Feeds

Whistleblower releases Skype snooping code

VoIPwn

Eight steps to building an HP BladeSystem

The source code for a Windows Trojan capable of recording Skype calls as MP3 files has been released in a move that spells bad news for VoIP confidentiality.

Swiss software developer Ruben Unteregger published the source code for a package capable of eavesdropping on encrypted Skype VoIP conversations on his website Megapanzer.com. Unteregger, who claims he developed the software while working for ERA IT Solutions, reportedly published the code in order shed light on a dark subject and to spur the development of security defences.

An interview on his site touches on Unteregger's rationale for releasing the source code for the Skype Trojan under the GPL.

The source code of this wiretapping trojan will be published in the upcoming days. There won’t be problems about copyright, because ERA IT Solutions let me keep it. The code will be published, it will get analysed as soon as the binaries got uploaded, signature patterns will be created by antivirus companies, the malware will be detected, blocked and deleted, if it tries to infect a system.

Unteregger's blog post announcing the release outlines some of the main features of the malware.

The code is simple and straightforward. You have [to] know malware development is no rocket science and if you expect big magic you are at the wrong place. The backdoor receives instructions from the dropzone and transfers audio files. The Skype-Tap intercepts the Skype function calls, extracts and dumps audio data to files, converts it to the mp3 format and encrypts it.

The code is not 100 per cent complete. I removed the plugin system in the backdor and also the firewall bypassing system is not there anymore. I will publish both of them in separate tools later. If you don’t like this… well, I can’t help you. Thats how it is. Take it or leave it.

Symantec warns that the public availability of the code (dubbed Peskyspy) is likely to spur the development of "customised" threats.

The source code includes backdoor functionality, according to preliminary analysis by anti-virus firm F-Secure.

Unteregger's project finally provides solid foundation to long standing industry rumours.

Leaked documents have previously suggested that Bavarian authorities commissioned a firm called DigiTask to create a similar Trojan. Law enforcement agencies in the US and Europe, most vocally those in Germany, have long complained that Skype has become a barrier to investigations and called for changes in the law that would allow them to plant Trojans on suspects PCs.

The approach involves tricking users into getting infected and hoping the any security defences they have in place don't detect the threat. Not detecting a threat as part of a gentleman's agreement between a software vendor and a law enforcement agency could risk alienating customers and would be difficult, if not impossible to conceal, for any length of time.

That's just one reason why the whole law enforcement Trojan plan has long struck us as both unworkable and plain wrong-headed. The trade craft of a serious criminal or terror suspect would have to be really sloppy to get caught. Simply using a Mac or, better, Linux would defeat any law enforcement Trojan targeted at Windoze users, for example. ®

The Power of One Brief: Top reasons to choose HP BladeSystem

More from The Register

next story
Google Nest, ARM, Samsung pull out Thread to strangle ZigBee
But there's a flaw in Google's IP-based IoT system
Orange spent weekend spamming customers with TXTs
Zero, not infinity, is the Magic Number customers want
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
'Two-speed internet' storm turns FCC.gov into zero-speed website
Deadline for comments on net neutrality shake-up extended to Friday
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
NBN Co execs: No FTTN product until 2015
Faster? Not yet. Cheaper? No data
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.