Lenovo website hacked, possibly by Lizard Squad
Lenovo's security headaches proceeded with Wednesday as the PC maker's website succumbed to a cyberattack, days after the PC maker apologized for preloading software on some of its PCs that abandons them powerless against malware attacks.
Rather than the commonplace prologue to the organization's items, the website showed a message Wednesday evening showing the site was down for maintenance. Users endeavoring to visit the site prior toward the evening were dealt with to a slideshow that prompted a Twitter record condemning Lenovo for its contribution with the adware Superfish.
Lenovo did not instantly react to an appeal for input however affirmed the security break in an announcement to the Wall Street Journal.
"Sadly, Lenovo has been the casualty of a cyber assault," the organization said. "One impact of this assault was to divert movement from the Lenovo website. We are likewise effectively exploring different parts of the assault. We are reacting and have effectively restored certain usefulness to our open confronting website."
Hacking gathering Lizard Squad asserted obligation regarding the hack on a Twitter account supposedly connected with the gathering. Reptile Squad, a detached aggregate purportedly made out of hackers based out of the United Kingdom and Eastern Europe, additionally was connected to a progression of blackouts that tormented the PlayStation Network and different diversions a year ago.
While it was first imagined that Lenovo's servers had been subverted, it now creates the impression that assailants took control of the site's space recorder and diverted its activity to a free record at CloudFlare, a San Francisco-based security organization. CloudFlare told Bloomberg that it debilitated the record utilized by the assailants.
The episode happened not as much as a week after the Chinese PC maker ended up in high temp water taking after disclosures that a number of its PCs incorporate a software system called Superfish Visual Discovery. Considered either adware or spyware, Superfish tracks your Web pursuits and scanning movement to place extra promotions on the sites you visit. The software additionally introduces its own root certificate that leaves influenced PCs more defenseless against malware attacks.
Lenovo has apologized for the issue and has started work to determine it. "We messed up severely," Peter Hortensius, Lenovo's chief technology officer, said a week ago.
Lenovo's security migraine changed into a legal one final week when a lawsuit documented in government court charged both Lenovo and Superfish with abusing wiretap laws and trespassing on individual property, Ars Technica reported Monday. In an alternate case, a legal firm has propelled a class activity examination over potential claims against Lenovo's activities.
Rather than the commonplace prologue to the organization's items, the website showed a message Wednesday evening showing the site was down for maintenance. Users endeavoring to visit the site prior toward the evening were dealt with to a slideshow that prompted a Twitter record condemning Lenovo for its contribution with the adware Superfish.
Lenovo did not instantly react to an appeal for input however affirmed the security break in an announcement to the Wall Street Journal.
"Sadly, Lenovo has been the casualty of a cyber assault," the organization said. "One impact of this assault was to divert movement from the Lenovo website. We are likewise effectively exploring different parts of the assault. We are reacting and have effectively restored certain usefulness to our open confronting website."
Hacking gathering Lizard Squad asserted obligation regarding the hack on a Twitter account supposedly connected with the gathering. Reptile Squad, a detached aggregate purportedly made out of hackers based out of the United Kingdom and Eastern Europe, additionally was connected to a progression of blackouts that tormented the PlayStation Network and different diversions a year ago.
While it was first imagined that Lenovo's servers had been subverted, it now creates the impression that assailants took control of the site's space recorder and diverted its activity to a free record at CloudFlare, a San Francisco-based security organization. CloudFlare told Bloomberg that it debilitated the record utilized by the assailants.
The episode happened not as much as a week after the Chinese PC maker ended up in high temp water taking after disclosures that a number of its PCs incorporate a software system called Superfish Visual Discovery. Considered either adware or spyware, Superfish tracks your Web pursuits and scanning movement to place extra promotions on the sites you visit. The software additionally introduces its own root certificate that leaves influenced PCs more defenseless against malware attacks.
Lenovo has apologized for the issue and has started work to determine it. "We messed up severely," Peter Hortensius, Lenovo's chief technology officer, said a week ago.
Lenovo's security migraine changed into a legal one final week when a lawsuit documented in government court charged both Lenovo and Superfish with abusing wiretap laws and trespassing on individual property, Ars Technica reported Monday. In an alternate case, a legal firm has propelled a class activity examination over potential claims against Lenovo's activities.
Comments
Post a Comment
Thank you commenting on the DP2Web Blog.
Stay Tuned with Us: