[144832] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Source for Skype Trojan released

daemon@ATHENA.MIT.EDU (Dave Howe)
Tue Sep 8 20:48:34 2009

Date: Mon, 07 Sep 2009 15:26:58 +0100
From: Dave Howe <DaveHowe@gmx.co.uk>
To: Cryptography List <cryptography@metzdowd.com>
In-Reply-To: <50AF764C-F6B3-47E5-BE84-5F4216F0907F@st.cs.uni-sb.de>

Stephan Neuhaus wrote:
> 
> On Aug 31, 2009, at 13:20, Jerry Leichter wrote:
> 
>> It can “...intercept all audio data coming and going to the Skype
>> process.”
> 
> Interesting, but is this a novel idea? As far as I can see, the process
> intercepts the audio before it reaches Skype and after it has left
> Skype. Isn't that the same as calling a keylogger a "PGP Trojan"?

Not really. more generically, you could call it a "VoIP trojan" or even
"Audio monitoring trojan" - presumably a more advanced version could
listen to the mic stream even when the VoIP application is not in use,
in order to obtain information.

However, in context, this was designed to be used for law enforcement to
"bug" a skype VoIP session, so the name reflects the design goal; yes,
it is a more generalized attack than that, but not in intent or
(presumed) usage.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post