A series of vulnerabilities in the hugely popular online survival game Fortnite could have allowed malicious actors to take over players' accounts, prompting developer Epic Games to fix the issues before a major incident transpired, according to researchers who discovered the program.
Had the flaws been exploited, attackers could have victimized gamers by viewing their account information, purchase the in-game currency known as V-bucks or even record players' chats and background home conversations, Check Point Software Technologies researchers Alon Boxiner, Eran Vaknin and Oded Vanunu revealed today in a new report.
Unlike other recent malicious Fortnite campaigns, a scam using these vulnerabilities would not have required fooling victims into entering their account information into a phishing page, the report explains. Instead, the attackers could have captured users' credentials simply by tricking them into clicking a link, with no further interaction needed.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.