Security hole enables Skype account hijacks

Victor Barreiro Jr.

This is AI generated summarization, which may have errors. For context, always refer to the full article.

A security hole in the messaging service makes accounts susceptible to unauthorized access. A new report indicates that Skype may have known about the issue since October.

WATCH YOUR SKYPE. A new security hole makes it possible for others to gain access to your account. Screen shot from http://www.Skype.com

(UPDATE 2) MANILA, Philippines – Skype users may want to consider watching their account and the Skype security blog over the next day or two. The Next Web reports that a security hole makes Skype accounts vulnerable to hijacking.

The security hole allows unauthorized users with knowledge of your Skype-connected email address to change the password on your Skype account, thus gaining control of it.

The hole was first posted on a Russian forum two months ago, and has been verified by The Next Web.

Details of how the security hole works have not been made public, so as to prevent its spread. The Next Web has contacted Skype so it can address the issue.

According to The Next Web’s post, the reason for the security hole’s operation is simple. “When you use an existing email address to sign up with Skype again, the service emails you a reminder of your username, which is okay, since no one else should have access to your email. Unfortunately, because this method enables you to get a password reset token sent to the Skype app itself, this allows a third party to redeem it and claim ownership of your original username and thus account.”

A reddit post (link unlisted as the post also lists the hijacking process) gives a potential means of preventing the hijacking:

  • Log in on skype.com (if you still can, that is)
  • Go to the profile, click Edit and add an email address an attacker won’t guess.
  • Click Save
  • Click Edit again, set the new address as Primary
  • Click Save, have a laugh at the message, enter the password and click the Enter button or it won’t work (like one bug was not enough)
  • Delete the old email

As of this posting, Skype is still conducting an internal investigation.

Update 1: A report on Softpedia asserts that Skype may have known about the issue in October.

According to the report from Eduard Kovacs, researchers from Vulnerability Lab told Softpedia about the exploit’s existence in October. The researchers also provided additional information to Softpedia that showed proof of concept.

Kovacs adds, “They asked us to hold back on publishing the article until Skype addressed the issue that was caused by an “unsanitized request.” However, at the time, Benjamin Kunz Mejri, the founder of Vulnerability Lab, revealed that all the details of the vulnerability were given to Skype on October 7.”

As of this update, TechCrunch reports that Skype has removed password reset options from the service, most likely as a temporary remedy.

Update 2: Softpedia’s article linked above has been amended with a clarification. According to the update, Mejri clarified that the exploit spotted by Vulnerability Lab used a different authentication flaw. The flaw outlined in this article appears to be different from the original issue spotted on a Russian forum. – Rappler.com

Add a comment

Sort by

There are no comments yet. Add your comment to start the conversation.

Summarize this article with AI

How does this make you feel?

Loading
Download the Rappler App!
Person, Human, Sleeve

author

Victor Barreiro Jr.

Victor Barreiro Jr is part of Rappler's Central Desk. An avid patron of role-playing games and science fiction and fantasy shows, he also yearns to do good in the world, and hopes his work with Rappler helps to increase the good that's out there.