Still Using Skype? Time to Abandon Ship
16th November, 2018 | Cyberprivacy | Entropic
Jump ahead to...
- This Article
- How to Purge your Skype Conversation History
- How to View/Edit Other Skype Personal Information
- How to Delete Your Skype & Microsoft Account
01/16/2019 Update: TrendTIC reports Skype was used to deliver a malicious North Korean developed malware to an employee during a job interview. The resulting intrusion resulted in the compromise of Redbanc - a large-scale interbank network that connects the ATMs of banks throughout Chile.
Skype was originally pioneered by the Swede Niklas Zennström and the Dane Janus Friis, in cooperation with Ahti Heinla, Priit Kasesalu, and Jaan Tallinn, Estonians who developed the backend that was also used by Kazaa, the popular decentralized file sharing application.
Following it's launch in August 2003, Skype quickly gained popularity as a secure, decentralized peer-to-peer messaging app. In the following years, Skype was acquired and sold by eBay, and had other key investments from firms including Silver Lake, and Andreessen Horowitz. It was eventually acquired by Microsoft in 2011, for $8.6 billion.
At the age of 15 years old in 2018, with broader availability to consumers and businesses through Microsoft branding and integration into their Windows operating system, Skype's total number of users now approaches half a billion.
Decentralized apps have been around longer than many of us realize, even before the inception of blockchain. When these apps first emerged, they were considered bandits and outliers due to the decentralized nature of their technology. Though there was heavy usage, many users of these apps were still concerned about the "edgy" nature of these apps, and the possible association with a criminal ecosystem. Now in 2018 with the broad recognition of blockchain, and related decentralized technologies, Skype with it's broad customer base might have completely dropped off of our radar, though we might still have a dormant account.
More recently, Microsoft has had the fortune of being largely ignored in the government focus on large tech companies to explain their privacy practices, and exploitation of their services against the national security of nations. Yet, when it comes to having their products attacked and exploited, Microsoft is a poster-child.
What many people might have forgotten is that many of the criminals who are now exploiting Google, Facebook, and Twitter on behalf of the governments of their mother countries, cut their teeth in the world of Microsoft - developing malware, exploits, botnets, and advanced persistent threats for the Microsoft Windows ecosystem for 20+ years prior.
The last significant event involving Microsoft having their knuckles rapped by the government was when Bill Gates testified before congress over 20 years ago, in the 1990s when their were antitrust concerns due to their market share of Windows and Internet Explorer.
In the face of so many ongoing cyberattacks against the Microsoft ecosystem, that totally eclipse the attacks against Facebook, Google and Twitter, how is it possible they can stay off the government's radar, while these other companies have to bear the heat?
The introduction of GDPR earlier this year doesn't seem to have affected Microsoft as badly as other large tech companies either. This is evidenced by the completely convoluted process required if you want to perform something as simple as viewing your Skype information, and deleting your Skype account from one place - something that we'll detail later.
Microsoft have also recently anchored their user's Skype accounts neatly to the rest of their Microsoft subscriptions, credits, and services, so they are forced to throw out the baby with the bathwater, if they want to delete their Skype account.
How Skype Has Changed
Since it's acquisition by Microsoft, Skype has undergone an erratic series of re-writes that have totally changed what the original product was under the hood, while only introducing a few user-visible features to the product.
On the surface, Microsoft have focussed on playing a relaxed version of "catch up" to the features currently available in WhatsApp, Line, Viber, WeChat, Facebook Messenger and Telegram. Many changes have been made that improve it's "compatibility" within the Microsoft ecosystem, the ability to coexist with other Microsoft products and conform to standard feature set requirements. However, from a privacy and security perspective most under-the-hood changes have gone against the original vision of Skype.
Why You Should Abandon Skype
Lets review the key reasons why continuing to use Skype is a bad idea.
1) A Steady Stream of Vulnerabilities
Microsoft's ability to coordinate their teams of software engineers globally en masse, to perform development and maintenance of their products and solutions continues to empower them to compete in the world of high technology. But at the same time, this relatively well-tuned approach to software development fails to deliver with the necessary degree of concern for privacy and security. These are seen as perfunctory sideline activities of the overall development goal, vs. being at the root of their software development strategy.
The steady stream of publicized vulnerabilities reported against Skype each year, continues to threaten the security of consumers and businesses who have some of their most private conversations on Skype. Many of these vulnerabilities have been induced by Microsoft's constant attempts to re-write Skype, and integrate legacy software libraries to make it "compatible" with their existing ecosystem,
2) Nation State Surveillance
Just prior to being acquired, reports emerged that Microsoft was working with the NSA to enable monitoring of Skype conversations as part of their PRISM monitoring program.
Microsoft was also caught working with a dodgy international company, who were modifying Skype to empower nation-state monitoring capabilities for the purposes of censorship and surveillance in China.
While these reports have since quelled, the basic mechanism for nation state monitoring of Skype conversations is established, which means with the flip of a switch, it can be enabled at any time, in any region.
3) Centralized Servers = Juicy Targets
The most significant architectural change is the total re-centralization of an existing, proven decentralized product communication architecture. This was triggered by a series of reliability issues that suddenly started plaguing users around the same time that Microsoft approached Skype for acquisition. Microsoft chose to abandon the decentralized architecture of Skype, initially by introducing super-nodes in 2012, followed by the total migration to Azure data centers.
The new centralized architecture means that all of your messages are now funneled through these data centers, where they are stored on servers, then subsequently forwarded to the intended recipient.
Aside from introducing a central point of failure vulnerability into the Skype messaging architecture, the potentially sensitive Skype conversations from hundreds of millions of users are now being amassed, and even replicated across these physical data centers, making them juicy "high value targets" for cybercriminals and nation states.
This consequently puts more pressure on their users, who will need to regularly purge old conversations if they don't want them being picked up by a rogue government, or by cybercriminals when Microsoft experiences their next data breach.
4) No Location Privacy
Simply running Skype, or revealing your Skype ID to someone else, allows your approximate physical location to be revealed to others.
For some time now, Skype has had an ingrained vulnerability which allows others to determine your approximate location by extracting and performing a "Geo-lookup" on your IP address using their notebook/PC.
For example, if you are in Martinique on vacation with your family, and needed to message someone using Skype, simply running the app will reveal your approximate location to others in your contacts list.
Alternately, if someone who is not in your contacts list somehow manages to get your Skype ID, they can use an external Skype lookup service to determine your approximate physical location.
Finally, by way of the centralized nature of Skype, Microsoft, and anyone else who has access to their data centers is able to track and store your physical location.
5) Unencrypted Chat Logs
Chat logs used by Skype that are stored locally on your notebook/PC, are devoid of encryption as shown in this screenshot.
In fact, most of the personally identifiable information about a Skype user can be extracted from their copy of Skype on their notebook/PC by using either a text editor, or if you want the ability to search and query a users conversations, simply install a software app that supports access to SQLite databases - one of the most popular open-source databases today.
Yes, you heard it. Not only is it unencrypted, it's also stored conveniently in a database, making it easier to search for and view specific conversations!
Again, this vulnerability puts more pressure on their users, who will need to find the option to disable this logging, or regularly purge old conversations if they don't want them being picked up by a rogue government or cybercriminals, when Microsoft experiences their next data breach. Businesses especially need to take care, since a malware attack targeting their organization could glean these unprotected chat logs from their user's notebooks/PCs, revealing a lot about the inner workings of their organization.
This is a vulnerability that has actually existed for many years, yet somehow has not been addressed. Given all the possible ways that a notebook/PC can be infected, hacked, and monitored today, it's difficult to understand how a mature tech company can neglect encrypting log files on their customer's devices that store their private conversations.
6) Malware, Ransomware, Cryptojackers
Given it's prevalence in organizations, along with it's lack of effective built in security, Skype has historically been used as a vehicle for delivering malware and advanced persistent threats (APTs) into an organization, via social engineering attacks on users.
Users receive well-crafted URLs that delude them into accepting software updates and installations posing as legitimate apps, that instead include malicious code. Microsoft has not been able to keep up with the constant stream of malicious URLs and files that arrive as messages to their users in Skype, resulting in infected workstations and a loss of personal and corporate data.
One example of this is ransomware, which typically gathers and encrypts personal files on your notebook/PC, then sends them to a remote server infrastructure, operated by criminals, who then force you to pay to have your files decrypted.
Another example is cryptojackers - malware that repurposes your computer to mine Bitcoin as part of a larger mining network, for profit. Cryptojackers are discussed further in this article by Christina Comben, originally posted on CoinCentral.com.
Accessing and Reviewing Your Microsoft Information
If you have decided to stop using Skype, theres some review and cleanup you need to do. With this said, the process to do this is not optimal, neither is it definitive. We'll do our best to point you in the right direction for each piece of Skype information that is gathered by Microsoft.
At the time of writing, the procedures for managing the information that is collected by Skype and stored in the Microsoft cloud have not been made clearly available on the Microsoft Privacy Dashboard, and are scattered across multiple management pages. You are forwarded to the Skype My Account page, for other tasks for managing your personal information. Finally, some of the cleanup tasks can only be done directly from the Skype software installed on your device.
Though your conversation history is stored in the Microsoft cloud, there is no clear option in the Microsoft Privacy Dashboard, or on Skype My Account to erase your conversation history. Instead, you must erase your conversation history using the Skype software on your devices directly - Mac, PC, smartphone, tablet, etc... This delete will propagate across the other copies of Skype that you have installed on other devices.
Conclusion
The lack of a clear place to manage your Skype information from either the Microsoft Privacy Dashboard, or the Skype My Account page, along with the deep linkage between a user's Skype account, and the rest of their Microsoft account subscriptions, makes it very difficult for an average user to manage their personal information collected by Microsoft, or delete their Skype account.
The constant re-writing of the Skype software confuses users, and makes it difficult for them to find and manage their privacy options. It also impacts core features that have been there since the acquisition of Skype, by either making them difficult to find, or by making them completely unavailable. Finally, it also induces new security vulnerabilities that previously didn't exist.
With all of the security issues Skype has, slipstreaming this software into the Windows 10 operating system via a patch update, has dramatically increased the attack surface of the already highly exploitable operating system, which is currently used on over 700 million devices globally, including traditional PCs, smartphones and tablets.
Based on the points discussed in this article, we recommend you shutdown your Skype account, and consider alternative apps for messaging.
If you have any feedback, questions, or suggestions, please let us know.
Acknowledgements:
How to delete your Skype account the right way, by Christian Zibreg
TOM-Skype Censorship Research, University of New Mexico
How to Clear Chat History in Skype 8, by Tune
Photo by Maryna Yazbeck on Unsplash