Superfish was an advertising company that developed various advertising-supported software products based on a
visual search engine. The company was based in
Palo Alto, California
Palo Alto ( ; Spanish language, Spanish for ) is a charter city in northwestern Santa Clara County, California, United States, in the San Francisco Bay Area, named after a Sequoia sempervirens, coastal redwood tree known as El Palo Alto.
Th ...
.
It was founded in Israel in 2006
and has been regarded as part of the country's "
Download Valley" cluster of adware companies. Superfish's software is
malware
Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
and
adware
Adware, often called advertising-supported software by its developers, is software that generates revenue by automatically displaying Online advertising, online advertisements in the user interface or on a screen presented during the installatio ...
.
The software was bundled with various applications as early as 2010, and
Lenovo
Lenovo Group Limited, trading as Lenovo ( , zh, c=联想, p=Liánxiǎng), is a Chinese multinational technology company specializing in designing, manufacturing, and marketing consumer electronics, personal computers, software, servers, conv ...
began to bundle the software with some of its computers in September 2014.
On February 20, 2015, the
United States Department of Homeland Security
The United States Department of Homeland Security (DHS) is the U.S. United States federal executive departments, federal executive department responsible for public security, roughly comparable to the Interior minister, interior, Home Secretary ...
advised uninstalling it and its associated
root certificate, because they make computers vulnerable to serious
cyberattacks, including interception of passwords and sensitive data being transmitted through
browsers
Browse, browser, or browsing may refer to:
Computing
*Browser service, a feature of Microsoft Windows to browse shared network resources
*Code browser, a program for navigating source code
*File browser or file manager, a program used to manage f ...
.
History
Superfish was founded in 2006 by
Adi Pinhas and Michael Chertok.
Pinhas is a graduate of
Tel Aviv University
Tel Aviv University (TAU) is a Public university, public research university in Tel Aviv, Israel. With over 30,000 students, it is the largest university in the country. Located in northwest Tel Aviv, the university is the center of teaching and ...
. In 1999, he co-founded
Vigilant Technology, which "invented digital video recording for the surveillance market", according to his
LinkedIn
LinkedIn () is an American business and employment-oriented Social networking service, social network. It was launched on May 5, 2003 by Reid Hoffman and Eric Ly. Since December 2016, LinkedIn has been a wholly owned subsidiary of Microsoft. ...
profile. Before that, he worked at
Verint, an intelligence company that analyzed telephone signals and had allegedly tapped Verizon communication lines.
Chertok is a graduate of
Technion and
Bar-Ilan University
Bar-Ilan University (BIU, , ''Universitat Bar-Ilan'') is a public research university in the Tel Aviv District city of Ramat Gan, Israel. Established in 1955, Bar Ilan is Israel's second-largest academic university institution. It has 20,000 ...
with 10 years of experience in "large scale real-time data mining systems".
Since its founding, Superfish has used a team of "a dozen or so PhDs" primarily to develop algorithms for the comparison and matching of images. It released its first product, WindowShopper, in 2011.
WindowShopper immediately prompted a large number of complaints on Internet message boards, from users who did not know how the software had been installed on their machines.
Superfish initially received funding from
Draper Fisher Jurvetson
Draper Fisher Jurvetson (DFJ) is an American venture capital firm. In January 2019, DFJ Venture, the early-stage team, spun out and formed Threshold Ventures. DFJ Growth continues to be managed by co-founder John Fisher and co-founders Mark Ba ...
, and to date has raised over $20 million, mostly from DFJ and Vintage Investment Partners.
''
Forbes
''Forbes'' () is an American business magazine founded by B. C. Forbes in 1917. It has been owned by the Hong Kong–based investment group Integrated Whale Media Investments since 2014. Its chairman and editor-in-chief is Steve Forbes. The co ...
'' listed the company as number 64 on their list of America's most promising companies.
Pinhas in 2014 stated that "Visual search is not here to replace the keyboard ... visual search is for the cases in which I have no words to describe what I see."
As of 2014, Superfish products had over 80 million users.
In May 2015, following the Lenovo security incident (see below) and to distance itself from the fallout, the team behind Superfish changed its name and moved its activities to JustVisual.com.
Lenovo security incident
Users had expressed concerns about scans of
SSL-encrypted web traffic by Superfish Visual Search software pre-installed on
Lenovo
Lenovo Group Limited, trading as Lenovo ( , zh, c=联想, p=Liánxiǎng), is a Chinese multinational technology company specializing in designing, manufacturing, and marketing consumer electronics, personal computers, software, servers, conv ...
machines since at least early December 2014. This became a major public issue, however, only in February 2015. The installation included a universal self-signed digital certificate issued by
certificate authority
In cryptography, a certificate authority or certification authority (CA) is an entity that stores, signs, and issues digital certificates. A digital certificate certifies the ownership of a public key by the named subject of the certificate. Thi ...
; the certificate authority allows a
man-in-the-middle attack
In cryptography and computer security, a man-in-the-middle (MITM) attack, or on-path attack, is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communi ...
to introduce ads even on encrypted pages. The digital certificate had the same
private key
Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic alg ...
across laptops; this allowed third-party eavesdroppers to intercept or modify
HTTPS
Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It uses encryption for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protoc ...
secure communications without triggering browser warnings by either extracting the private key or using a self-signed certificate.
On February 20, 2015, Microsoft released an update for
Windows Defender
Microsoft Defender Antivirus (formerly Windows Defender) is an antivirus software component of Microsoft Windows. It was first released as a downloadable free anti-spyware program for Windows XP and was shipped with Windows Vista and Windows 7. ...
which removes Superfish.
In an article in ''
Slate
Slate is a fine-grained, foliated, homogeneous, metamorphic rock derived from an original shale-type sedimentary rock composed of clay or volcanic ash through low-grade, regional metamorphism. It is the finest-grained foliated metamorphic ro ...
'' tech writer
David Auerbach compares the incident to the
Sony DRM rootkit scandal and says of Lenovo's actions, "installing Superfish is one of the most irresponsible mistakes an established tech company has ever made."
On February 24, 2015,
''Heise Security'' published an article revealing that the certificate in question would also be spread by a number of applications from other companies including
SAY Media and
Lavasoft's
Ad-Aware Web Companion.
Criticisms of Superfish software predated the "Lenovo incident" and were not limited to the Lenovo user community: as early as 2010, users of computers from other manufacturers had expressed concerns in online support and discussion forums that Superfish software had been installed on their computers without their knowledge, by being bundled with other software.
CEO Pinhas, in a statement prompted by the Lenovo disclosures, maintained that the security flaw introduced by Superfish software was not, directly, attributable to its own code; rather, "it appears
third-party add-on introduced a potential vulnerability that we did not know about" into the product. He identified the source of the problem as code authored by the tech company
Komodia, which deals with, among other things, website security certificates. Komodia was founded by Barak Weichselbaum, a former programmer for Israel's IDF Intelligence Core. Komodia code is also present in other applications, among them, parental-control software; and experts have said "the Komodia tool could imperil any company or program using the same code" as that found within Superfish. In fact, Komodia itself refers to its
HTTPS
Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It uses encryption for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protoc ...
-decrypting and interception software as an "SSL hijacker", and has been doing so since at least January 2011. Its use by more than 100 corporate clients may jeopardize "the sensitive data of not just Lenovo customers but also a much larger base of PC users". Komodia was closed in 2018.
Products
Superfish's first product, WindowShopper, was developed as a browser add-on for desktop and mobile devices, directing users who hover over browser images to shopping Web sites to purchase similar products. As of 2014, WindowShopper had approximately 100 million monthly users, and according to
Xconomy
Xconomy was a media company providing news on business, life sciences, and technology{{cite web , title=Company Overview of Xconomy, Inc. , url=https://www.bloomberg.com/research/stocks/private/snapshot.asp?privcapId=36215051 , publisher=Bloomberg ...
, "a high conversion to sale rate for soft goods". Superfish's business model is based on receiving affiliate fees on each sale.
The core technology, Superfish VisualDiscovery, is installed as a man-in-the-middle proxy on some Lenovo laptops. It injects advertising into results from Internet search engines; it also intercepts encrypted (SSL/TLS) connections.
In 2014, Superfish released new apps based on its image search technology.
See also
*
Browser hijacking
*
Computer vision
Computer vision tasks include methods for image sensor, acquiring, Image processing, processing, Image analysis, analyzing, and understanding digital images, and extraction of high-dimensional data from the real world in order to produce numerical ...
*
Concept-based image indexing
Concept-based image indexing, also variably named as "description-based" or "text-based" image indexing/retrieval, refers to retrieval from text-based indexing of images that may employ keywords, subject headings, captions, or natural language tex ...
*
Content-based image retrieval
Content-based image retrieval, also known as query by image content ( QBIC) and content-based visual information retrieval (CBVIR), is the application of computer vision techniques to the image retrieval problem, that is, the problem of searching ...
*
Image processing
An image or picture is a visual representation. An image can be two-dimensional, such as a drawing, painting, or photograph, or three-dimensional, such as a carving or sculpture. Images may be displayed through other media, including a pr ...
*
Image retrieval
An image retrieval system is a computer system used for browsing, searching and retrieving images from a large database of digital images. Most traditional and common methods of image retrieval utilize some method of adding metadata such as captio ...
*
Malware
Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
*
Zango (company)
References
{{Reflist, 30em
*
2006 establishments in California
Companies based in Palo Alto, California
Digital marketing companies of the United States
Software companies established in 2006
Adware