Tuesday, January 14, 2025
HomeAdware78,000 Fortnite Game Players Infected With Adware While Downloading Fortnite V-Bucks Hack

78,000 Fortnite Game Players Infected With Adware While Downloading Fortnite V-Bucks Hack

Published on

The Fortnite game has more than 125 million total players and it is one of the most famous games on the planet.

Web-based game-streaming platform Rainway noticed the issue on June 26th as thousands of users getting error reports triggered in their tracker.

Rainway said, “for security and privacy reasons we’ve always allow only whitelisted URLs and we should not have any ads.”

To their surprise, one after another user start’s getting infected, so the researchers opted to find which is common for all.

As a part of the investigation, they headed to youtube to find popular Fortnite Game hacks and they tested with hundred’s of software that claims to support the players. These videos are common for any popular game.

The Rainway team at last identified hack claiming that users will get both the V-Bucks and use an aimbot.

How the Hack Occurs – Fortnite Game

When users install the promised fake Fortnite Game hacking app it immediately installs a root certificate and routes the web traffic through itself, which leads to Man in the Middle Attack.

MITM attack is a type of cyber attack where the attacker intercepts communication between two parties. Here is a perfect example of Mitm attack.

Then Adware starts altering all the pages by adding advertisement companies ad tag Adtelligent and voila.

“We began by sending an abuse report to the file host, and the download was removed promptly, this was after accumulating over 78,000 downloads.” reads Rainway blog post.

Rainway alerted all the infected users and enabled certificate pinning to mitigate such Mitm attacks in future.

Recently a fake android malware posing as Fortnite Game with capabilities of spyware, cryptocurrency miner targeted Android users.

Common Defences and Mitigations

  • Give careful consideration to the permission asked for by applications.
  • Download applications from trusted sources.
  • Stay up with the latest version.
  • Encrypt your devices.
  • Make frequent backups of important data.
  • Install anti-malware on their devices.
  • Stay strict with CIA Cycle.

Also Read

Maikspy – A Spyware Attack on Windows & Android Users via Adult Games

Several Malware Games Downloaded by 4,500,000 Android Users From Google Play Store

Malicious Code in Kids Game Apps on Google Play Pushing Porn Ads – More than 60 Game Apps Infected

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Google’s “Sign in with Google” Flaw Exposes Millions of Users’ Details

A critical flaw in Google's "Sign in with Google" authentication system has left millions...

Hackers Attacking Internet Connected Fortinet Firewalls Using Zero-Day Vulnerability

A widespread campaign targeting Fortinet FortiGate firewall devices with exposed management interfaces on the...

Critical macOS Vulnerability Lets Hackers to Bypass Apple’s System Integrity Protection

Microsoft Threat Intelligence has uncovered a critical macOS vulnerability that allowed attackers to bypass...

CISA Released A Free Guide to Enhance OT Product Security

To address rising cyber threats targeting critical infrastructure, the U.S. Cybersecurity and Infrastructure Security...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

6 Best Ad Blockers for Android Devices in 2024 to Stop Annoying Ads

Ad-blocking software is one of the most convenient types of software available, helping users...

How does an ad blocker apk work & How does it protect your information?

Did you know that the average Internet user sees about 7,000 advertisements per day?...

Beware!! New Ad-Blocking Chrome Extension That Injects Malicious Ads

A new malicious browser extension, known as AllBlock has been detected to be injecting...