Crypto-busting apps may been exploited against visitors of Google and dozens more.
by Dan Goodin - Feb 26, 2015Martial Régereauhttp://cdn.arstechnica.net/wp-content/uploads/2015/02/Attaque_Man_In_The_Middle.jpg Martial RégereauIt's starting to look like Superfish and other software containing the same HTTPS-breaking code library may have posed more than a merely theoretical danger to Internet users. For the first time, researchers have uncovered evidence suggesting the critical weakness may have been exploited against real people visiting real sites, including Gmail, Amazon, eBay, Twitter, and Gpg4Win.org, to name just a few.
As Ars reported one week ago, ad-injecting software preinstalled on some Lenovo laptops caused most browsers to trust fraudulent secure sockets layer certificates. The software was called Superfish. In the coming days, security researchers unearthed more than a dozen other apps that posed the same threat. The common thread among all the titles was a code library provided by an Israel-based company called Komodia.
Full Article