Wednesday, April 26, 2017

Microsoft Fix REC Bug In Skype

Microsoft fixed a vulnerability in its instant messaging app Skype that could be exploited by attackers to execute arbitrary remote code on the system or to phish credentials. This vulnerability, dubbed “Spyke” was discovered by an independent security researcher Zacharis Alexandros in the Windows versions of Skype. The vulnerability primarily affects Windows clients installed on public machines, such as libraries, airports, or on smart televisions but users of other OS’s might be vulnerable. The attackers would require local access to the login screen of a running Skype instance to exploit the vulnerability. The Skype instance contains an embedded Internet Explorer browser for authentication purpose. Attackers can circumvent this normal authentication process to abuse the app’s login via Facebook functionality to convert Skype into "Spyke", an "owned" malicious process. Once compromised, attackers can use Skype to Fingerprint the Internal Browser (IE), Execute code in the context of the Skype process, Phish credentials and finally to cover communication traces. Microsoft addressed the vulnerability a month ago with the release of the updated version but has not provided any public acknowledgement.

Best Practice:
Pushing this patch update in your system will bring you to safer side.
Update this kind of software to latest version.


post made by
newWorld

2 comments:

Unknown said...

I did everything like you said, and really, your tips help me to fix this bug. In return I wanna share with you one amazing service with skype latest version https://yepdownload.com/skype that works just incredible and without any errors or mistakes.

newworld said...

Thanks for your message.

But many of that associated domain have malicious hits...
https://www.virustotal.com/#/file/6f28e77af0fd1c9f04787b6c5daf207ae54ff716ef85595f9055ff86af731e4a/detection
Baidu
Win32.Trojan.WisdomEyes.16070401.9500.9557
ClamAV
Win.Trojan.Agent-576686
DrWeb
Trojan.Inject2.26963



https://www.virustotal.com/#/file/c5dc1c3adb51d7387baec0ebe9f4cdebcf9e99860f7a7aada4f3750dcd3870fa/detection
AegisLab
Troj.W32.Pincav!c
Antiy-AVL
Trojan/Win32.Pincav
CAT-QuickHeal
Trojan.Pincav.g8
CMC
Trojan.Win32.Pincav!O
Comodo
UnclassifiedMalware
Ikarus
Trojan.Win32.Pincav
Kaspersky
Trojan.Win32.Pincav.crnn
Rising
Trojan.Generic-QwD7dRkqrTQ (cloud)
Tencent
Win32.Trojan.Pincav.Ligp
VBA32
BScope.Trojan-Dropper.Inject
ViRobot
Trojan.Win32.A.Pincav.1991232[h]
Zillya
Trojan.Pincav.Win32.25965


It is good to stay away from that domain.
https://www.virustotal.com/#/domain/yepdownload.com

Operating system - Part 1:

 In our blog, we published several articles on OS concepts which mostly on the perspective for malware analysis/security research. In few in...