Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

Vulnerability in Skype for Android Exposes Sensitive Data

Justin Case at AndroidPolice.Com says he has discovered a major flaw in some versions Skype for Android which could affect up to 10 million Skype for Android users.

The vulnerability stems from how Skype stores data, such as your contacts, profile, instant message logs, and more. Case says that Skype mistakenly left these files completely unencrypted and with improper permissions, allowing anyone or any application to read them.

Justin Case at AndroidPolice.Com says he has discovered a major flaw in some versions Skype for Android which could affect up to 10 million Skype for Android users.

The vulnerability stems from how Skype stores data, such as your contacts, profile, instant message logs, and more. Case says that Skype mistakenly left these files completely unencrypted and with improper permissions, allowing anyone or any application to read them.

Case says it’s possible that a rogue developer could modify an existing application with code to exploit the vulnerability and distribute the application via the Android Market. From there, Case says, “just watch as all that private user information pours in.”

This is an example of poor software development practices. Skype is much more sophisticated than most standard mobile apps, and with the software engineering team that’s behind it, I would expect Skype to have better practices around security and the storing of sensitive data in an unencrypted state with improper permissions. Google and the Android Operating system aren’t to blame for this one.

Skype Mobile for Verzion appears to be safe and not have the vulnerability.

Acknowledging the vulnerability, Skype’s Chief Security Officer, Adrian Asher, wrote in a blog post, “It has been brought to our attention that, were you to install a malicious third-party application onto your Android device, then it could access the locally stored Skype for Android files.” Asher also cautioned users to be mindful of what apps they are downloading. “To protect your personal information, we advise users to take care in selecting which applications to download and install onto their device.”

Justin Case put together a good blog post describing the vulnerability in more detail on a technical level.

Advertisement. Scroll to continue reading.
Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is founder and director of several leading cybersecurity industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Watch Now

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

People on the Move

Matthew Cowell has assumed the role of VP of Strategic Alliances at Nozomi Networks. He previously served in the same role at Dragos.

Bret Arsenault is retiring from his full-time role after 35 years at Microsoft.

Social engineering defense platform Doppel has appointed Bobby Ford as Chief Strategy and Experience Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.