STE WILLIAMS

Microsoft rides to Dell’s rescue, wrecks rogue root certificate

Microsoft has killed Dell’s user-pwning root certificate and its self-reinstalling .dll with its antivirus Defender tool.

The certificate is a big blunder because it opens a universal means for attackers on public networks to hose new Dell laptops.

That’s because bright minds planted a self-signed certificate and private key on new laptops which allows attackers on public WiFi to steal otherwise encrypted usernames, passwords, and other sensitive data.

“An attacker can exploit a certificate using phishing or man-in-the-middle attacks to decrypt, modify or spoof HTTPS websites, such as banking, social media, or email websites,” Microsoft bod Karthik Selvaraj says.

“This could allow a malicious hacker to steal your usernames, passwords, and confidential data.

“They could also carry out transactions without your knowledge, even when it seems like you have a secure browser connection to a website.”

The free Windows Defender tool will kill the certificates and the associated Dell.Foundation.Agent.Plugins.eDell.dll plugin that will respawn the certificate.

Microsoft flags the Dell scourge as Win32/CompromisedCert.D.

Windows 7 users can run Microsoft Security Essentials, or Redmond’s Safety Scanner or Malicious Removal Tool.

Dell customers curious about their exposure can visit a test site setup by system admin Hanno Böck. ®

Sponsored:
Go beyond APM with real-time IT operations analytics

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2015/11/26/dell_cert_windows_defender/

Comments are closed.