DBSA ID: 2013-0002
Regarding: Skype Chat Security
Date: 2013 05 21
Last Modified: 20130521012323 by Kradorex Xeron
Who should take note: All Skype users
Rationale: Users must be able to take action to ensure their data is secure.
Rationale: The skype protocol has been displayed to have a weakness whereas a third party may compromise data mid-communication.
Spread of Issue: CROSS-PLATFORM HIGH
Rationale: Millions of users use Skype across multiple platforms.
Skype is a voice, video and text chat suite targeted toward users across the world, it is designed with simplicity in mind. The vendor (Microsoft) has been shown to be capable of intercepting the chat communication mid-transit between users.
The Skype protocol's security is able to be compromised by the vendor by means of decrypting chat messages at the Skype servers operated by the vendor. This has been discovered since the vendor probes websites linked in said chat messages.
Digibase has directly observed that vendor has been probing websites that are posted as links in Skype chats. These are performed as HEAD requests transmitted (as per RFC 2616) against the webserver for an unknown reason. the request is typically transmitted from the IP address 188.8.131.52.
An example of such a request is as follows as per Apache HTTPD logs:
<domain> 184.108.40.206 - - [20/May/2013:02:57:49 -0400] "HEAD / HTTP/1.1" 200 - "-" "-"
It is strongly advised that Skype users exchanging sensitive and/or confidential information utilize other means such as IRC over SSL or PGP encrypted email. If voice chat is required, it is advised that a solution like Teamspeak be set up and utilized.