Android malware posing as Fake Fortnite Game includes spyware, cryptocurrency miner and install unwanted apps that show ads to generate revenue for authors. Epic games, the publisher of Fortnite recently announced that they are to extend the support for mobile platforms.
Recently they have launched the game for iOS and the Android next few months according to the company statement, in the meantime malware authors try to attract the users with malware posed as a Fortnite game.
According to zscaler “We observed this trend with Fortnite as well, in which multiple instances of Android malware were posing as the Fortnite game.”
Upon installing the Fake Fortnite Game the icon also shows the Fortnite name and the spyware starts collecting call and SMS logs and record keystrokes. Also, the spyware contains following accessibility functions.
According to researchers the spyware not made any connection with command-and-control servers. Possibly the spyware is still under development.
Also Read Maikspy – A Spyware Attack on Windows & Android Users via Adult Games
Researchers observed coin miners distributed as a Fake Fortnite Game app. The app found hosted in androidapk[.]world disguised it as Fortnite mobile.
The mining malware contains coinhive scripts embedded, the mining app significantly raises the CPU usage once the app is installed in the device. It will drain the device battery and slow down the infected device.
The malware authors pushing some unwanted apps posing Fortnite game that generates ad revenue. The fake apps were removed more than 5 thousand times from the play store.
Once these apps installed on the device it shows clean Fortnite game playing screen and redirects the browser to fill an online form that downloads additional apps that helps the author to generate revenue.
Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search…
Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the…
Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains, posing…
Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty ransomware,…
The RansomHub ransomware group has emerged as a significant danger, targeting a wide array of…
Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…