Forum Thread: Adobe Reader and Skype alerts

You are currently viewing a forum thread in the Secunia Community Forum. Please note that opinions expressed here are not of Secunia but solely reflect those of the user who wrote it.

This thread was submitted in the following forum:
Open Discussions

This thread has been marked as locked.
mogs Adobe Reader and Skype alerts
Expert Contributor 29th Apr, 2013 12:42
Ranking: 2265
Posts: 6,269
User Since: 22nd Apr, 2009
System Score: 100%
Location: UK
Last edited on 29th Apr, 2013 12:43

Experts Identify PDF Usage Tracking Issue in Adobe Reader

Experts warn of PDF usage tracking issue

Researchers from security firm McAfee have identified an interesting issue that affects all versions of Adobe Reader. While the flaw can’t be leveraged to execute code, it can be successfully utilized to track when and where specially-crafted PDF documents are opened.

“When a specific PDF JavaScript API is called with the first parameter having a UNC-located resource, Adobe Reader will access that UNC resource. However, this action is normally blocked and creates a warning dialog asking for permission,” McAfee’s Haifei Li explained in a blog post.

“The danger is that if the second parameter is provided with a special value, it changes the API’s behavior. In this situation, if the UNC resource exists, we see the warning dialog. However, if the UNC resource does not exist, the warning dialog will not appear even though the TCP traffic has already gone.”

The company has identified PDFs that leverage this bug. They have been sent by an “email tracking service” provider.

For the time being, it’s uncertain if the method has been used for illegal purposes, but experts warn that it could be.

Li explains that it could be successfully applied in advanced persistent threat (APT) attacks, which usually have several phases.

This particular PDF flaw could be leveraged in the first step of the attack, the one that involves collecting as much information as possible from the victim.

“Malicious senders could exploit this vulnerability to collect sensitive information such as IP address, Internet service provider, or even the victim’s computing routine. In addition, our analysis suggests that more information could be collected by calling various PDF JavaScript APIs,” Li noted.

Adobe has been notified of the issue, but so far, there’s no patch. In the meantime, users are advised to consider disabling JavaScript in Reader.

Alert: Skype account hijack technique may affect all users

Summary: After six malicious takeovers of his Skype account, a frustrated security researcher has posted his attempts to get Skype's help. Here's how to protect yourself.
By Violet Blue for Zero Day | April 27, 2013 -- 09:40 GMT (10:40 BST)

According to security researcher @TibitXimer (A.K.A. Dylan) his Skype account was stolen six times, and now claims all Skype user accounts are vulnerable to the same fate due to Skype's flimsy account recovery practices - which are especially thin, as he discovered the hard way, when contacting customer service.

When he contacted Skype support, reps didn't appear to acknowledge that the issue was immediate... and repeating.

Perhaps that is because his account had been hijacked through basic social engineering techniques and not hacked - as then he learned that the problem was with contacting customer service itself.

Read more at :-


No one has replied to this thread yet - be the first
This thread has been marked as locked.