Posts filed under malware

Lenovo & Superfish == Sony Rootkit redux?

Filed in SecurityTags: , , , ,

Seems Lenovo got the bright idea that they wanted to be in the adware business and started shipping Superfish adware system that uses a self signed root cert to basically commit a MITM attack and intercept HTTPS connections.   Why?  To inject adverts, of course, because we all know there aren’t enough advertisements on the net these days.

Ars Technica’s article has a good summary and Errata Securty’s blog goes even deeper into the mess.  If you bought a Lenovo laptop any time after October of last year (though some say as early as June) there’s a good chance you have this abomination installed.   The Errata Security link above will walk you through testing for and uninstalling it.

This is why we can’t have nice things and why any company that lets marketing make these kinds of decisions deserves the pounding they get from the users and buyers of their products.  There is absolutely no excuse for this in 2015. Period.

Lenovo just took themselves off my list of considerations for my new laptop this spring.  I’ve been looking for a 4k laptop to replace about 90% of what I use my desktop for and Lenovo had a couple of good prospects.  Not any more.  Damned shame, really.  I love their hardware, at least on the upper end.


Equation Group, Stuxnet and the NSA

Filed in SecurityTags: , , , , , ,

A few links to get you started then I’ll return later today for more analysis.

One of the most impressive bank heists outside Hollywood:  Bank Heist Steals Millions
Sophistication that would make even William Gibson envious: Beyond Stuxnet and Flame
And you guessed it, The NSA is involved (maybe): Sources connect NSA spying with hacks reported by Kaspersky.

More later as I have time to read and research.  If you have something, post it in the comments.



How not to respond to garden variety malware.

Filed in GovernmentTags: , , , ,

destory_all_the_thingsAn article over at Ars Technica tells of the Economic Development Administration (a branch of the Department of Commerce) and what is so far the worst response to a possible mal-ware infestation I’ve heard this year; destroying $170,000+ in equipment.  They didn’t destroy the rest (an additional $3m) because they ran out of money to destroy it.  Go read the article, it’s a fascinating view into the mind of a very strange CIO.  I’ll wait.

It’s really kind of disturbing that a division of the Dept of Commerce devoted to promoting “economic development in regions of the US suffering low growth, low employment, and other economic problems” has so much technological incompetence that they’d destroy hundreds of thousands of dollars of equipment, including mice, keyboards, monitors, printers to clean up.. get this.. SIX computers infected with garden variety mal-ware.

Details at the link, but this paragraph pretty much says it all:

“EDA’s CIO, fearing that the agency was under attack from a nation-state, insisted instead on a policy of physical destruction. The EDA destroyed not only (uninfected) desktop computers but also printers, cameras, keyboards, and even mice. The destruction only stopped—sparing $3 million of equipment—because the agency had run out of money to pay for destroying the hardware.”

That’s right. They destroyed ONLY $170,000 in equipment because they ran out of money to destroy all of it.  Spending another $1m to rent replacement equipment only makes matters worse.

These are the people who’s job is economic development.  If they’re this inept at something as trivial as managing their IT infrastructure, how the hell can we have any faith in their ability to handle something as complex as economic development in depressed areas?

Click to view/hide
Click to view/hide
April 2024