Lenovo Ushers in a New Era of Mobile Workstation Power and Performance with Lenovo ThinkPad P50 and P70
-
@Dashrender said:
This tech isn't for businesses, it's purely for consumers. Businesses have people like you and I do make images that contain all the drivers needed, etc.
The vendors don't need to sell this to consumers, as the consumers won't understand what it means, and I'm sure they won't understand the value. Instead the vendor will use it because it CAN (but might not) help them reduce costs of support.
With that in mind - the general idea of what Lenovo is now being accused of I find in poor taste because the technology is actually a really clever and useful idea. Of course this is Lenovo we're talking about, a completely untrustworthy company - who has shown yet again by their implementation that they don't care about the security of it's customers by deploying the tech in an extremely insecure fashion.
-
@Dashrender said:
With that in mind - the general idea of what Lenovo is now being accused of I find in poor taste because the technology is actually a really clever and useful idea.
Poor taste by whom? What they've been accused of is using this neat idea to actually deploy malware. They've secretly rootkitted people's machines.
Neat or useful or not, it's a breach of trust and ethics.
-
@scottalanmiller said:
@Dashrender said:
With that in mind - the general idea of what Lenovo is now being accused of I find in poor taste because the technology is actually a really clever and useful idea.
Poor taste by whom? What they've been accused of is using this neat idea to actually deploy malware. They've secretly rootkitted people's machines.
Neat or useful or not, it's a breach of trust and ethics.
What what we are reading, this is no more a rootkit than what Lo Jack has been doing for years - and currently there is no evidence that this solution is being used to deploy malware - only Lenovo's own tools. You may not like their tools, but those tools haven't been proven to be malware or spyware yet, least not in the postings I've read.
-
@Dashrender said:
What what we are reading, this is no more a rootkit than what Lo Jack has been doing for years
You are telling me that you've been buying computers where LoJack has taken control of your machine without your knowledge or authorization and has been using it to push unwanted software to your machine that you cannot control?
-
@Dashrender said:
only Lenovo's own tools. You may not like their tools, but those tools haven't been proven to be malware or spyware yet, least not in the postings I've read.
Um, by definition what they've done makes those malware. Software for Lenovo's benefit, withtout the permission or desire or authorization of the customer... that's malware by any definition I've ever heard. What else could it be? It's malicious, it's ware. Just because it hasn't yet been shown to have a dramatic impact doesn't change what it is.
Spyware no, that it is not. That's a specific type of malware. But malware it is. It is not bloatware alone because there is the added condition of this being a malicious intrusion to customers' systems without their knowledge or consent.
Breaking and entering isn't excused just because the person gets caught before they get away stealing something. Breaking and entering alone is enough to arrest them. Malware is malware before it spies on your or damages your machine.
-
@Dashrender said:
@WingCreative said:
I would assume that any legitimate usage of this function would be heavily marketed as a time-saving measure, something like:
"Many of our customers prefer to start off with a fresh install of Windows. We understand that hunting down drivers just to get hardware working after a reinstall is frustrating and time consuming. Now, we're using cutting-edge technology to ensure your computer has a direct line to automatically download the latest drivers even after a complete reinstall of Windows! System administrators: If you'd rather have a completely blank slate upon reinstallation, this option can be disabled in the BIOS."
You don't just spend time and money getting a feature like this set up without some sort of return on your investment, and in an ideal world this would actually be a pretty decent selling point. I would love to be able to do a fresh install without worrying about driver downloads & updates immediately afterwards. It's not a huge thing but it would be nice.
In contrast, Lenovo's implementation got shut down by Microsoft, and was only discovered by someone doing some deep diving into their own system. Otherwise it would have quietly been a thing until they had to patch it out. It was also difficult to disable, implying Lenovo didn't plan on allowing it to be disabled.
This tech isn't for businesses, it's purely for consumers. Businesses have people like you and I do make images that contain all the drivers needed, etc.
The vendors don't need to sell this to consumers, as the consumers won't understand what it means, and I'm sure they won't understand the value. Instead the vendor will use it because it CAN (but might not) help them reduce costs of support.
In the perfect world where companies use technological developments like this correctly, why not have it be for business too?
SMB and nonprofits rarely have imaging processes in place from what I have seen, and are more okay with buying the cheapest workable hardware instead of sticking to a standard hardware deployment.
If you could trust a system like this, you could use the same image across a variety of hardware without setting up and maintaining a driver repository. This would also allow places with mixed hardware to more easily integrate a standard imaging process without spending time finding the right drivers and keeping them up to date.
Instead, it was used like some sort of hidden DRM to ensure Lenovo software persisted when one assumed only Microsoft software would remain. This DRM-like system did not use SSL, allowing anyone sharing your connection the opportunity to intercept and modify the connection and traffic created every boot cycle. Boo to that.
-
@scottalanmiller said:
@Dashrender said:
What what we are reading, this is no more a rootkit than what Lo Jack has been doing for years
You are telling me that you've been buying computers where LoJack has taken control of your machine without your knowledge or authorization and has been using it to push unwanted software to your machine that you cannot control?
Where is Lenovo taking control of your machine without your knowledge or authorization? Heck, the first thing all these people are talking about is the prompt about the install.
And yes, if LoJack is enabled (granted it's most often not) it does all those things completely silently.
-
@Dashrender said:
And yes, if LoJack is enabled (granted it's most often not) it does all those things completely silently.
I don't think you understand what I am saying. What devices have you ever heard of where LoJack was put on there without the customer's knowledge or consent?
-
@scottalanmiller said:
@Dashrender said:
only Lenovo's own tools. You may not like their tools, but those tools haven't been proven to be malware or spyware yet, least not in the postings I've read.
Um, by definition what they've done makes those malware. Software for Lenovo's benefit, withtout the permission or desire or authorization of the customer... that's malware by any definition I've ever heard. What else could it be? It's malicious, it's ware. Just because it hasn't yet been shown to have a dramatic impact doesn't change what it is.
Spyware no, that it is not. That's a specific type of malware. But malware it is. It is not bloatware alone because there is the added condition of this being a malicious intrusion to customers' systems without their knowledge or consent.
Breaking and entering isn't excused just because the person gets caught before they get away stealing something. Breaking and entering alone is enough to arrest them. Malware is malware before it spies on your or damages your machine.
But the users are notified by a popup, and given the chance to say NO.
-
@WingCreative said:
Instead, it was used like some sort of hidden DRM to ensure Lenovo software persisted when one assumed only Microsoft software would remain. This DRM-like system did not use SSL, allowing anyone sharing your connection the opportunity to intercept and modify the connection and traffic created every boot cycle. Boo to that.
I already agreed that Lenovo did a poor implementation of this solution, but the claim that this is malware - it's no more malware than Dell installing it's own solutions to the computer. They get off the hook ONLY because they prompt before the install actually takes place.
-
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
only Lenovo's own tools. You may not like their tools, but those tools haven't been proven to be malware or spyware yet, least not in the postings I've read.
Um, by definition what they've done makes those malware. Software for Lenovo's benefit, withtout the permission or desire or authorization of the customer... that's malware by any definition I've ever heard. What else could it be? It's malicious, it's ware. Just because it hasn't yet been shown to have a dramatic impact doesn't change what it is.
Spyware no, that it is not. That's a specific type of malware. But malware it is. It is not bloatware alone because there is the added condition of this being a malicious intrusion to customers' systems without their knowledge or consent.
Breaking and entering isn't excused just because the person gets caught before they get away stealing something. Breaking and entering alone is enough to arrest them. Malware is malware before it spies on your or damages your machine.
But the users are notified by a popup, and given the chance to say NO.
Are you sure? That's not what is being reported.
-
@Dashrender said:
I already agreed that Lenovo did a poor implementation of this solution, but the claim that this is malware - it's no more malware than Dell installing it's own solutions to the computer.
Unless these articles are lying (very possible) you and I have completely different definitions of malware and permission.
-
There is a reason why the media is using the term rootkit. This is insidious malware that they are reporting. Actual loss of admin level control.
-
@scottalanmiller said:
According this , the OP says he is getting a popup about the Lenovo software.
-
@scottalanmiller said:
There is a reason why the media is using the term rootkit. This is insidious malware that they are reporting. Actual loss of admin level control.
I'm not sure where the loss of admin control come in? Sure the software is self installing, but I don't see anyone reporting that they have 'lost control' of their systems - of course you'll retort by saying that any software installing without my express permission is probably lost control.
HP and Dell have also been accused of using this BIOS method to install software after a clean install - I'm pretty sure it's mentioned in that ARS link I just posted.
tl;dr version (since this blew up on Reddit and there's lots of stuff to digest)
-
in Windows 8+ any PC vendor can include an .EXE in Firmware/BIOS, and Windows will look for this on each boot, and run it right before you log in. This is called "Windows Platform Binary Table". This is something Windows does, and there is no way to turn this off. To me, this is the bigger story, because vendors may now start to use this method to install anything, making a clean windows install impossible.
-
Lenovo uses this method if you try to install Windows 8, but if you install Windows 7, it >does the sketchy "overwrite your system file (autochk.exe)" method instead.
-
Either way, Lenovo installs a service on your PC. It was found to have security bugs. I can't find the link, but they said this was placed on some laptops/PC's from late 2014 to Summer 2015. They've released a new firmware 2 weeks ago that turns this off.
I would like to know if any non-Lenovo pc's have used this "Windows Platform Binary" method to run software from the firmware, because when I searched for it, I saw people with Dell's and HP's who thought they might have a virus, posting scan logs that contained the text "wpbbin.exe" (which would only be there if Windows found it in the BIOS and put it there) For example see https://www.google.com/search?q="wpbbin.exe"+site%3Aforums.malwarebytes.org (as early as 2013)
Check your PC:
Windows 8 and up: Check your event log for "Microsoft-Windows-Subsys-SMSS" and if you see "A platform binary was successfully executed." your PC vendor is doing this. Or, look for a file called wpbbin.exe in windows\system32. (This file would ONLY exist if Windows found it in your firmware and ran it.)
Windows 7: Verify your autochk.exe is legit. I think you could simply do: "sfc /VERIFYONLY" in cmd.exe (as Admin) but I did not test it. My autochk.exe was signed by Lenovo in 2014 (which tipped me off it didn't come from the Windows 7 DVD I got in 2010!).
-
-
@Dashrender said:
@scottalanmiller said:
According this , the OP says he is getting a popup about the Lenovo software.
I don't see that there. What I do see at that link is there...
"Any ideas how to remove this thing? Service turns itself back on after reboot, even if you stop it and disable it. Files reappear even if you delete or alter them."
Over and over again in the media and in social media threads I see that there is a rootkit. If someone, somewhere is claiming that some process asked for permission I'd be inclined to think that that is either something different, they are confused or it is an additional aspect.
It has been very clear that this cannot be stopped and happens transparently. Files forcibly replaced at boot time without notification doesn't sound anything like "asking permission."
-
Oh, I see, it was the OP. He's asking about something different that led to the discussion about the rootkit. Some things still have popups and ask permission. Just because something does doesn't mean that everything does.
-
@scottalanmiller said:
Oh, I see, it was the OP. He's asking about something different that led to the discussion about the rootkit. Some things still have popups and ask permission. Just because something does doesn't mean that everything does.
True, but when you get the full out technical explanation that someone WAY smarter than me did, you see what files are coming onto the system and where they are coming from. None of them are indicated as malicious. Bloatware, perhaps, even probably.
-
Here is where I'm guessing a security researcher actually dissected the problem by reading out the BIOS.
Disclaimer: Unless you really know what you're doing, you really don't want to try this: As for removing it, you need to edit and re-flash your bios. The downloadable bios update from Lenovo doesn't seem to be extractable at least with any methods I know, and using bios dumping tools only gets you 6 of the 8MB of the bios chip, so unfortunately it has to be done the painful way. You'll need a usb flash rom reader/writer(a cheap CH341A one works fine) and SOIC-8 test clips. You can get each of those 2 items for about $10 each. Take the back cover off the laptop, and also disconnect the battery, and locate the bios chip on the motherboard. Connect the test clips to the bios and connect the other end of the other end of the test clips to the usb writer, and connect the usb writer to another computer. On the other computer use the usb reader/writer to dump a copy of the bios. The bios dump will be an 8MB file. You need to split it into 2 files: the first 2MB and the last 6MB. Download UEFITool from github( https://github.com/LongSoft/UEFITool ) and open the 6MB file. Look through the modules and find the one called "NovoSecEngine2" and mark it for deletion. Save a new copy of the 6MB file. Now make a new 8MB file by taking the 2MB beginning from earlier and appending the new 6MB file on to the end. Use the usb reader/writer to flash that new 8MB file to the laptop's bios, then disconnect the wires and put the laptop back together. Reinstall a fresh copy of windows again, and check your C:\Windows\system32\autochk.exe file to make sure it's signed by Microsoft, not Lenovo. If you have the original Microsoft one there, congratulations, your laptop is now clean.
-
@Dashrender said:
True, but when you get the full out technical explanation that someone WAY smarter than me did, you see what files are coming onto the system and where they are coming from. None of them are indicated as malicious. Bloatware, perhaps, even probably.
How is that not malicious? Forced bloatware IS malicious. You keep saying that they are doing malicious things and then saying it isn't malware. It can't do what you are describing and not be malware.