Red Ice News

The Future is the Past

Source code for Skype eavesdropping trojan in the wild
New to Red Ice? Start Here!

Source code for Skype eavesdropping trojan in the wild

Source: blogs.zdnet.com


Earlier this week, Swiss programmer Ruben Unteregger who has been reportedly working for a Swiss company ERA IT Solutions responsible for coding government sponsored spyware, has released the source code of a trojan horse that injects code into the Skype process in order to convert the incoming and outgoing voice data into an encrypted MP3 available at the disposal of the attacker.

Here’s how the trojan, currently detected as Trojan.Peskyspy, works:

“When the Trojan is executed, it injects a thread into the Skype process and hooks a number of API calls, allowing it to intercept all PCM audio data going between the Skype process and underlying audio devices. Note: Since the Trojan listens to the data coming to and from the audio devices, it gathers the audio independently of any application-specific protocols or encryption applied by Skype when it passes voice data at the network level.

Note: The incoming and outgoing audio data are stored in separate .mp3 files. The Trojan also opens a back door on the compromised computer, allowing an attacker to perform the following actions:
- Send the .mp3 to a predetermined location
- Download an updated version
- Delete the Trojan from the compromised computer”

Skype is often dubbed a “national security threat” by governments all across the globe due to their — at least publicly acknowledged inability — to crack the 256-bit encryption VoIP calls.

And while some of these governments are reportedly spending surreal amounts of tax payer’s money (Rental of the Skype-Capture-Unit per month and instance EUR 3.500) in order to achieve their objectives, others are taking the cost-effectiveness path by attacking the weakest link in the process - the end user infected with a targeted DIY government sponsored spyware recording all ongoing and incoming Skype calls, thereby bypassing the need to attack the encryption algorithm.

Read full article at: blogs.zdnet.com

Here is another take on the story: A little bit about Trojan.Peskyspy

Skype Chat Preferences with a quote from “1984” as sample text


From: happygiraffe.net

Comments

We're Hiring

We are looking for a professional video editor, animator and graphics expert that can join us full time to work on our video productions.

Apply

Help Out

Sign up for a membership to support Red Ice. If you want to help advance our efforts further, please:

Donate

Tips

Send us a news tip or a
Guest suggestion

Send Tip

Related News

Are genes our destiny? ’Hidden’ code in DNA evolves more rapidly than genetic code
Are genes our destiny? ’Hidden’ code in DNA evolves more rapidly than genetic code
Suspect Wildfires, Eris Covid Variant Pushed Hard, Speech Policing, Fascist Russia? - WW Ep277
Suspect Wildfires, Eris Covid Variant Pushed Hard, Speech Policing, Fascist Russia? - WW Ep277

Archives Pick

Red Ice T-Shirts

Red Ice Radio

3Fourteen

Con Inc., J6 Political Prisoners & The Pedophile Problem
Kim Coulter - Con Inc., J6 Political Prisoners & The Pedophile Problem
Why European Culture, Art and Beauty Matter
Gifts - Why European Culture, Art and Beauty Matter

TV

We Can’t Survive Without Them - FF Ep256
We Can’t Survive Without Them - FF Ep256
No-Go Zone: Your New 'Free Speech' Hero Just Dropped
No-Go Zone: Your New 'Free Speech' Hero Just Dropped

RSSYoutubeGoogle+iTunesSoundCloudStitcherTuneIn

Design by Henrik Palmgren © Red Ice Privacy Policy