Lenovo took the hand in the jam jar. On Wednesday, the Chinese manufacturer has acknowledged that some laptops sold between “September and December” were equipped with a commercial software called “Superfish”. But in the face “to the return that was not positive,” Lenovo quenched in January.

Officially, Superfish was to “help customers discover new products while shopping.” But according to researchers from Errata Security , it was a dangerous spy for injecting ads into protected connections. Worse, he apparently blew data encryption, potentially allowing hackers to intercept them.

Unprotected bank details

Normally, a site prefix “https” uses a system for secure communication between the server and the client. Except that Superfish issued its own certificate which was substituted for the original, leaving the door open to “attack the middle man” (“man in the middle attack”), reports Ars Technica . The Google engineer Chris Palmer was particularly successful in intercepting the data exchanged with the Bank of America website.

What if you bought a PC that period? A website has been set up to determine if you are infected . But Lenovo said its servers were out of service, which should “disable the software” on all machines. For safety reasons, it is possible to remove by hand.

You will need:
execute the command (WINDOWS key + R) “certmgr.msc” (without the quotes)
click the second folder of “certifications root of trust”
click the folder “certificates”
delete the entry “Superfish”.