it.

Anonymous Coward says:

Re: Re:

Every active exploit was at one point simply theoretical.

And the authors of the affected software used to love pointing this out. To quote Moxie Marlinspike (IIRC, and from memory), “Microsoft claimed it wasn’t exploitable, so I released a tool that exploits it”. MS has gotten better about acknowledging bugs without attached exploits; Lenovo are falling back on a strategy about 10 years out of date.

Indy says:

What does this say about Lenovo Security beyond this product?

If this is the impact a serious security concern results, I have zero to nil confidence that an actual breach of Lenovo would be met with a shrug by the company. Therefore, I have no confidence in their security, their processes, and therefore their products.

Nothing personal, Lenovo, I just don’t fuck around with products when the manufacturer doesn’t due bare diligence in protecting their own shit.

Anonymous Coward says:

This kind of response is to be expected. It shouldn’t surprise you anymore. The same kind of incompetence that led to this being included leads to the denials being published. How fast do you expect things to move inside the company?

Alternatively, even if some higher ups have now been briefed by competent personnel, they might still want to go this way. Try to deflect as much damage by sowing some doubt into the non-technical people. Those that don’t understand what the whole thing is about. Let them hear conflicting information that makes them want to stop reading whilst we root out the cause. It’s not a clever strategy either, but denial is a very natural reaction.

With these recurring situations I’d prefer to take a psychologist’s perspective to try and understand it rather than getting upset every time. That’s not to say that you have to stay quiet, but it does help keep your sanity I believe.

John Fenderson (profile) says:

Re: Re:

“This kind of response is to be expected. It shouldn’t surprise you anymore.”

I doubt that anyone is surprised. That response does amplify the outrage and condemnation of the company, though, as it should.

“With these recurring situations I’d prefer to take a psychologist’s perspective to try and understand it rather than getting upset every time.”

I think most people here understand it just fine! However, understanding a thing doesn’t mean that it won’t upset you. Particularly when the upset is 100% justified.

Leave a Reply to Anonymous Coward Cancel reply

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...