Superfish

Superfish is a form of adware that has the ability to hijack encrypted Web sessions and open a system up to potential HTTPS man-in-the-middle (MiTM) attacks. Superfish gained widespread attention in early 2015 when it was revealed that the PC manufacturer Lenovo was selling computers that had Superfish adware preinstalled.

Superfish Installed on Lenovo Computers Raised Security Concerns in 2015

Lenovo shipped some consumer notebook models with Superfish preinstalled between October and December 2014, but discontinued the practice after security concerns over the adware components were raised in January 2015.

Lenovo initially claimed that the Superfish adware presented no security risks, but the company changed its stance on February 20th, when it issued a security advisory and labeled the Superfish adware as a security vulnerability that carried the potential impact of launching a man-in-the-middle attack. On the same day, Lenovo released an automated tool to remove all Superfish components on its computers.

Superfish has since raised a variety of security concerns for the adware primarily revolving around the use a self-signed root certificate that could potentially enable Superfish to intercept otherwise secure communications and gain access to a user’s Web traffic, login credentials, credit card details and other sensitive information.

Superfish and Comodia Elicit Security Alert from US-CERT

Komodia’s technology has also been identified as a Trojan horse by some security vendors, with Symantec labeling the malware as “Trojan.Nurjax.” And the U.S. Computer Emergency Readiness Team (US-CERT) issued an alert on February 20th, 2015 that exposed Superfish for being a risk beyond just in Lenovo notebooks.

The US-Cert named Komodia, the firm behind creating the Superfish adware, and revealed the firm’s SSL Digestor technology as being present on other applications and carrying the same associated risks on these apps.

According to the alert, “An attacker can spoof HTTPS sites and intercept HTTPS traffic without triggering browser certificate warnings in affected systems.” The US-CERT recommends uninstalling any software with Komodia’s SSL Digestor as the only effective solution for avoiding the risks associated with Superfish.

Forrest Stroud
Forrest Stroud
Forrest is a writer for Webopedia. Experienced, entrepreneurial, and well-rounded, he has 15+ years covering technology, business software, website design, programming, and more.

Top Articles

List of Windows Operating System Versions & History [In Order]

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

How to Create a Website Shortcut on Your Desktop

Website Shortcut on Your Desktop reviewed by Web Webster   This Webopedia guide will show you how to create a website shortcut on your desktop using...

What are the Five Generations of Computers? (1st to 5th)

Reviewed by Web Webster Each generation of computer has brought significant advances in speed and power to computing tasks. Learn about each of the...

Hotmail [Outlook] Email Accounts

Launched in 1996, Hotmail was one of the first public webmail services that could be accessed from any web browser. At its peak in...

SHA-256

SHA-256 is an algorithm used for hash functions and is a vital component...

Document Management System

A document management system is an automated software solution businesses and organizations use...

Conti Ransomware

Conti ransomware first emerged in 2020. It uses a ransomware as a service...