Recent CIA Wikileaks release mentions "Skype" hack for spying on users, under the section called "Fine Dining Tool Module Lists". Below is the relevant section.
Skype has comprised and targeted by your friendly neighborhood CIA agent as revealed in latest WikiLeaks leak, code-named "Vault 7". This is not trivial since Skype boasts that it has more than 300 million monthly active users as of March 2016.
DLL Hijack | Skype | User, Video-Chat | Operator uses Skype to chat or call while collection is occurring |
For the uninitiated, the Wikileaks"Vault 7" release list a host of exploits for common everyday free and paid applications by the CIA. The "Fine Dining Tool Module Lists" section list applications whose modules or libraries (which are loaded to run the program known as dynamically loading libraries (DLL)) have been compromised and replace. This is know as "DLL Hijack" in the document. A hijacked DLL enables practically anything to be done by the remote collectors; it can collect keystrokes, take screenshots, record microphone, snoop on your mail and the dreaded scenario of complete control over you computer using a remote administration tool RAT.
Tien Phan describes in detail how one possible Skype DLL Hijack works, quoted from https://packetstormsecurity.com/files/138873/skype-dllhijack.txt
Hi, There are a dll planting vuln in skype installer. This vuln had been reported to Microsoft but they decided not fix this. Here is the vulnerability details: ------ Skype installer in Windows is open to DLL hijacking. Skype looks for a specific DLL by dynamically going through a set of predefined directories. One of the directory being scanned is the installation directory, and this is exactly what is abused in this vulnerability. Reproduce Notes: 1. Download this dll https://mega.nz/#!b4ViSLJL!Pv99pN2d_WxsUHGPH0Ej3onwVeSdh41mpyKfQJfAq8E 2. Copy msi.dll to Downloads directory 3. download skype installer 4. execute the downloaded installer from your "Downloads" directory; Observed behavior: message box ahyhya Another dll can be used to hijack: dpapi.dll cryptui.dll ------ Regards, Tien -- Tien Phan Blog : http://tienpp.blogspot.com twitter : @_razybo_
Action: Don't install your products from download folder. Create a new folder and move installer there. Then blow it away.
Source:
feedproxy.google.com