• Hey, guest user. Hope you're enjoying NeoGAF! Have you considered registering for an account? Come join us and add your take to the daily discourse.

[Ars] Lenovo used Windows 8/10 anti-theft feature to install crapware

Status
Not open for further replies.

Vyer

Member
If you recall, Lenovo also had the Superfish controversy last year.

http://arstechnica.com/information-...theft-feature-to-install-persistent-crapware/

Windows 8 and Windows 10 contain a surprising feature that many users will find unwelcome: PC OEMs can embed a Windows executable in their system firmware. Windows 8 and 10 will then extract this executable during boot time and run it automatically. In this way, the OEM can inject software onto a Windows machine even if the operating system was cleanly installed.

The good news is that most OEMs fortunately do not seem to take advantage of this feature. The bad news is that "most" is not "all." Between October 2014 and April of this year, Lenovo used this feature to preinstall software onto certain Lenovo desktop and laptop systems, calling the feature the "Lenovo Service Engine."

Lenovo's own description of what the software did differs depending on whether the affected system is a desktop or a laptop. On desktops, the company claims that the software only sends some basic information (the system model, region, date, and a system ID) to a Lenovo server. This doesn't include any personally identifying information, but the system ID should be unique to each device. Lenovo says that this is a one-time operation and that the information gets sent only on a machine's first connection to the Internet.

For laptops, however, the software does rather more. LSE on laptops installs the OneKey Optimizer (OKO) software that Lenovo bundles on many of its machines. OneKey Optimizer arguably falls into the "crapware" category. While OKO does do some somewhat useful system maintenance—it can update drivers, for example—it also offers to perform performance "optimizations" and cleaning "system junk files," which both seem to be of dubious value.

Making this rather worse is that LSE and/or OKO appear to be insecure. Security issues, including buffer overflows and insecure network connections, were reported to Lenovo and Microsoft by researcher Roel Schouwenberg in April. In response, Lenovo has stopped including LSE on new systems (the company says that systems built since June should be clean). It has provided firmware updates for affected laptops and issued instructions on how to disable the option on desktops and clean up the LSE files.


The issue was spotted by a poster on our own forums. That poster described some even more undesirable behavior on Windows 7 systems. On those machines, it appears that LSE replaces a Windows system file, autochk.exe (which is used for the boot-time chkdsk filesystem verification and repair process). The bogus autochk.exe then creates system services that fetch files over unencrypted HTTP.

Lenovo's own guidance alludes to the overwriting of system files, but it's not at all clear how this is happening on Windows 7—the Windows capability to run executables stored in firmware appears to be new to Windows 8—or why it's overwriting a system file. We've asked Lenovo about these issues, but the company merely referred us to its statement announcing the discontinuation of LSE and the availability of removal tools. (We suspect that the system in question has more than one way of injecting software into Windows, but more on this shortly.)

Microsoft's guidance for the Windows feature that enables this facility has also been updated to note that software injected in this way should be written to be secure and that insecure programs are liable to be treated as malware. As for the feature itself, that remains a part of Windows.

And in its own awful way, it's a feature that makes sense. The underlying mechanism is simple enough; the firmware constructs tables of system information when the machine boots. The operating system then examines these tables to, for example, learn what hardware is installed in the machine and how it is connected. This is all governed by a specification called ACPI, Advanced Configuration and Power Interface. Microsoft defined a new ACPI table, the Windows Platform Binary Table (WPBT), that contains information about a firmware-embedded executable. When it boots, Windows looks for a WPBT. If it finds one, it copies the executable onto the filesystem and runs it.

the rest at the link..
 
Yeah, I'm never going to buy Lenovo now. If it were only this or the superfish incident, I could chalk it up as a mistake of bad judgment, but with both, it really feels like their modus operandi is to simply take advantage of every scummy loophole to inject bloatware and then then scaling back the ones they get caught using.

Fuck that, and fuck them.
 

cameron

Member
Perhaps not as bad as superfish, but Lenovo should be the first to tread carefully. The superfish scandal was bad PR. It hurt the brand. Lenovo execs were lamenting about it in interviews. Why would you do this after all that?
 

Mohonky

Member
Eh, one of the reasons I hate laptops, they come with so much bullshit installed on them. Just fuck em all off and give me a clean slate thanks.
 
I'd probably never buy Lenovo, but if I did, I'd buy the business laptop. The business laptops supposedly don't come with the crap ware. The one that I use at my office sure doesn't.
 

CTLance

Member
Wow. That's straight up ridiculous. Who thought that was a good idea?!

Fuck those asshats. Right in the eyesocket. With an open bottle of Sriracha hot sauce. :mad:

Now I have to trawl my client registry and make at least three embarrassing phone calls tomorrow. Yay. I love working for free.
 

CoolOff

Member
I've been enjoying my Y500 for the last couple of years and was considering upgrading to a Y50, but this is enough for me to say "no thanks".

Good job Lenovo.
 
Perhaps not as bad as superfish, but Lenovo should be the first to tread carefully. The superfish scandal was bad PR. It hurt the brand. Lenovo execs were lamenting about it in interviews. Why would you do this after all that?
My thinking is that they were always doing this (and probably more) and just happened to get caught for it now.
 

Drifters

Junior Member
I would imagine all OEMs do this in some fashion or other. Lenovo just happened to be the first one to get caught.
 

grumpy

Member
I've been enjoying my Y500 for the last couple of years and was considering upgrading to a Y50, but this is enough for me to say "no thanks".

Good job Lenovo.

Well, I just got a Y50-70 a few hours ago. This news makes me feel super peachy.
 

shockdude

Member
Well, I just got a Y50-70 a few hours ago. This news makes me feel super peachy.
Doesn't look like the Y50 was affected by LSE. The Y40 was, though.
Pretty scummy. Glad to see they're open about getting it resolved, but the majority of consumers won't even be aware of such behavior, let alone get it fixed.
 

Vyer

Member
Perhaps not as bad as superfish, but Lenovo should be the first to tread carefully. The superfish scandal was bad PR. It hurt the brand. Lenovo execs were lamenting about it in interviews. Why would you do this after all that?

Yeah, I'm never going to buy Lenovo now. If it were only this or the superfish incident, I could chalk it up as a mistake of bad judgment, but with both, it really feels like their modus operandi is to simply take advantage of every scummy loophole to inject bloatware and then then scaling back the ones they get caught using.

Fuck that, and fuck them.

Yeah, I considered Superfish by itself to be pretty inexcusable, but even then you could maybe at least chalk it up to a dumb mistake. But when you start to get to a pattern of dumb (and that's putting it kindly) mistakes it's another thing altogether.

My work laptop is a Thinkpad, and while I didn't pick it I didn't have any problem with the choice. But I doubt we'll be using them in the future, nor will I be buying one for personal use any time soon.
 
I bought a Yoga 15 two weeks ago and the most disappointing thing about it was the Lenovo crapware. I have no idea what half of it does but I've only uninstalled a handful of programs that I know I'll never need and I've been able to keep the rest of it dormant so it doesn't bother me anymore. I don't believe I have ever found in search or the task manager something called Lenovo Services Center (easily confused with Lenovo Solutions Center, which is annoying but does have a useful hardware checkup tool) so I hope I am safe. Advice to laptop buyers: I would still recommend Lenovo, but if you can, please install a fresh OEM copy of Windows.
 
Perhaps not as bad as superfish, but Lenovo should be the first to tread carefully. The superfish scandal was bad PR. It hurt the brand. Lenovo execs were lamenting about it in interviews. Why would you do this after all that?

They only lament it because they got caught. This is the true face of Lenovo--always has been and always will be.

That poster described some even more undesirable behavior on Windows 7 systems. On those machines, it appears that LSE replaces a Windows system file, autochk.exe (which is used for the boot-time chkdsk filesystem verification and repair process). The bogus autochk.exe then creates system services that fetch files over unencrypted HTTP.

They've been messing with Win7/Vista for awhile. We suspected it about a decade ago when they first got their hands on IBM but didn't find anything concrete until about 2007. I strongly advise against Lenovo products, especially if your company is in any sort of internationally competitive industry.
 
Status
Not open for further replies.
Top Bottom