Vulnerabilities / Threats
11/14/2012
11:26 AM
50%
50%

Skype Deals With Account Hijacking Exploit

Months after being notified of a vulnerability described as "child's play" to exploit, Skype has temporarily addressed the issue by disabling password resets.

 9 Ways Skype Professional Network Helps SMBs
9 Ways Skype Professional Network Helps SMBs
(click image for larger view and for slideshow)
Despite Microsoft having been warned of the issue, for more than two months Skype has been vulnerable to a bug that enabled attackers to easily hijack any user's Skype account.

Details of the vulnerability were first published in August on an online Russian-language hacking forum. Tuesday, the same Russian hacking forum user posted an update, reporting that the flaw still hadn't been fixed.

That finally led Skype Wednesday to acknowledge the security vulnerability and begin working on a fix. "Early this morning we were notified of user concerns surrounding the security of the password reset feature on our website. This issue affected some users where multiple Skype accounts were registered to the same email address," wrote Skype Web quality assurance engineer Leonas Sendrauskas in a blog post. "We suspended the password reset feature temporarily this morning as a precaution and have made updates to the password reset process today so that it is now working properly. We are reaching out to a small number of users who may have been impacted to assist as necessary. Skype is committed to providing a safe and secure communications experience to our users and we apologize for the inconvenience."

[ For more on Skype's security bugs, see Skype Bug Divulges IP Addresses. ]

Before Skype made that fix, using the vulnerability to hack into a Skype account was "child's play," according to Rik Ferguson, director of security research and communication at Trend Micro, writing in a blog post.

"The procedure is so simple it could be carried out by even the most inexperienced of computer users. All that was necessary was to create a new Skype ID, and associate it with the email address of your victim," he said. "Once this procedure is complete, a flaw in the password reset procedure allowed the attacker to assume control over the victim account by using the online password reset form. This would lock the victim out of their Skype account and allow the hacker to receive and respond to all messages destined for that victim until further notice. I tested the vulnerability and the entire process took only a matter of minutes."

Before Skype disabled password resets, Mikko Hypponen, chief research officer at F-Secure, noted that the only way to mitigate the vulnerability was to not use a known email address. "If you think somebody would be interested in hijacking your Skype account, change your email address to something the attacker can't guess," he said via Twitter.

But that fix would also have been only temporary. "This is not only security by obscurity, it could theoretically leave you more open to attacks as you are less likely to investigate regularly the inbox of such little-used addresses," said Trend Micro's Ferguson.

The time Microsoft took before issuing a Skype fix has drawn criticism, especially given Microsoft's very vocal campaigning for better sharing of vulnerability information. "I can't believe that it took Microsoft 2-3 months to figure out how to 'solve' the problem by temporarily disabling the reset functionality," tweeted The Grugq, who acts as a broker between vulnerability buyers and sellers.

This isn't the first Skype bug to come to light thanks to the attentions of Russian hackers. In April 2012, a Pastebin post revealed that with a few tweaks to the Skype application's registry keys, an attacker could use the Skype client to reveal the real name and IP address associated with any Skype username. While Skype quickly said that it would be preparing a patch, it had reportedly first been alerted to the bug in November 2010.

Building a more robust network vulnerability management program can help you identify security holes before an attacker does, as well as develop more secure systems and applications in the future. In the A Guide To Network Vulnerability Management report, we examine the products and practices that will get you there. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-2977
Published: 2015-07-29
Webservice-DIC yoyaku_v41 allows remote attackers to create arbitrary files, and consequently execute arbitrary code, via unspecified vectors.

CVE-2015-2978
Published: 2015-07-29
Webservice-DIC yoyaku_v41 allows remote attackers to bypass authentication and complete a conference-room reservation via unspecified vectors, as demonstrated by an "unintentional reservation."

CVE-2015-2979
Published: 2015-07-29
Webservice-DIC yoyaku_v41 allows remote attackers to execute arbitrary OS commands via unspecified vectors.

CVE-2015-4286
Published: 2015-07-29
The web framework in Cisco UCS Central Software 1.3(0.99) allows remote attackers to read arbitrary files via a crafted HTTP request, aka Bug ID CSCuu41377.

CVE-2015-4290
Published: 2015-07-29
The kernel extension in Cisco AnyConnect Secure Mobility Client 4.0(2049) on OS X allows local users to cause a denial of service (panic) via vectors involving contiguous memory locations, aka Bug ID CSCut12255.

Dark Reading Radio
Archived Dark Reading Radio
What’s the future of the venerable firewall? We’ve invited two security industry leaders to make their case: Join us and bring your questions and opinions!