Lizard Squad Claims Attack On Lenovo Days After Superfish 36
Amanda Parker writes with news that hacker group Lizard Squad has claimed responsibility for a defacement of Lenovo's website. This follows last week's revelations that Lenovo installed Superfish adware on consumer laptops, which included a self-signed certificate authority that could have allowed man-in-the-middle attacks.
The hackers seemingly replaced the manufacturer's website with images of an unidentified youth, displayed with a song from the Disney film High School Musical playing in the background. Taking to a new Twitter account that has only been active a matter of days, the Lizards also posted emails alleged to be from Lenovo, leading some to speculate that the mail system had been compromised. While some have seen the attack as retaliation for the Superfish bug, it is also possible that Lizard Squad are jumping on the event merely to promote their own hacking services.
juvenile vandalism (Score:5, Insightful)
this is no more noteworthy or significant than vandalizing a billboard
Re:juvenile vandalism (Score:4, Insightful)
Quite. Its just the middle class wannabe version of a graffiti tag, with about the same amount of talent required and having the same level of intellectual gravitas.
Re: (Score:1)
I'm just wondering when they are going to create a terrorist classification for a type of data packet. Pretty sure it will be an open ended description.
Re: (Score:1)
"Could have allowed"? (Score:5, Informative)
This is plainly unforgivable.
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
Re: "defacement of Lenovo's website" (Score:1, Funny)
I won't believe it until someone creates a GUI in Visual Basic to track the IP address.
Superfish "bug" ?!?! (Score:4, Insightful)
Re:Superfish "bug" ?!?! (Score:5, Funny)
People don't do this anymore? (Score:1)
Sadly, this does not prevent firmware attacks (Score:1)
Re:People don't do this anymore? (Score:4, Insightful)
Don't business's hire competent IT guys?
In my experience? Yes they do. they also hire a bunch of incompetent ones. its a crap shoot.
Re: (Score:2)
I've never met anyone with a lenovo for their at home use, always dell's or hp's.
Well, some people really love to embrace mediocrity.
And anyone that I've met that did have a lenovo used it just for business.
The business Lenovo systems - ThinkPad laptops and ThinkStation workstations - were not part of this as Lenovo never installed superfish on any of them. This only applied to their mediocre consumer-level units that were sold as Lenovos with other model names.
Just another reason why I only buy ThinkPads for my own use. Home, work, etc; I won't buy anything else. Lenovo knows better than to risk that golden goose.
Re: (Score:3)
The fact that it was not onstalled in the "business line" machines indicates that they KNEW it was crooked before they did it. They just hoped the sheeple...er I mean consumers wouldn't notice.
That is one way to look at it. A competing hypothesis is that the business line systems are more profitable in general, while the consumer lines are subsidized by the software that they install on them before shipping. Hence the consumer level ones were being consistently filled up with an ever-increasing load of crapware to make them more (if only marginally) profitable. Whether there was ever any ethics considered by the company is not clear.
Re: (Score:2)
It should be SOP to image off what is on a machine, format [1] it and reload from media
It doesn't help that at various times MS and their OEMS have made this a PITA with many machines not shipping with "clean" windows media, some keys only working with some media, keys printed on the machine that required a phonecall to activate and so-on. At one point they were even threatening companies who used their vlk media/keys to reimage machines running under OEM licenses though they later backed down on that and introduced "reimage rights".
So THAT is what that was (Score:2)
In other words, this wasn't a very impressive hack.
we need a new word (Score:3)
Re: (Score:3)
They're Hactivismvertising.
Good point. I think you're well on your way to coining a new word.
I'm not sure what their message is other than advertising. But assuming they're projecting their point of view, are they saying?:
1) Doing things on other peoples' systems that they didn't authorize and wouldn't authorize is bad.
2) Doing things on other peoples' systems that they didn't authorize and wouldn't authorize is good.
or maybe even:
3) Doing things on other peoples' systems that they didn't authorize and wouldn't authorize is bad unl
action that is not good (Score:1)