Security Risks in VideoGames: Hacking Fortnite

By | January 16, 2019
Fortnite Login Vulnerability

A recent article with demo video (above) by Check Point Research discusses vulnerabilities found in Epic Games’ Online gaming Platform; that seems to show how hackers can put players at risk, simply from running game software, and clicking on a malicious link.

players of ‘Fortnite’, the massively popular game from game developer Epic Games, are tasked with testing their endurance as they battle for tools and weapons that will keep them secure and the ‘last man standing’.

In the last few weeks, however, Check Point Research discovered multiple vulnerabilities in Epic Games’ online platform that could have allowed a threat actor to take over the account of any game player, view their personal account information, purchase V-bucks, Fortnite’s virtual in-game currency and eavesdrop on and record players’ in-game chatter and background home conversations.

By discovering a vulnerability found in some of Epic Games’ sub-domains, an XSS attack was permissible with the user merely needing to click on a link sent to them by the attacker. Once clicked, with no need even for them to enter any login credentials, their Fortnite username and password could immediately be captured the attacker.

Check Point Research informed Epic Games of this vulnerability and a fix was responsibly deployed, ensuring their millions of players can continue their gameplay in a secure environment.

Article Name: Hacking Fortnite by Check Point Research

Link: https://research.checkpoint.com/hacking-fortnite/

Summary
Hacking Fortnite
Article Name
Hacking Fortnite
Description
In the last few weeks, however, Check Point Research discovered multiple vulnerabilities in Epic Games’ online platform that could have allowed a threat actor to take over the account of any game player, view their personal account information, purchase V-bucks, Fortnite’s virtual in-game currency and eavesdrop on and record players’ in-game chatter and background home conversations.
Author
Check Point Research