Incident: Skype Privacy Vulnerability Exploited for IP Address Tracking.

Published Date: 2012-05-02

Postmortem Analysis
Timeline 1. The software failure incident happened in November 2010 [12062].
System 1. Skype software system [12062]
Responsible Organization 1. Skype, owned by Microsoft, was responsible for causing the software failure incident by not fixing the privacy vulnerability that allowed the identification of users' IP addresses and geographic locations despite being notified about it in 2010 [Article 12062].
Impacted Organization 1. Skype users [12062]
Software Causes 1. Software vulnerability allowing the identification of IP addresses and geographic locations of Skype users [12062] 2. Failure to fix the vulnerability despite being notified by researchers in 2010 [12062] 3. Exploitation of Skype to uncover IP addresses through a masked call and enabling debug logging [12062]
Non-software Causes 1. Lack of urgency in response from Skype to the researchers' disclosure [12062] 2. Potential complexity and deep embedding of the vulnerability in the code, requiring heavy restructuring to resolve [12062]
Impacts 1. The software failure incident allowed malicious actors to identify the IP address and potentially the geographic location of Skype users, compromising their privacy and security [12062]. 2. Researchers were able to surreptitiously track the city-level location of 10,000 Skype users for two weeks, highlighting the extent of the vulnerability and the potential for mass surveillance [12062]. 3. The incident raised concerns about the effectiveness of Skype's response to security vulnerabilities, as the issue remained unfixed despite being disclosed to the company in 2010 [12062].
Preventions 1. Timely Patching: Promptly addressing and fixing the reported vulnerability by releasing patches could have prevented the software failure incident [12062]. 2. Regular Security Audits: Conducting regular security audits and assessments of the software to identify and address potential vulnerabilities could have helped prevent the incident [12062]. 3. Improved Communication and Collaboration: Enhancing communication and collaboration between researchers and the software company could have facilitated a quicker resolution of the reported vulnerability, preventing the incident [12062].
Fixes 1. Implementing a thorough code review and security audit to identify and address the vulnerability in the software [12062]. 2. Revising the software architecture to address the root cause of the vulnerability and ensure proper handling of user IP addresses [12062]. 3. Updating the software with patches and fixes to prevent unauthorized access to user IP addresses and locations [12062]. 4. Enhancing the software's security protocols and encryption methods to protect user privacy and prevent exploitation of IP address information [12062].
References 1. Researchers at the Polytechnic Institute of New York University [12062] 2. Stevens Le Blond, former researcher at Inria in France, now at the Max Planck Institute for Software Systems [12062] 3. Adrian Asher, director of product security for Skype [12062] 4. Keith Ross, researcher who notified Skype in 2010 [12062]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident related to privacy vulnerability in Skype has happened again within the same organization. Researchers disclosed the vulnerability to Skype in 2010, and it was published in 2011. However, the vulnerability was still unfixed when someone posted a script online in 2012 showing Skype being exploited to uncover IP addresses [12062]. (b) The incident also indicates that similar issues are faced by other peer-to-peer software companies, as mentioned by Adrian Asher, director of product security for Skype, who stated that this is an ongoing, industry-wide issue faced by all peer-to-peer software companies [12062].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase can be seen in the case of Skype's privacy vulnerability. Researchers disclosed a vulnerability to Skype in 2010, and despite being informed about it, Skype had not fixed the issue even a year later. This failure to address the vulnerability introduced by system development and updates led to the exploitation of Skype to uncover users' IP addresses and locations [12062]. (b) The software failure incident related to the operation phase is evident in how the vulnerability in Skype allowed for the exploitation of users' IP addresses through specific operations within the software. By conducting masked calls and enabling debug logging, individuals could obtain sensitive information about users' locations without their knowledge. This misuse of the system's features for tracking users' movements highlights a failure in the operation of Skype's software [12062].
Boundary (Internal/External) within_system, outside_system (a) within_system: The software failure incident in the article is primarily due to a vulnerability within the Skype software itself. Researchers discovered a privacy vulnerability in Skype that allowed them to uncover the IP addresses and city locations of users by exploiting the software's functionality, such as conducting masked calls and accessing contact information cards [12062]. (b) outside_system: The software failure incident also involves external factors, such as the researchers notifying Skype about the vulnerability in 2010 and publishing the information in 2011. Additionally, the incident was exacerbated by someone posting a script online that demonstrated how to exploit the patched version of Skype to obtain IP addresses in a different manner. This external disclosure and exploitation of the vulnerability from outside sources contributed to the ongoing issue [12062].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in the article was primarily due to non-human actions. Researchers discovered a privacy vulnerability in Skype that allowed the identification of users' IP addresses and geographic locations. This vulnerability was left unfixed by Skype even after being notified about it in 2010, leading to the exploitation of the software by scripts and tools that could uncover sensitive user information [12062]. (b) However, human actions also played a role in this software failure incident. The researchers disclosed the vulnerability to Skype in 2010, and Skype's response to the issue, as well as the delay in fixing the problem, were influenced by human decisions and actions within the company [12062].
Dimension (Hardware/Software) software (a) The software failure incident reported in the articles does not seem to be directly related to hardware issues. The vulnerability that allowed the identification of IP addresses and geographic locations of Skype users was due to a flaw in the software itself, as researchers were able to exploit the software to obtain sensitive information [12062]. (b) The software failure incident was primarily caused by contributing factors originating in the software. Researchers identified a privacy vulnerability in Skype that allowed them to uncover the IP addresses and city locations of users by exploiting the software through masked calls and other techniques. The failure was related to a flaw in the software code that allowed for this unauthorized access to user information [12062].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident described in the articles can be categorized as malicious. Researchers discovered a privacy vulnerability in Skype that allowed for the identification of users' IP addresses and city locations. This vulnerability was exploited by individuals who posted scripts online to uncover IP addresses, track users' movements, and obtain location information surreptitiously. The incident involved intentional exploitation of the software vulnerability for potentially harmful purposes [12062]. (b) The incident does not align with a non-malicious failure as it involved intentional exploitation of the vulnerability to gather sensitive information about users without their knowledge or consent.
Intent (Poor/Accidental Decisions) poor_decisions, accidental_decisions (a) The intent of the software failure incident related to poor decisions can be seen in the case of Skype's handling of a privacy vulnerability. Researchers disclosed a vulnerability to Skype in 2010, but Skype did not fix the issue even after it was made public in 2011. The researchers were surprised to find the vulnerability still unfixed, and Skype's response seemed to downplay the urgency of the situation by referring to it as an industry-wide issue faced by all peer-to-peer software companies. This delay in addressing the vulnerability can be attributed to poor decisions made by Skype in prioritizing the fix and potentially underestimating the severity of the issue [12062]. (b) The software failure incident can also be linked to accidental decisions or unintended consequences. The researchers discovered that by making a masked call to a user, they could obtain the IP address and city location of Skype users without their knowledge. This unintended consequence of the software design allowed for surreptitious tracking of users' movements. Additionally, the technique involving enabling debug logging and viewing vcard information to obtain IP addresses was likely not an intended feature of the software but rather a loophole that could be exploited. These accidental decisions or unintended consequences contributed to the failure of maintaining user privacy and security [12062].
Capability (Incompetence/Accidental) development_incompetence, accidental (a) The software failure incident related to development incompetence is evident in the case of Skype's privacy vulnerability. Researchers disclosed the vulnerability to Skype in 2010, and it was published in 2011, yet the issue remained unfixed for an extended period. The researchers were surprised to find the vulnerability still present in the software even after someone posted a script online demonstrating how Skype could be exploited to uncover users' IP addresses [12062]. (b) The accidental aspect of the software failure incident is highlighted by the fact that the researchers discovered the vulnerability by conducting a masked call to a user, which allowed them to obtain IP addresses surreptitiously. Additionally, the technique to exploit a patched version of Skype 5.5 to obtain an IP address in a different manner was released anonymously on Pastebin, indicating an accidental exposure of the method to exploit the software [12062].
Duration permanent (a) The software failure incident in the article seems to be more of a permanent nature. The vulnerability allowing the identification of IP addresses and geographic locations of Skype users was reported to Skype in 2010, but it remained unfixed even after researchers disclosed it and published the information in 2011 [12062]. The fact that the vulnerability was still exploitable even after a patched version of Skype was released indicates that the issue was deeply embedded in the code and would require heavy restructuring to resolve, suggesting a more permanent failure [12062].
Behaviour omission, value, other (a) crash: The software failure incident described in the articles does not involve a crash where the system loses state and does not perform any of its intended functions. Instead, the vulnerability in Skype allowed for the exposure of users' IP addresses and geographic locations without causing the system to crash [12062]. (b) omission: The software failure incident can be categorized under omission, as the system omitted to protect users' privacy by allowing the disclosure of IP addresses and geographic locations, which was not the intended function of the software [12062]. (c) timing: The timing of the software failure incident is not related to the system performing its intended functions too late or too early. Instead, the vulnerability allowed for the immediate exposure of sensitive information without any delay in the system's response [12062]. (d) value: The software failure incident falls under the category of value failure, as the system performed its intended functions incorrectly by exposing users' IP addresses and geographic locations, compromising their privacy and security [12062]. (e) byzantine: The software failure incident does not exhibit characteristics of a byzantine failure, which involves inconsistent responses and interactions within a distributed system. In this case, the vulnerability in Skype led to a consistent method of exposing users' IP addresses and locations [12062]. (f) other: The behavior of the software failure incident can be categorized as a privacy breach. The system failed to protect users' privacy by allowing unauthorized access to sensitive information, leading to a significant security flaw [12062].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence unknown (a) death: People lost their lives due to the software failure (b) harm: People were physically harmed due to the software failure (c) basic: People's access to food or shelter was impacted because of the software failure (d) property: People's material goods, money, or data was impacted due to the software failure (e) delay: People had to postpone an activity due to the software failure (f) non-human: Non-human entities were impacted due to the software failure (g) no_consequence: There were no real observed consequences of the software failure (h) theoretical_consequence: There were potential consequences discussed of the software failure that did not occur (i) other: Was there consequence(s) of the software failure not described in the (a to h) options? What is the other consequence(s)? The articles do not mention any consequences such as death, harm, impact on basic needs, property loss, or delays caused by the software failure incident. The focus is primarily on the privacy vulnerability in Skype that allowed the exposure of users' IP addresses and locations [12062].
Domain information (a) The software failure incident reported in the articles is related to the industry of information. The vulnerability in Skype's software allowed for the identification of users' IP addresses and geographic locations, compromising their privacy and security [Article 12062].

Sources

Back to List