The $3.5 Million Check Comes Due for Lenovo And Its Security-Compromising Superfish Adware

from the what-security-and-privacy-problem? dept

You might recall that back in 2015, Lenovo was busted for installing a nasty bit of snoopware made by a company named Superfish on select models of the company’s Thinkpad laptops. Superfish’s VisualDiscovery wasn’t just annoying adware however; it was so poorly designed that it effectively made all of Lenovo’s customers vulnerable to HTTPS man-in-the-middle attacks that were relatively trivial for an attacker to carry out. More specifically, it installed a self-signed root HTTPS certificate that could intercept encrypted traffic for every website a user visits — one that falsely represented itself as the official website certificate.

That’s hugely problematic for what should be obvious reasons, but Lenovo doubled down on dumb by issuing a statement initially claiming it didn’t see what all the fuss was about and that it was just trying to “improve the shopping experience”:

“We have thoroughly investigated this technology and do not find any evidence to substantiate security concerns.”

Security researchers didn’t agree. Neither, apparently, did the FTC, which this week gave Lenovo what amounts to a stern talking to after the company settled allegations it had turned a blind eye to customer security concerns:

“Lenovo compromised consumers? privacy when it preloaded software that could access consumers? sensitive information without adequate notice or consent to its use,? said Acting FTC Chairman Maureen K. Ohlhausen. ?This conduct is even more serious because the software compromised online security protections that consumers rely on.?

The full FTC complaint (pdf) against Lenovo makes it clear the Superfish adware used the same bunk security certificate for every user of the stealthware — every time it covertly interupted secure traffic. And, of course, the complaint notes that Lenovo really couldn’t be bothered to explain how any of this was happening to the company’s customers:

“Respondent did not make any disclosures about VisualDiscovery to consumers prior to purchase. It did not disclose the name of the program; the fact that the program would act as a man-in-the-middle between consumers and all websites with which they communicated, including sensitive communications with encrypted https:// websites; or the fact that the program would collect and transmit consumer Internet browsing data to Superfish.”

Yeah, whoops. One complaint exhibit highlights that while users had the option of opting out of this security-compromising, behavioral advertising effort, Superfish and Lenovo made doing so notably hard to spot:

But again, nowhere was the encryption-compromising aspect of this software disclosed to the end user, even in the finest of fine print in the company’s privacy policy. And opting out only prevented users seeing ads dictated by their previous browsing habits; doing so didn’t stop the software from faking security certificates and compromising the end user’s security.

Lenovo won’t be required to pay a dime to impacted users; FTC boss Ohlhausen (who downplayed the severity of the deception in her own statement (pdf)), claims the agency lacks the legal authority to obtain civil penalties for first-time violators under the FTC Act. As part of the settlement Lenovo is prohibited from misrepresenting “features of software preloaded on laptops that will inject advertising into consumers’ Internet browsing sessions or transmit sensitive consumer information to third parties.” Lenovo must also get explicit consumer opt-in consent before installing similar software in the future, and must implement — for the next 20 years — a software security program to more dutifully analyze the security impact of such programs.

A day after Lenovo’s settlement with the FTC, the company also struck a $3.5 million settlement (pdf) with a coalition of 32 states for violating user privacy and failing utterly to disclose the dangerous nature of the company’s laptop bloatware. In a statement Lenovo proclaimed it had seen the error of its ways, and that “security, privacy and quality are top priorities at Lenovo.” Of course this is the same company that shortly after the Superfish fiasco was caught stealthily installing bloatware via laptop BIOS, so hopefully Lenovo won’t mind if people wait a little while before declaring the company truly reformed.

Filed Under: , , , ,
Companies: lenovo

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “The $3.5 Million Check Comes Due for Lenovo And Its Security-Compromising Superfish Adware”

Subscribe: RSS Leave a comment
23 Comments
Anonymous Coward says:

"bloatware via BIOS"

Of course this is the same company that shortly after the Superfish fiasco was caught stealthily installing bloatware via laptop BIOS

Don’t let Microsoft off the hook there. They intentionally added an antifeature that users can’t disable, by which Windows installs whatever the BIOS tells it to. One could say Lenovo abused that, but that implies it’s legitimate in the first place.

Berenerd (profile) says:

Re: "bloatware via BIOS"

Where MS might be to blame for shoddy design, that “feature” was put there for making updating the BIOS easier for users not overly confident in doing so the old fashion way. Where yes, MS has had issues with their OS, this one indeed was requested by many hardware providers for this purpose. MS is simply guilty for failure to test and secure it. Lenovo is far more to blame as it forced bloatware on to people’s computers no matter what they did. You could uninstall it, it would just reinstall after the next reboot. You could format the drive and put another copy of windows on the system and it would then load the bloatware. No need to use their version of OS that way.

Anonymous Coward says:

Re: Re: "bloatware via BIOS"

that "feature" was put there for making updating the BIOS easier for users not overly confident in doing so the old fashion way.

This has nothing to do with updating the BIOS. It’s to make sure software gets installed after doing a clean Windows installation. (Windows pulls software out of the BIOS image, if present, after every reboot, and installs it with administrative privileges. This cannot be disabled.)

MS is simply guilty for failure to test and secure it.

And for preventing the user from disabling it. Non-confident users would not intentionally disable the feature, or manually remove whatever got installed; so that it’s mandatory, and reinstalls at each reboot, cannot be justified by ease of use.

Anonymous Coward says:

Re: Re: Re:2 "bloatware via BIOS"

Interesting – what happens when one installs some linux distro and the bios tries to load malware.exe?

Nothing, that’s not how it works. The BIOS contains a table entry saying "malware.exe" is a Windows program that the OS should install. And Linux ignores that entry, either because nobody cared to add support or because they specifically rejected it as a bad idea. (In theory, they could use binfmt_misc and WINE to run it.)

Anonymous Coward says:

Re: Re: Re: "bloatware via BIOS"

Extraordinary claims require extraordinary proof. You have to prove that Microsoft has a feature that allows installation of software from a computer’s firmware. Rather than what amounts to a root kit installing software regardless of what Windows does or allows.

A lot of people blame Microsoft for things other people do because they don’t know any better, and this includes people that should know better: ex tech journalists. There is a big difference in the first and second and neither is easy to prove without considerable expertise in the matter of Windows internals and firmware based rootkits. This is something most people, especially journalists, don’t have.

Anonymous Coward says:

Re: Re: Re:2 "bloatware via BIOS"

Follow the "stealthily installing bloatware" link in the article, or see this one:
http://www.techrepublic.com/article/windows-and-uefi-anti-theft-mechanism-makes-systems-less-secure/

But evidently Superfish wasn’t using that mechanism; that was other Lenovo bloatware. Superfish could simply be uninstalled, if its presence had not already compromised the system’s security.

Anonymous Coward says:

“One complaint exhibit highlights that while users had the option of opting out of this security-compromising, behavioral advertising effort, Superfish and Lenovo made doing so notably hard to spot:”

If I didn’t know what Superfish is, what it does, or that I had it on my computer, even if I had spotted that opt out button, it’s showing on a goddamned web page, so I would have assumed it was some thing that the web page owners had put there.

And with that assumption, I would have probably ignored it since what’s the point of opting out of that particular ad when what’d I’d expect to get if I did is just a different ad. Like hiding the sponsored posts on facebook. All you can do is stop getting ads from a particular company. It doesn’t mean you’ll get less ads, just different ones.

Anonymous Coward says:

Just a reminder that the issue here ran pretty deep: Lenovo installed Superfish, which was provider by a third party developer with promises as to what it was and what it did. That third party just re-branded some software that Komodia sold and pointed it at a fixed address for pushing ads. The problem is, the Komodia software is basically a man-in-the-middle NIT originally developed for the Israeli intelligence service. The developers left the service to start up their own company based on the technology, and sold it to others to bypass https and push/pull data from a user’s browser.

The big issue here is that to do all this, Komodia installed a new root certificate with full system rights. This certificate had an easily guessable password, and was deployed not just to Superfish, but to a large portion of Komodia’s customers.

The end result was that anyone using any software that depended on Komodia’s toolkit was loading untrusted and easily fakeable certificates on to their computer, allowing malicious actors to sign their web pages and software with the certificate, guaranteeing it would bypass a large portion of existing security checks.

So… this gets back to Lenovo, who installed third party software on their systems without doing a dry run to see what it dropped — the new root certificate should have resulted in an instant “sorry no… do this some other way, or we’ll go with a different vendor.”

That Anonymous Coward (profile) says:

I know people who were in the market for new laptops, and I often pointed out the stories about Lenovo if it was on their list of picks.

The standard we don’t see it as bad as they claim is legal speak trying to lower lawsuit awards. Like the pacemaker that made the news recently because they were patching their units to stop them from being hacked. They claimed it was impossible only could happen in a Homeland script… except they were vulnerable & were in denial to prop up their stock price after someone shorted them before revealing the hack.

The last thing that matters in anything in business plans now is the consumer. We can get 50 cents per unit for installing this and we get a cut of the ongoing cash, they told us its safe so it must be. Oh if we use the feature in this way, we can make sure its always reinstalled no matter how many times they remove it.

The FTC giving a “stern” talking to needs to remind consumers there is no one actually protecting you unless the problem can get a serious bodycount.

We need to give shareholders more value trumps if we do this we’ve doomed our customers. Shareholders are never really pleased when the value takes a hit because they are forced to pay out millions, but really enjoyed that extra 10 cents in value screwing the consumers got for them. Businesses need to stop worrying about improving shareholder value over anything else, and deliver quality products that don’t sacrifice consumers.

Anonymous Coward says:

Re: Re: Re:

Not true, as the free and open source software ecosystem does treat user privacy, and continuity of data use seriously.

Parts of it. Plenty of open-source software phones home without warning (calibre, stellarium, firefox) or logs the user’s activities locally (bash, vim, less, firefox). Only in egregious cases will distros normally disable it.

Anonymous Coward says:

Re: Re: Re: Re:

Firefox has this simple screen that allows you to turn of its reporting,(preferences/advanced/data choices) and in any case reports things that are of practical interest to developers.

As for local logging, none of it is hidden or covert, and the bash history is useful as it is searchable, and saves a lot of typing when repeating longer commands.

Anonymous Coward says:

Re: Re: Re:2 Re:

Firefox has this simple screen that allows you to turn of its reporting,

It’s been a while, but I found it would open at least one tab and connect to some Mozilla site the first time it was run after creating a profile. Lots of extensions do it too. A workaround is to check the "Work offline" box when creating the profile.

As for local logging, none of it is hidden or covert

I don’t agree. ‘less’ never used to log, and then one day I found a .lesshst file (anything starting with "." is considered "hidden" BTW). I was not given any warning about it, and there’s no obvious UI feature that needs an on-disk history. Mozilla adds some form of local history every few versions. What indication would anyone have that ‘vim’ is going to store a list of every file you’ve ever opened?

This whole thing is insidious. I don’t need to find some shell command or website I visited a month ago; if I did I’d have made a note or bookmarked it. ("repeating longer commands" has nothing to do with history logging, because that doesn’t need to go to disk.)

Occasionally "git status" will show me that some process has shat a history file into my home directory. And then I try to find some setting to disable it—different for every program—or symlink it to /dev/null, replace it with a directory, or run ‘chmod 0’ for the containing directory. Sometimes none of that works; some programs try really hard to create history files.

TAILS is nice but I shouldn’t have to run a specialized OS to stop my own computer from logging everything I do.

danderbandit (profile) says:

Show me the MONEY!

So the states sue Lenovo for this breach that affects consumers, Lenovo pays off the states, but does that $$$ go to the consumers who are affected? Of course not! The states are just running a racket to take money from companies and says ‘Don’t do that anymore!’, but the companies are just going to raise there prices or cut quality on their products to make up the difference. The consumers get screwed on both ends. We essentially are the employers of both sides – (purchases keep the companies in business, and the government works for us, right?) but were the only employers who regularly get screwed by their employees!

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...