Monday, November 25, 2024
HomeAdware78,000 Fortnite Game Players Infected With Adware While Downloading Fortnite V-Bucks Hack

78,000 Fortnite Game Players Infected With Adware While Downloading Fortnite V-Bucks Hack

Published on

The Fortnite game has more than 125 million total players and it is one of the most famous games on the planet.

Web-based game-streaming platform Rainway noticed the issue on June 26th as thousands of users getting error reports triggered in their tracker.

Rainway said, “for security and privacy reasons we’ve always allow only whitelisted URLs and we should not have any ads.”

- Advertisement - SIEM as a Service

To their surprise, one after another user start’s getting infected, so the researchers opted to find which is common for all.

As a part of the investigation, they headed to youtube to find popular Fortnite Game hacks and they tested with hundred’s of software that claims to support the players. These videos are common for any popular game.

The Rainway team at last identified hack claiming that users will get both the V-Bucks and use an aimbot.

How the Hack Occurs – Fortnite Game

When users install the promised fake Fortnite Game hacking app it immediately installs a root certificate and routes the web traffic through itself, which leads to Man in the Middle Attack.

MITM attack is a type of cyber attack where the attacker intercepts communication between two parties. Here is a perfect example of Mitm attack.

Then Adware starts altering all the pages by adding advertisement companies ad tag Adtelligent and voila.

“We began by sending an abuse report to the file host, and the download was removed promptly, this was after accumulating over 78,000 downloads.” reads Rainway blog post.

Rainway alerted all the infected users and enabled certificate pinning to mitigate such Mitm attacks in future.

Recently a fake android malware posing as Fortnite Game with capabilities of spyware, cryptocurrency miner targeted Android users.

Common Defences and Mitigations

  • Give careful consideration to the permission asked for by applications.
  • Download applications from trusted sources.
  • Stay up with the latest version.
  • Encrypt your devices.
  • Make frequent backups of important data.
  • Install anti-malware on their devices.
  • Stay strict with CIA Cycle.

Also Read

Maikspy – A Spyware Attack on Windows & Android Users via Adult Games

Several Malware Games Downloaded by 4,500,000 Android Users From Google Play Store

Malicious Code in Kids Game Apps on Google Play Pushing Porn Ads – More than 60 Game Apps Infected

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

6 Best Ad Blockers for Android Devices in 2024 to Stop Annoying Ads

Ad-blocking software is one of the most convenient types of software available, helping users...

How does an ad blocker apk work & How does it protect your information?

Did you know that the average Internet user sees about 7,000 advertisements per day?...

Beware!! New Ad-Blocking Chrome Extension That Injects Malicious Ads

A new malicious browser extension, known as AllBlock has been detected to be injecting...