Read the Original Article at http://www.informationweek.com/news/showArticle.jhtml?articleID=240134937
Details of the vulnerability were first published in August on an online Russian-language hacking forum. Tuesday, the same Russian hacking forum user posted an update, reporting that the flaw still hadn't been fixed.
That finally led Skype Wednesday to acknowledge the security vulnerability and begin working on a fix. "Early this morning we were notified of user concerns surrounding the security of the password reset feature on our website. This issue affected some users where multiple Skype accounts were registered to the same email address," wrote Skype Web quality assurance engineer Leonas Sendrauskas in a blog post. "We suspended the password reset feature temporarily this morning as a precaution and have made updates to the password reset process today so that it is now working properly. We are reaching out to a small number of users who may have been impacted to assist as necessary. Skype is committed to providing a safe and secure communications experience to our users and we apologize for the inconvenience."
[ For more on Skype's security bugs, see Skype Bug Divulges IP Addresses. ]
Before Skype made that fix, using the vulnerability to hack into a Skype account was "child's play," according to Rik Ferguson, director of security research and communication at Trend Micro, writing in a blog post.
"The procedure is so simple it could be carried out by even the most inexperienced of computer users. All that was necessary was to create a new Skype ID, and associate it with the email address of your victim," he said. "Once this procedure is complete, a flaw in the password reset procedure allowed the attacker to assume control over the victim account by using the online password reset form. This would lock the victim out of their Skype account and allow the hacker to receive and respond to all messages destined for that victim until further notice. I tested the vulnerability and the entire process took only a matter of minutes."
Before Skype disabled password resets, Mikko Hypponen, chief research officer at F-Secure, noted that the only way to mitigate the vulnerability was to not use a known email address. "If you think somebody would be interested in hijacking your Skype account, change your email address to something the attacker can't guess," he said via Twitter.
But that fix would also have been only temporary. "This is not only security by obscurity, it could theoretically leave you more open to attacks as you are less likely to investigate regularly the inbox of such little-used addresses," said Trend Micro's Ferguson.
The time Microsoft took before issuing a Skype fix has drawn criticism, especially given Microsoft's very vocal campaigning for better sharing of vulnerability information. "I can't believe that it took Microsoft 2-3 months to figure out how to 'solve' the problem by temporarily disabling the reset functionality," tweeted The Grugq, who acts as a broker between vulnerability buyers and sellers.
This isn't the first Skype bug to come to light thanks to the attentions of Russian hackers. In April 2012, a Pastebin post revealed that with a few tweaks to the Skype application's registry keys, an attacker could use the Skype client to reveal the real name and IP address associated with any Skype username. While Skype quickly said that it would be preparing a patch, it had reportedly first been alerted to the bug in November 2010.
Building a more robust network vulnerability management program can help you identify security holes before an attacker does, as well as develop more secure systems and applications in the future. In the A Guide To Network Vulnerability Management report, we examine the products and practices that will get you there. (Free registration required.)