Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Dell is shipping laptops with a free Superfish-like problem:The Inquirer

  • Please log in to reply
2 replies to this topic

#1 JohnC_21


  • Members
  • 24,849 posts
  • Gender:Male
  • Local time:09:19 AM

Posted 23 November 2015 - 06:04 PM

HARDWARE AND OTHER THINGS FIRM Dell has been accused of shipping laptops that come installed with a rogue piece of software that could be as bad as the one at the centre of the infamous Lenovo/Superfish scandal.

Lenovo had a tough time explaining away Superfish. So far Dell has not commented on the accusation, though we have asked it for a statement. It is accused, via Reddit, of shipping an eponymous root certificate and private key called eDellRoot.




Another article from The Register


The rogue root certificate in new Dell computers – a certificate that allows people to be spied on when banking and shopping online – will magically reinstall itself even when deleted.

El Reg can confirm that the eDellRoot root CA cert, discovered over the weekend, automatically reappears when removed from the Windows operating system. We tried this on a Windows 8 Inspiron 15 series laptop that was bought in July this year for our San Francisco office.


Edited by JohnC_21, 23 November 2015 - 06:08 PM.

BC AdBot (Login to Remove)


#2 Union_Thug


    Bleeps with the fishes...

  • Members
  • 2,355 posts
  • Gender:Male
  • Location:is everything
  • Local time:09:19 AM

Posted 24 November 2015 - 01:47 AM

Dell has released a statement regarding this matter along with instructions to remove it. :)


We have posted instructions to permanently remove the certificate from your system here. We will also push a software update starting on November 24 that will check for the certificate, and if detected remove it. Commercial customers who reimaged their systems without Dell Foundation Services are not affected by this issue. Additionally, the certificate will be removed from all Dell systems moving forward.


Edited by Union_Thug, 24 November 2015 - 01:50 AM.

#3 Aura


    Bleepin' Special Ops

  • Malware Response Team
  • 19,697 posts
  • Gender:Male
  • Local time:09:19 AM

Posted 24 November 2015 - 03:09 PM

Two more related articles:
Dell does a Superfish, ships PCs with easily cloneable root certificates
Dell apologizes for HTTPS certificate fiasco, provides removal tool

Security Administrator | Sysnative Windows Update Senior Analyst | Malware Hunter | @SecurityAura
My timezone UTC-05:00 (East. Coast). If I didn't reply to you within 48 hours, please send me a PM.

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users