Samsung investigating report of keylogger on its laptops
IDG News Service - Samsung Electronics is investigating allegations that some models of its R Series laptops contain keylogging software that could be used to record anything typed on the laptop computers.
Mohamed Hassan said he became aware of the issue last month, when he purchased a Samsung R525 at a Best Buy in Toronto. The laptop had keylogging software on it, which he deleted immediately. Two weeks later, Hassan decided he wanted a more powerful machine, so he returned the R525 and bought a new model -- the R540, at a local FutureShop. To his surprise, the keylogger was there too, Hassan said in an interview Wednesday.
"These were new systems. They weren't used for anything," he said. "I could give them the benefit of the doubt on the first one. But then when I got a second model, a different model from a different store, that tells me that Samsung is aware of the problem."
Hassan, an IT consultant based in Toronto, said that Samsung tech support told him: "We just put it there to find out how the computer is being used."
Samsung spokesman Jason Redmond said that his company is looking into Hassan's allegations. "We take these claims very, very seriously," he said. He had not previously heard of the problem, or heard of de Willebois Consulting, the company that makes the StarLogger software that Hassan said he found on the laptop. "We have no understanding of a relationship with this company and we have no prior knowledge of this software being on our laptops," he said.
De Willebois Consulting did not respond to messages seeking comment for this story. On its website, the company says StarLogger "is completely undetectable and starts up whenever your computer starts up. See everything being typed: emails, messages, documents, web pages, usernames, passwords, and more." The software can also capture screen images, the website says.
Hassan's allegations were published Wednesday in Network World.
If Samsung is responsible for putting the keylogger on the machines, Samsung could be in big trouble, according to Cindy Cohn, legal director for the Electronic Frontier Foundation. "They shouldn't be installing keyloggers on devices that they're selling to the general public. Even if Samsung isn't using it, you're basically setting up someone else to use it," she said.
As with Sony BMG's notorious rootkit software, discovered in 2005, if Samsung secretly installed keyloggers on customers' computers, it could lead to civil lawsuits or charges that the company is violating state consumer protection laws. "There are serious criminal offenses possible if they're actually using this device to spy on their customers, but I don't see any evidence of that," Cohn said. "This could be chalked up to poor thinking, or it could be illegal. We just need more information to be able to figure out where it is on this scale."
Keyloggers are commonly used by hackers to steal sensitive information including usernames and passwords from hacked computers, but de Willebois' website describes some legitimate uses for its software: monitoring children's Internet activity or recovering text in the event of a computer crash, for example.
IDG, the parent company of the IDG News Service, also publishes Network World.
- Path Selection Infographic Path Selection Infographic
- Hyperconvergence Infographic A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- Preparing Your Infrastructure for the Hyperconvergence Era From cloud computing and virtualization to mobility and unified communications, an array of innovative technologies is transforming today's data centers.
- How WAN Optimization Helps Enterprises Reduce Costs If you wanted to break down innovation into a tidy equation, it might go something like this: Technology + Connectivity = Productivity. Productivity...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users? All Laptops White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!