Proof Of Concept Skype Wiretapping Malware Released

from the not-so-secret-any-more dept

One of the benefits of Skype was that, due to the way it works (P2P, encrypted communications), it made it much more difficult to do any sort of wiretap. This has upset various governments who are used to having the ability to wiretap any voice communications. However, it's never impossible. The most obvious way is to simply create some sort of trojan that gets installed on one user's computer that has audio recording abilities -- and Symantec is going around hyping up the fact that source code for just such a trojan has been released. Of course, even Symantec admits that there's no evidence of the code actually being used in the wild -- it seems more like a proof-of-concept. On top of that, it's hardly a new idea. Nearly a year ago, we talked about how German authorities were accused of using something that sounded quite similar. Still, it is a good reminder that even if you're using an encrypted Skype call, at either end of that call, the audio is decrypted, and a well-placed recording system can capture it.


Reader Comments (rss)

(Flattened / Threaded)

  •  
    identicon
    Anonymous Coward, Aug 31st, 2009 @ 5:51am

    I can see a pretty easy way around this. Just make a Linux LiveCD with Skype already on it. Sure, it'll be beyond most criminals, but I think you could probably find someone more computer savvy to do it for you. Certainly for large organized crime syndicates, it would be easy.

     

    reply to this | link to this | view in chronology ]

  •  
    identicon
    NullOp, Aug 31st, 2009 @ 5:55am

    Spys!

    I am always humored by spying stories. Having done a bit myself, legally, I know there is nothing more boring in the world except perhaps watching porn.

     

    reply to this | link to this | view in chronology ]

  •  
    identicon
    Anonymous, Aug 31st, 2009 @ 7:39am

    Proof of two concepts

    LiveCD is a great idea. Heck Skype will even run off a flash drive. It's a great little program.

    The proof of concept is that it can be done. The second concept proven I think is that it WILL be done. Just as nothing is foolproof to the adequately equipped fool, anything available to the public WILL be hacked, it's just a matter of time.

    This particular hack kinda makes me chuckle, though, at the simplicity. I feel like Brain laughing at Pinky's scheme and saying "That's the stupidest idea in the world!"

     

    reply to this | link to this | view in chronology ]

  •  
    identicon
    Malware Removal Bot, Sep 16th, 2009 @ 8:54am

    As most readers will already know, a new 0-day vulnerability in MS Video ActiveX Control is currently being exploited in the wild. Lots of research material has already been published covering different aspects of this vulnerability and the attack vector. I have nothing more to add on this front. I would rather focus on explaining the details of the malware behind the scenes.

     

    reply to this | link to this | view in chronology ]

  •  
    identicon
    Mike, Nov 18th, 2009 @ 6:42am

    So the hackers who successfully implement this malware will be rewarded with hours upon hours of mp3 files that they will have to wade through in order to find any relevant (valuable) data. This has to be the least efficient form of hacking I have ever heard of.

     

    reply to this | link to this | view in chronology ]


Add Your Comment

Have a Techdirt Account? Sign in now. Want one? Register here
Get Techdirt’s Daily Email
Save me a cookie
  • Note: A CRLF will be replaced by a break tag (<br>), all other allowable HTML will remain intact
  • Allowed HTML Tags: <b> <i> <a> <em> <br> <strong> <blockquote> <hr> <tt>
Follow Techdirt
A word from our sponsors...
Essential Reading
Techdirt Reading List
Techdirt Insider Chat
A word from our sponsors...
Recent Stories
A word from our sponsors...

Close

Email This