Feeds

Whistleblower releases Skype snooping code

VoIPwn

Top 5 reasons to deploy VMware with Tegile

The source code for a Windows Trojan capable of recording Skype calls as MP3 files has been released in a move that spells bad news for VoIP confidentiality.

Swiss software developer Ruben Unteregger published the source code for a package capable of eavesdropping on encrypted Skype VoIP conversations on his website Megapanzer.com. Unteregger, who claims he developed the software while working for ERA IT Solutions, reportedly published the code in order shed light on a dark subject and to spur the development of security defences.

An interview on his site touches on Unteregger's rationale for releasing the source code for the Skype Trojan under the GPL.

The source code of this wiretapping trojan will be published in the upcoming days. There won’t be problems about copyright, because ERA IT Solutions let me keep it. The code will be published, it will get analysed as soon as the binaries got uploaded, signature patterns will be created by antivirus companies, the malware will be detected, blocked and deleted, if it tries to infect a system.

Unteregger's blog post announcing the release outlines some of the main features of the malware.

The code is simple and straightforward. You have [to] know malware development is no rocket science and if you expect big magic you are at the wrong place. The backdoor receives instructions from the dropzone and transfers audio files. The Skype-Tap intercepts the Skype function calls, extracts and dumps audio data to files, converts it to the mp3 format and encrypts it.

The code is not 100 per cent complete. I removed the plugin system in the backdor and also the firewall bypassing system is not there anymore. I will publish both of them in separate tools later. If you don’t like this… well, I can’t help you. Thats how it is. Take it or leave it.

Symantec warns that the public availability of the code (dubbed Peskyspy) is likely to spur the development of "customised" threats.

The source code includes backdoor functionality, according to preliminary analysis by anti-virus firm F-Secure.

Unteregger's project finally provides solid foundation to long standing industry rumours.

Leaked documents have previously suggested that Bavarian authorities commissioned a firm called DigiTask to create a similar Trojan. Law enforcement agencies in the US and Europe, most vocally those in Germany, have long complained that Skype has become a barrier to investigations and called for changes in the law that would allow them to plant Trojans on suspects PCs.

The approach involves tricking users into getting infected and hoping the any security defences they have in place don't detect the threat. Not detecting a threat as part of a gentleman's agreement between a software vendor and a law enforcement agency could risk alienating customers and would be difficult, if not impossible to conceal, for any length of time.

That's just one reason why the whole law enforcement Trojan plan has long struck us as both unworkable and plain wrong-headed. The trade craft of a serious criminal or terror suspect would have to be really sloppy to get caught. Simply using a Mac or, better, Linux would defeat any law enforcement Trojan targeted at Windoze users, for example. ®

Beginner's guide to SSL certificates

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Virgin Media struck dumb by NATIONWIDE packet loss balls-up
Turning it off and on again fixes glitch 12 HOURS LATER
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
How to simplify SSL certificate management
Simple steps to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle.