Lucian Constantin
CSO Senior Writer

Skype blocks password resets after account hijacking flaw made public

news
Nov 14, 20123 mins

Knowing the email address associated with a Skype account was sufficient for an attacker to hijack it

Skype has disabled the account password reset option on its website following reports that the feature can be abused to hijack Skype accounts if the attackers know the email addresses associated with them.

Instructions on how to exploit the security hole were first reported late Tuesday on a Russian-language forum. The information was later posted on Reddit and some blogs where users confirmed that the account hijacking method worked.

It’s not clear if the issue was the result of a design logic flaw or a bug in Skype’s client or website.

According to the reports, the Skype website allowed a potential attacker to create a new account using an email address that’s already associated with an existing one.

The attacker could have then logged into the Skype client with the new account, performed a series of refreshes on the home screen and then triggered a password reset for the account through the Skype website. This would have resulted in the website sending an email with a unique password reset link to the email address on record.

However it would have also triggered a “Password token” notification on the home screen in the Skype client where the attacker would have already been logged in. Clicking a “more info” button for this notification would have provided the attacker with the password reset link and unique password reset token directly in the client, without requiring access to the email account.

Visiting the password reset link in a browser would have led to a page on the Skype website that would have provided the option to change the password for any of the accounts associated with that email address, including the original account of the legitimate user.

“Early this morning we were notified of user concerns surrounding the security of the password reset feature on our website,” said Skype, which is a division of Microsoft, in an emailed statement Wednesday. “This issue affected some users where multiple Skype accounts were registered to the same email address.”

“We suspended the password reset feature temporarily this morning as a precaution and have made updates to the password reset process today so that it is now working properly,” Skype said. “We are reaching out to a small number of users who may have been impacted to assist as necessary. Skype is committed to providing a safe and secure communications experience to our users and we apologize for the inconvenience.”

If having multiple accounts associated with the same email address is intended functionality, a simple solution would have been for Skype to send an account activation link to the provided email address every time a new account is created. This is common procedure for other services and would have blocked the attack from the start, since the attacker wouldn’t have been able to activate the new account and perform the attack’s other steps.

It’s not clear if the password token notification displayed in the Skype client is actually a feature intended to alert users of rogue password reset attempts or the result of a bug.

Since this vulnerability was publicly disclosed and might have been known in some circles for some time, concerned users might want to change their passwords just to be on the safe side.

The Skype website allows logged in users to associate a second email address with their accounts and delete the old one. This feature can be used to change the email address to one that is not known by anyone and therefore reduce the chances of the account being attacked through password reset bugs in the future.

Lucian Constantin

Lucian Constantin writes about information security, privacy, and data protection for CSO. Before joining CSO in 2019, Lucian was a freelance writer for VICE Motherboard, Security Boulevard, Forbes, and The New Stack. Earlier in his career, he was an information security correspondent for the IDG News Service and Information security news editor for Softpedia.

Before he became a journalist, Lucian worked as a system and network administrator. He enjoys attending security conferences and delving into interesting research papers. He lives and works in Romania.

You can reach him at lucian_constantin@foundryco.com or @lconstantin on X. For encrypted email, his PGP key's fingerprint is: 7A66 4901 5CDA 844E 8C6D 04D5 2BB4 6332 FC52 6D42

More from this author