Feeds

Skype IDs hijackable by ANY FOOL who knows your email address

Doesn't need access to it, just to know it. Sheesh!

Beginner's guide to SSL certificates

A vulnerability in Skype allows anyone to hijack its users' accounts just by knowing or guessing a punter's registered email address.

The embarrassing security hole, which is trivial to abuse, was first discussed on a Russian underground forum three months ago. Last night a Russian blog publicised the bug, and details of the flaw circulated the internet. The hijack is triggered by signing up for a new Skype account using the email address of another registered user. No access to the victim's inbox is required; one just simply needs to know the address.

Creating an account this way generates a warning that the email address is already associated with another user, but crucially the voice-chat website does not prevent the opening of the new account. From there it's possible to log into the service and request a new password for the victim's account: a security token is sent to the attacker's Skype app allowing the login credential to be reset.

Armed with this token, it is also possible to download private chat logs for the compromised account while the genuine owner is locked out.

In a holding statement, the Microsoft-owned VoIP biz confirmed it has disabled the password reset mechanism as a temporary measure:

We have had reports of a new security vulnerability issue. As a precautionary step we have temporarily disabled password reset as we continue to investigate the issue further. We apologize for the inconvenience but user experience and safety is our first priority.

This is a good move because, as Rik Ferguson of Trend Micro warns, the bug makes account hijacking "child's play".

"In essence the procedure is so simple it could be carried out by even the most inexperienced of computer users," Ferguson explains. "All that was necessary was to create a new Skype ID, and associate it with the email address of your victim.

"Once this procedure is complete, a flaw in the password reset procedure allowed the attacker to assume control over the victim account by using the online password reset form. This would lock the victim out of their Skype account and allow the hacker to receive and respond to all messages destined for that victim until further notice. I tested the vulnerability and the entire process took only a matter of minutes."

Before Skype temporarily disabled password resets, the only way to mitigate against the vulnerability was to register a secret email address with one's Skype account. Costin Raiu, senior security researcher at Kaspersky Lab, reports that the Skype account of Russian opposition leader Alexey Navalny was hacked using the exploit. ®

Remote control for virtualized desktops

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.