Categories: Adware

78,000 Fortnite Game Players Infected With Adware While Downloading Fortnite V-Bucks Hack

The Fortnite game has more than 125 million total players and it is one of the most famous games on the planet.

Web-based game-streaming platform Rainway noticed the issue on June 26th as thousands of users getting error reports triggered in their tracker.

Rainway said, “for security and privacy reasons we’ve always allow only whitelisted URLs and we should not have any ads.”

To their surprise, one after another user start’s getting infected, so the researchers opted to find which is common for all.

As a part of the investigation, they headed to youtube to find popular Fortnite Game hacks and they tested with hundred’s of software that claims to support the players. These videos are common for any popular game.

The Rainway team at last identified hack claiming that users will get both the V-Bucks and use an aimbot.

How the Hack Occurs – Fortnite Game

When users install the promised fake Fortnite Game hacking app it immediately installs a root certificate and routes the web traffic through itself, which leads to Man in the Middle Attack.

MITM attack is a type of cyber attack where the attacker intercepts communication between two parties. Here is a perfect example of Mitm attack.

Then Adware starts altering all the pages by adding advertisement companies ad tag Adtelligent and voila.

“We began by sending an abuse report to the file host, and the download was removed promptly, this was after accumulating over 78,000 downloads.” reads Rainway blog post.

Rainway alerted all the infected users and enabled certificate pinning to mitigate such Mitm attacks in future.

Recently a fake android malware posing as Fortnite Game with capabilities of spyware, cryptocurrency miner targeted Android users.

Common Defences and Mitigations

  • Give careful consideration to the permission asked for by applications.
  • Download applications from trusted sources.
  • Stay up with the latest version.
  • Encrypt your devices.
  • Make frequent backups of important data.
  • Install anti-malware on their devices.
  • Stay strict with CIA Cycle.

Also Read

Maikspy – A Spyware Attack on Windows & Android Users via Adult Games

Several Malware Games Downloaded by 4,500,000 Android Users From Google Play Store

Malicious Code in Kids Game Apps on Google Play Pushing Porn Ads – More than 60 Game Apps Infected

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Threat Actors Exploiting AES Encryption for Stealthy Payload Protection

Cybersecurity researchers have uncovered a surge in the use of Advanced Encryption Standard (AES) encryption…

2 hours ago

33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge

Kaspersky's latest report on mobile malware evolution in 2024 reveals a significant increase in cyber…

3 hours ago

Routers Under Attack as Scanning Attacks on IoT and Networks Surge to Record Highs

In a concerning trend, the frequency of scanning attacks targeting Internet of Things (IoT) devices…

3 hours ago

Google Launches Shielded Email to Keep Your Address Hidden from Apps

Google is rolling out a new privacy-focused feature called Shielded Email, designed to prevent apps and…

8 hours ago

Hackers Using PowerShell and Microsoft Legitimate Apps to Deploy Malware

Cybersecurity experts are warning of an increasing trend in fileless attacks, where hackers leverage PowerShell…

9 hours ago

JavaGhost: Exploiting Amazon IAM Permissions for Phishing Attacks

Unit 42 researchers have observed a threat actor group known as JavaGhost exploiting misconfigurations in…

9 hours ago