Vulnerabilities / Threats
11/14/2012
11:26 AM
Connect Directly
RSS
E-Mail
50%
50%

Skype Deals With Account Hijacking Exploit

Months after being notified of a vulnerability described as "child's play" to exploit, Skype has temporarily addressed the issue by disabling password resets.

 9 Ways Skype Professional Network Helps SMBs
9 Ways Skype Professional Network Helps SMBs
(click image for larger view and for slideshow)
Despite Microsoft having been warned of the issue, for more than two months Skype has been vulnerable to a bug that enabled attackers to easily hijack any user's Skype account.

Details of the vulnerability were first published in August on an online Russian-language hacking forum. Tuesday, the same Russian hacking forum user posted an update, reporting that the flaw still hadn't been fixed.

That finally led Skype Wednesday to acknowledge the security vulnerability and begin working on a fix. "Early this morning we were notified of user concerns surrounding the security of the password reset feature on our website. This issue affected some users where multiple Skype accounts were registered to the same email address," wrote Skype Web quality assurance engineer Leonas Sendrauskas in a blog post. "We suspended the password reset feature temporarily this morning as a precaution and have made updates to the password reset process today so that it is now working properly. We are reaching out to a small number of users who may have been impacted to assist as necessary. Skype is committed to providing a safe and secure communications experience to our users and we apologize for the inconvenience."

[ For more on Skype's security bugs, see Skype Bug Divulges IP Addresses. ]

Before Skype made that fix, using the vulnerability to hack into a Skype account was "child's play," according to Rik Ferguson, director of security research and communication at Trend Micro, writing in a blog post.

"The procedure is so simple it could be carried out by even the most inexperienced of computer users. All that was necessary was to create a new Skype ID, and associate it with the email address of your victim," he said. "Once this procedure is complete, a flaw in the password reset procedure allowed the attacker to assume control over the victim account by using the online password reset form. This would lock the victim out of their Skype account and allow the hacker to receive and respond to all messages destined for that victim until further notice. I tested the vulnerability and the entire process took only a matter of minutes."

Before Skype disabled password resets, Mikko Hypponen, chief research officer at F-Secure, noted that the only way to mitigate the vulnerability was to not use a known email address. "If you think somebody would be interested in hijacking your Skype account, change your email address to something the attacker can't guess," he said via Twitter.

But that fix would also have been only temporary. "This is not only security by obscurity, it could theoretically leave you more open to attacks as you are less likely to investigate regularly the inbox of such little-used addresses," said Trend Micro's Ferguson.

The time Microsoft took before issuing a Skype fix has drawn criticism, especially given Microsoft's very vocal campaigning for better sharing of vulnerability information. "I can't believe that it took Microsoft 2-3 months to figure out how to 'solve' the problem by temporarily disabling the reset functionality," tweeted The Grugq, who acts as a broker between vulnerability buyers and sellers.

This isn't the first Skype bug to come to light thanks to the attentions of Russian hackers. In April 2012, a Pastebin post revealed that with a few tweaks to the Skype application's registry keys, an attacker could use the Skype client to reveal the real name and IP address associated with any Skype username. While Skype quickly said that it would be preparing a patch, it had reportedly first been alerted to the bug in November 2010.

Building a more robust network vulnerability management program can help you identify security holes before an attacker does, as well as develop more secure systems and applications in the future. In the A Guide To Network Vulnerability Management report, we examine the products and practices that will get you there. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3352
Published: 2014-08-30
Cisco Intelligent Automation for Cloud (aka Cisco Cloud Portal) 2008.3_SP9 and earlier does not properly consider whether a session is a problematic NULL session, which allows remote attackers to obtain sensitive information via crafted packets, related to an "iFrame vulnerability," aka Bug ID CSCuh...

CVE-2014-3908
Published: 2014-08-30
The Amazon.com Kindle application before 4.5.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2010-5110
Published: 2014-08-29
DCTStream.cc in Poppler before 0.13.3 allows remote attackers to cause a denial of service (crash) via a crafted PDF file.

CVE-2012-1503
Published: 2014-08-29
Cross-site scripting (XSS) vulnerability in Six Apart (formerly Six Apart KK) Movable Type (MT) Pro 5.13 allows remote attackers to inject arbitrary web script or HTML via the comment section.

CVE-2013-5467
Published: 2014-08-29
Monitoring Agent for UNIX Logs 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP09, and 6.2.3 through FP04 and Monitoring Server (ms) and Shared Libraries (ax) 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP08, 6.2.3 through FP01, and 6.3.0 through FP01 in IBM Tivoli Monitoring (ITM)...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.