Threat Database Adware Superfish VisualDiscovery

Superfish VisualDiscovery

By GoldSparrow in Adware

Threat Scorecard

Threat Level: 80 % (High)
Infected Computers: 7
First Seen: February 23, 2015
Last Seen: July 28, 2020
OS(es) Affected: Windows

After a wide variety of security issues involving Superfish VisualDiscovery, Microsoft, Lenovo, and other manufacturers have decided to remove certificates associated with Superfish VisualDiscovery. These will be completely eliminated on Windows, meaning that computer users can rest assured knowing that the Superfish VisualDiscovery advertisement injection methods and similar problems are a thing of the past. For a while, the Superfish VisualDiscovery Web browser add-on was being employed to generate rogue certificates which undermined security Internet connections. This had caused Superfish VisualDiscovery to become the target of criticism. The problem linked to Superfish VisualDiscovery is not with the Superfish VisualDiscovery application itself but because of the careless way the root certificate and encryption were handled. In fact, computer users were still at risk for security issues involving Superfish VisualDiscovery even if the program was uninstalled.

Security Issues Linked to Superfish VisualDiscovery

The Superfish VisualDiscovery root certificate private key is locally available, a huge no-no in security. This is because it could then be decrypted and extracted with little effort. The private key in a certificate would allow a third-party to carry out attacks using compromised networks in order to intercept encrypted data from client to server, without making their presence known! Even if the Superfish VisualDiscovery application is eliminated by uninstalling it, the root certificate might remain behind, meaning that the risk continued on the affected Web browser. Essentially, the Superfish VisualDiscovery add-on would be associated with several browsers on the affected computer, creating certificate entries which may then be exploited.

What is Superfish VisualDiscovery?

Superfish VisualDiscovery acts like a typical PUP or Potentially Unwanted Program. Its main purpose is to insert advertisements into websites viewed by computer users in order to point them to special online deals or shopping opportunities. PC security researchers cannot stress enough that Superfish VisualDiscovery is not threatening. However, Superfish VisualDiscovery uses a poorly implemented proxy server which uses an SSL Digestor engine which may be used to create root CA certificates and private keys. Other programs that rely on this use the same password, which may be easily cracked and used for unwanted purposes.

Superfish VisualDiscovery may be installed automatically, or without the computer users' knowledge of the full implications of installing Superfish VisualDiscovery. Essentially, PUPs like Superfish VisualDiscovery are installed by including them during the installation of other software. One particularly worrying issue with Superfish VisualDiscovery is that Superfish VisualDiscovery was included in Lenovo brand notebooks, which meant that unknowing consumers were exposed to this security risk.

Known Exposure to Superfish VisualDiscovery

Superfish VisualDiscovery was pre-installed on some Lenovo computers between September of 2014 and January of the following year. One particularly affected Web browser by this problem is Mozilla Firefox. Microsoft has now added protection against Superfish VisualDiscovery in Windows Defender and Microsoft Security Essentials. Lenovo has also released an automated tool that allows computer users to remove Superfish VisualDiscovery and its associated root certificate.

The Superfish VisualDiscovery Problem in a Nutshell

All the talk of root certificates and other technical terms may become off-putting to regular consumers. PC security analysts have condensed this situation as follows:

  • Superfish VisualDiscovery is a known adware add-on or PUP. While not threatening, Superfish VisualDiscovery was used to insert advertisements on Web browsers.
  • Superfish VisualDiscovery has a known vulnerability that would allow a third-party to intercept encrypted data.
  • Superfish VisualDiscovery was being installed by default and removing Superfish VisualDiscovery was not removing the vulnerability.
  • Microsoft, Lenovo, and other affected parties have decided to stop supporting Superfish VisualDiscovery and have released tools and updates that allow the complete removal of Superfish VisualDiscovery and content associated with this adware extension.

If Superfish VisualDiscovery is installed on your Web browser, PC security researchers recommend the use of a fully updated malware remover to ensure that all security issues have been patched.

Trending

Most Viewed

Loading...