Superfish
   HOME

TheInfoList



OR:

Superfish was an advertising company that developed various advertising-supported software products based on a visual search engine. The company was based in
Palo Alto, California Palo Alto (; Spanish for "tall stick") is a charter city in the northwestern corner of Santa Clara County, California, United States, in the San Francisco Bay Area, named after a coastal redwood tree known as El Palo Alto. The city was es ...
. It was founded in Israel in 2006 and has been regarded as part of the country's "
Download Valley Download Valley is a cluster of software companies in Israel, producing and delivering adware to be installed alongside downloads of other software. The primary purpose is to monetize shareware and downloads. These software items are commonly bro ...
" cluster of adware companies. Superfish's software is
malware Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, depr ...
and
adware Adware, often called advertising-supported software by its developers, is software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the ...
. The software was bundled with various applications as early as 2010, and
Lenovo Lenovo Group Limited, often shortened to Lenovo ( , ), is a Chinese multinational technology company specializing in designing, manufacturing, and marketing consumer electronics, personal computers, software, business solutions, and related se ...
began to bundle the software with some of its computers in September 2014. On February 20, 2015, the
United States Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-ter ...
advised uninstalling it and its associated
root certificate In cryptography and computer security, a root certificate is a public key certificate that identifies a root certificate authority (CA). Root certificates are self-signed (and it is possible for a certificate to have multiple trust paths, say if ...
, because they make computers vulnerable to serious
cyberattacks A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices. An attacker is a person or process that attempts to access data, functions, or other restricted ...
, including interception of passwords and sensitive data being transmitted through
browsers Browse, browser or browsing may refer to: Programs * Web browser, a program used to access the World Wide Web *Code browser, a program for navigating source code * File browser or file manager, a program used to manage files and related objects * ...
.


History

Superfish was founded in 2006 by Adi Pinhas and Michael Chertok. Pinhas is a graduate of
Tel Aviv University Tel Aviv University (TAU) ( he, אוּנִיבֶרְסִיטַת תֵּל אָבִיב, ''Universitat Tel Aviv'') is a public research university in Tel Aviv, Israel. With over 30,000 students, it is the largest university in the country. Locate ...
. In 1999, he co-founded
Vigilant Technology BATM Advanced Communications Ltd. (Baras Advanced Technologies Marom) is a technology company principally engaged in development, production and marketing of data and telecommunication products in the field of local and wide area networks, as well ...
, which "invented digital video recording for the surveillance market", according to his
LinkedIn LinkedIn () is an American business and employment-oriented online service that operates via websites and mobile apps. Launched on May 5, 2003, the platform is primarily used for professional networking and career development, and allows job se ...
profile. Before that, he worked at
Verint Verint Systems is a Melville, New York-based analytics company which was founded in 2002. The company sells software and hardware products for customer engagement management and business intelligence. Their products are designed to assist clien ...
, an intelligence company that analyzed telephone signals and had allegedly tapped Verizon communication lines. Chertok is a graduate of Technion and
Bar-Ilan University Bar-Ilan University (BIU, he, אוניברסיטת בר-אילן, ''Universitat Bar-Ilan'') is a public research university in the Tel Aviv District city of Ramat Gan, Israel. Established in 1955, Bar Ilan is Israel's second-largest academi ...
with 10 years of experience in "large scale real-time data mining systems". Since its founding, Superfish has used a team of "a dozen or so PhDs" primarily to develop algorithms for the comparison and matching of images. It released its first product, WindowShopper, in 2011. WindowShopper immediately prompted a large number of complaints on Internet message boards, from users who did not know how the software had been installed on their machines. Superfish initially received funding from
Draper Fisher Jurvetson Draper Fisher Jurvetson (DFJ) is an American venture capital firm focused on investments in enterprise, consumer and disruptive technologies. In January 2019, DFJ Venture, the early-stage team, spun out and formed Threshold Ventures. DFJ Growth ...
, and to date has raised over $20 million, mostly from DFJ and Vintage Investment Partners. ''
Forbes ''Forbes'' () is an American business magazine owned by Integrated Whale Media Investments and the Forbes family. Published eight times a year, it features articles on finance, industry, investing, and marketing topics. ''Forbes'' also r ...
'' listed the company as number 64 on their list of America's most promising companies. Pinhas in 2014 stated that "Visual search is not here to replace the keyboard ... visual search is for the cases in which I have no words to describe what I see." As of 2014, Superfish products had over 80 million users. In May 2015, following the Lenovo security incident (see below) and to distance itself from the fallout, the team behind Superfish changed its name and moved its activities to JustVisual.com.


Lenovo security incident

Users had expressed concerns about scans of SSL-encrypted web traffic by Superfish Visual Search software pre-installed on
Lenovo Lenovo Group Limited, often shortened to Lenovo ( , ), is a Chinese multinational technology company specializing in designing, manufacturing, and marketing consumer electronics, personal computers, software, business solutions, and related se ...
machines since at least early December 2014. This became a major public issue, however, only in February 2015. The installation included a universal self-signed
certificate authority In cryptography, a certificate authority or certification authority (CA) is an entity that stores, signs, and issues digital certificates. A digital certificate certifies the ownership of a public key by the named subject of the certificate. Thi ...
; the certificate authority allows a
man-in-the-middle attack In cryptography and computer security, a man-in-the-middle, monster-in-the-middle, machine-in-the-middle, monkey-in-the-middle, meddler-in-the-middle, manipulator-in-the-middle (MITM), person-in-the-middle (PITM) or adversary-in-the-middle (AiTM) ...
to introduce ads even on encrypted pages. The certificate authority had the same
private key Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic alg ...
across laptops; this allows third-party eavesdroppers to intercept or modify
HTTPS Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It is used for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol is enc ...
secure communications without triggering browser warnings by either extracting the private key or using a self-signed certificate. On February 20, 2015, Microsoft released an update for
Windows Defender Microsoft Defender Antivirus (formerly Windows Defender) is an anti-malware component of Microsoft Windows. It was first released as a downloadable free anti-spyware program for Windows XP and was shipped with Windows Vista and Windows 7. It has ...
which removes Superfish. In an article in ''
Slate Slate is a fine-grained, foliated, homogeneous metamorphic rock derived from an original shale-type sedimentary rock composed of clay or volcanic ash through low-grade regional metamorphism. It is the finest grained foliated metamorphic rock. ...
'' tech writer
David Auerbach David Auerbach is an American writer and former Microsoft and Google software engineer. He has written on a variety of subjects, including social issues and popular culture, the environment, computer games, philosophy and literature. His 2018 book ...
compares the incident to the Sony DRM rootkit scandal and said of Lenovo's actions, "installing Superfish is one of the most irresponsible mistakes an established tech company has ever made." On February 24, 2015, ''Heise Security'' published an article revealing that the certificate in question would also be spread by a number of applications from other companies including
SAY Media Say Media (formerly VideoEgg) is a technology and advertising firm. The company provides a publishing platform (Tempest) to professional publishers and sells advertising across that platform and extended network of sites. Say Media has offices ...
and Lavasoft's Ad-Aware Web Companion. Criticisms of Superfish software predated the "Lenovo incident" and were not limited to the Lenovo user community: as early as 2010, users of computers from other manufacturers had expressed concerns in online support and discussion forums that Superfish software had been installed on their computers without their knowledge, by being bundled with other software. CEO Pinhas, in a statement prompted by the Lenovo disclosures, maintained that the security flaw introduced by Superfish software was not, directly, attributable to its own code; rather, "it appears third-party add-on introduced a potential vulnerability that we did not know about" into the product. He identified the source of the problem as code authored by the tech company Komodia, which deals with, among other things, website security certificates. Kommodia was founded by Barak Weichselbaum, a former programmer for Israel's IDF Intelligence Core. Komodia code is also present in other applications, among them, parental-control software; and experts have said "the Komodia tool could imperil any company or program using the same code" as that found within Superfish. In fact, Komodia itself refers to its
HTTPS Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It is used for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol is enc ...
-decrypting and interception software as an "SSL hijacker", and has been doing so since at least January 2011. Its use by more than 100 corporate clients may jeopardize "the sensitive data of not just Lenovo customers but also a much larger base of PC users". Komodia was closed in 2018.


Products

Superfish's first product, WindowShopper, was developed as a browser add-on for desktop and mobile devices, directing users who hover over browser images to shopping Web sites to purchase similar products. As of 2014, WindowShopper had approximately 100 million monthly users, and according to
Xconomy Xconomy is a Boston, Massachusetts–based media company providing news on business, life sciences, and technology{{cite web , title=Company Overview of Xconomy, Inc. , url=https://www.bloomberg.com/research/stocks/private/snapshot.asp?privcapId=3 ...
, "a high conversion to sale rate for soft goods". Superfish's business model is based on receiving affiliate fees on each sale. The core technology, Superfish VisualDiscovery, is installed as a man-in-the-middle proxy on some Lenovo laptops. It injects advertising into results from Internet search engines; it also intercepts encrypted (SSL/TLS) connections. In 2014, Superfish released new apps based on its image search technology.


See also

*
Browser hijacking Browser hijacking is a form of unwanted software that modifies a web browser's settings without a user's permission, to inject unwanted advertising into the user's browser. A browser hijacker may replace the existing home page, error page, or s ...
*
Computer vision Computer vision is an interdisciplinary scientific field that deals with how computers can gain high-level understanding from digital images or videos. From the perspective of engineering, it seeks to understand and automate tasks that the human ...
*
Concept-based image indexing Concept-based image indexing, also variably named as "description-based" or "text-based" image indexing/retrieval, refers to retrieval from text-based indexing of images that may employ keywords, subject headings, captions, or natural language text ...
*
Content-based image retrieval Content-based image retrieval, also known as query by image content ( QBIC) and content-based visual information retrieval (CBVIR), is the application of computer vision techniques to the image retrieval problem, that is, the problem of searching ...
*
Image processing An image is a visual representation of something. It can be two-dimensional, three-dimensional, or somehow otherwise feed into the visual system to convey information. An image can be an artifact, such as a photograph or other two-dimensio ...
*
Image retrieval An image retrieval system is a computer system used for browsing, searching and retrieving images from a large database of digital images. Most traditional and common methods of image retrieval utilize some method of adding metadata such as captio ...
*
Malware Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, depr ...


References

{{Reflist, 30em * 2006 establishments in California Companies based in Palo Alto, California Digital marketing companies of the United States Software companies established in 2006 Adware