Still Using Skype at Work? Here’s Why That Could Be a Big Security Mistake
Hackers have found a new way to weaponize an old communication tool. If your workplace still uses Skype, it’s time to reconsider—fast.
🔍 What Is GodRAT?
Researchers at Kaspersky recently identified a sophisticated Remote Access Trojan (RAT) dubbed GodRAT. This malicious software infiltrates systems via Skype, hiding inside seemingly innocent screensaver files disguised as financial documents.
🎯 How It Works
- Steganography-Powered Delivery: Malicious shellcode is embedded inside image files.
- Execution via Screensavers: Victims receive .SCR files (screensavers) through Skype, tricking them into executing malware.
- GodRAT Deployment: Once opened, the malware is silently downloaded from a third-party server.
🛠 GodRAT’s Capabilities
This malware doesn’t stop at just infiltrating your system. Here’s what it can do:
- Harvest OS and user account details
- Identify antivirus software
- Scan running processes
- Detect system capture drivers
- Deploy plugins for password stealing, file browsing, and more
- Install AsyncRAT for long-term remote access
🌍 Who’s Being Targeted?
GodRAT campaigns have zeroed in on small and medium-sized businesses (SMBs) in:
- United Arab Emirates (UAE)
- Hong Kong
- Jordan
- Lebanon
- Malaysia
🧬 Origins: A New Breed of Malware
GodRAT appears to be the evolution of earlier malware like AwesomePuppet and Gh0st RAT. Experts suggest links to the notorious Winnti APT group, known for sophisticated cyber espionage campaigns.
📉 Skype Usage Dropping — But Not Fast Enough
As of March 2025, attackers have reportedly moved on from Skype to other platforms. However, many organizations continue to use Skype, unaware of the risks it poses—especially for handling sensitive communications or file transfers.
✅ How to Protect Your Business
- Block Suspicious File Types: Prevent receipt of .SCR files and executable attachments on all platforms.
- Train Your Team: Educate employees on recognizing phishing and social engineering attempts.
- Monitor Communications Tools: Audit all messaging platforms for vulnerabilities and usage policies.
- Use Endpoint Detection: Deploy advanced EDR tools capable of recognizing steganography and plugin abuse.
- Reassess Skype Usage: Move to more secure and actively maintained collaboration tools.
📌 Final Thoughts
While Skype once revolutionized workplace communication, it’s now a potential entry point for sophisticated cyber threats like GodRAT. If you’re still using Skype at work, it’s time to rethink your communication strategy before it becomes a security liability.
❓ FAQs
What is steganography in malware?
Steganography is the technique of hiding malicious code inside non-suspicious files, like images or documents, to evade detection.
Can Skype be considered secure today?
While Skype has built-in encryption, its usage in recent malware campaigns reveals it’s not as secure as modern collaboration tools.
Should I uninstall Skype?
If Skype is not essential to your business, it’s best to replace it with a more secure, actively monitored alternative.