Rootkit von Lenovo entdeckt: autochk.exe wird ersetzt

enrico

Active member
Themenstarter
Registriert
20 Juni 2007
Beiträge
2.303
Wollte es eigentlich im "Allgemeine IBM/Lenovo News"-Thread posten, aber glaube es verdient einen eigenen Thread.

http://arstechnica.com/civis/viewtopic.php?p=29497693&sid=ddf3e32512932172454de515091db014#p29497693
Hi, I discovered this issue back in May when I bought a Lenovo Y40-80 which also has this. It really pissed me off so I did quite a bit of digging into it and successfully removed it, so after running into this thread I figured I'd share what I learned.

Before booting windows 7 or 8, the bios checks if C:\Windows\system32\autochk.exe is the Lenovo one or the original Microsoft one. If it is not the lenovo one, it moves it to C:\Windows\system32\0409\zz_sec\autobin.exe, and then writes it's own autochk.exe. During boot, the Lenovo autochk.exe writes a LenovoUpdate.exe and a LenovoCheck.exe file to the system32 directory, and sets up a services to run one of them when an internet connection is established. I don't know too much exactly what those do, but one appears to phone home to http://download.lenovo.com/ideapad/windows/lsebios/win8_en-us_32_oko.json n which is a bit worrying with the combination of a "ForceUpdate" parameter shown and the lack of ssl, making it fairly likely that it's exploitable for remote code execution by anyone who can intercept your traffic(public wifi, etc).

Disclaimer: Unless you really know what you're doing, you really don't want to try this: As for removing it, you need to edit and re-flash your bios. The downloadable bios update from Lenovo doesn't seem to be extractable at least with any methods I know, and using bios dumping tools only gets you 6 of the 8MB of the bios chip, so unfortunately it has to be done the painful way. You'll need a usb flash rom reader/writer(a cheap CH341A one works fine) and SOIC-8 test clips. You can get each of those 2 items for about $10 each. Take the back cover off the laptop, and also disconnect the battery, and locate the bios chip on the motherboard. Connect the test clips to the bios and connect the other end of the other end of the test clips to the usb writer, and connect the usb writer to another computer. On the other computer use the usb reader/writer to dump a copy of the bios. The bios dump will be an 8MB file. You need to split it into 2 files: the first 2MB and the last 6MB. Download UEFITool from github (https://github.com/LongSoft/UEFITool) and open the 6MB file. Look through the modules and find the one called "NovoSecEngine2" and mark it for deletion. Save a new copy of the 6MB file. Now make a new 8MB file by taking the 2MB beginning from earlier and appending the new 6MB file on to the end. Use the usb reader/writer to flash that new 8MB file to the laptop's bios, then disconnect the wires and put the laptop back together. Reinstall a fresh copy of windows again, and check your C:\Windows\system32\autochk.exe file to make sure it's signed by Microsoft, not Lenovo. If you have the original Microsoft one there, congratulations, your laptop is now clean.
 
Wie gewohnt, kümmert sich Lenovo nicht um die Linux-User :thumbdown:.
 
Betroffen wohl nur

Lenovo G50-80 + Y40-80...


oder auch noch andere?
 
Ah Danke, das ist an mir voreigegangen, ich hatte nur das andere Malwareproblem mit dem ausgetauschten Zertifikat mitbekommen.
 
...laut Lenovo waren auch einige weitere Produkte betroffen, allerdings keine ThinkPads
Das war ja schon bei superfish so. Fragt sich wie lange die Margen bei Thinkpads noch groß genug sind, um ohne vorinstallierte Crapware auszukommen.
Andererseits ist das eigentlich auch egal, denn: Fool me once, shame on you. Fool me twice ...
 
Was steckt für eine Logik (oder Ethik) dahinter, wenn man als Konsequenz sinkender Margen Crapware und SpyWare installieren dürfte ?
Aber, wie Du sagst, eingenlich auch egal, was bleibt ist maximales Mißtrauen.
 
Da ein Thread zu dem Thema reicht, zusammengeführt...
 
Lenovo wird immer besser darin, das Vertrauen seiner Kunden zu zerstören. Auch wenn Superfish und LSE nur auf Consumer-Books landeten - wer weiß, was es noch an versteckten Tools gibt, die vielleicht sogar schon auf den Think-Modellen laufen? Oder was in der Zukunft noch für Crapware/Malware/... installiert werden wird, vielleicht auch auf Think-Modellen?
 
  • ok1.de
  • ok2.de
  • thinkstore24.de
  • Preiswerte-IT - Gebrauchte Lenovo Notebooks kaufen

Werbung

Zurück
Oben