The certificate security that usesται από το Superfish το εγκατεστημένο add-on στους υπολογιστές της Lenovo μόλις έσπασε (cracked).
We have recently reported that the Superfish software used by Lenovo produces a security certificate to re-sign all the security certificates it receives from HTTPS pages, such as bank pages, virtually allowing access to plain text information to traffic between client and server otherwise it would be encrypted.
Many security experts who have examined the subject have discovered that the add-on uses the same RSA key (1024 bits) on all devices, which means that if someone manages to break it, they will be able to "read" the encrypted traffic exchanged between a user with a Lenovo user computer and a secure service. This is exactly what he did Robert Graham, Chief Executive Officer of Errata Security.
The researcher used a system with Superfish installed by dumping the data generated by processes into the system memory.
Μετά την ανακάλυψη του κρυπτογραφημένου ιδιωτικό κλειδιού του πιστοποιητικού ασφαλείας που χρησιμοποιείται από το Superfish, και το ίδιο το πιστοποιητικό, προσπάθησε να εξακριβώσει ότι τα στοιχεία προστατεύονται με έναν κωδικό access.
Cracking the password turned out to be a bit more difficult than expected, as it required a modified brute-force program. When Graham had to develop a new brute-force software for the needs of this attack.
Υπέθεσε ότι ο Password δεν θα ήταν πολύπλοκος, οπότε έδωσε στο πρόγραμμα εντολή αναζήτησης μόνο μεταξύ πεζών γραμμάτων. Σε λιγότερο από 10 δευτερόλεπτα, ανακάλυψε τον κωδικό πρόσβασης ό οποίος ήταν “komodia.”
The password decrypts the root certificate and could be used in man-in-the-middle attacks against Lenovo users who have Superfish installed on their system.
