- Apr 25, 2013
- 5,356
The aftermath of the Superfish scandal, which saw Lenovo hauled over the coals for installing adware on many of its laptops, has thrown up a new threat. PrivDog, which replaces random ads on websites with ads from “trusted sources,” could be putting thousands of users at risk of hacking.
In order to replace ads on secure websites, PrivDog installs a self-generated root certificate and works as a man-in-the-middle proxy. This certificate is trusted by browsers, which means it would be possible for a hacker to issue their own certificate, which PrivDog would then copy, leading to the browser accepting rather than rejecting it as it would had PrivDog not been present.
This issue was discovered on Hacker News when a user running the test for Superfish discovered he was at risk due to having PrivDog installed instead. It’s thought around 57,000 users are at risk from PrivDog, which is closely linked to security software Comodo, with versions 3.0.96.0 and 3.0.97.0 affected. The company has already issued an update fixing the affected versions of PrivDog.
Full Article
In order to replace ads on secure websites, PrivDog installs a self-generated root certificate and works as a man-in-the-middle proxy. This certificate is trusted by browsers, which means it would be possible for a hacker to issue their own certificate, which PrivDog would then copy, leading to the browser accepting rather than rejecting it as it would had PrivDog not been present.
This issue was discovered on Hacker News when a user running the test for Superfish discovered he was at risk due to having PrivDog installed instead. It’s thought around 57,000 users are at risk from PrivDog, which is closely linked to security software Comodo, with versions 3.0.96.0 and 3.0.97.0 affected. The company has already issued an update fixing the affected versions of PrivDog.
Full Article