Article 3EF7 How to remove the Superfish malware: What Lenovo doesn’t tell you

How to remove the Superfish malware: What Lenovo doesn’t tell you

by
Peter Bright
from Ars Technica - All content on (#3EF7)

If you have a Lenovo system that includes the Superfish malware, you'll want to remove it. Blowing away your system and reinstalling Windows is one way to do this, but while it's a relatively straightforward process, it's a time-consuming one. Using Lenovo's own restore image won't work, because that will probably reinstate Superfish anyway. Performing a clean install from Windows media will work, but you'll have to reinstall all your software and restore all your data from backup to do the job fully.

An alternative is to remove the malware itself. Lenovo has published instructions, but at the time of writing, they're woefully inadequate. Lenovo's instructions describe how to remove the advertising software, but unfortunately, it doesn't address the important bit: the gaping security vulnerability.

The Superfish root certificate can be used to create certificates for any domain, and those certificates will be implicitly trusted by the browser on any Superfish-infected system, leaving victims vulnerable to man-in-the-middle attacks. To fix this, the certificate itself needs to be removed.

Read 16 remaining paragraphs | Comments

index?i=9D5XAtRYFLo:rGeO0wOa3NU:V_sGLiPB index?i=9D5XAtRYFLo:rGeO0wOa3NU:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA9D5XAtRYFLo
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments