How to Remove 'Superfish-Like' from the Dell's Laptops Infected with
To Check if Your Computer is Vulnerable
To discover the dangerous certificate:
-Open up the Start menu
-Select Run
-Type in certmgr.msc – the Windows certificate manager – into the box and Hit Enter
-Open up the Trusted Root Certification Authority folder on the left
-Select Certificates
-Search for eDellRoot
Once found, right-click over eDellRoot and hit "Remove." It appears to be gone, but actually it's not.
Reboot your computer and reopen certmgr.msc and search for the certificate "eDellRoot". Yeah, the removed root CA cert is back.
How to Remove
It seems that even if the certificate is clearly fraudulent, Google Chrome and Microsoft Edge and Internet Explorer browsers always establish an encrypted Web session with no warnings.
But fortunately, Mozilla's Firefox web browser generates an alert warning that the certificate was not trusted.
So, Dell customers with new XPS, Precision, and Inspiron models are advised to use Firefox to browse the web.
To fix the issue completely, Dell users will need to manually revoke the certificate permissions, which is a complex and technically demanding task.
Moreover, security researcher Darren Kemp from Duo Security says that the problem may be even worse than what Nord suggested.
According to an analysis done by Kempa, a bundled plugin re-installs the root CA file when it is removed.
So, to remove the eDellRoot certificate completely, you must:
-First delete Dell.Foundation.Agent.Plugins.eDell.dll from your system
-Then remove the eDellRoot root CA certificate