Millions of Fortnite User Accounts Made Vulnerable

Millions of Fortnite User Accounts Made Vulnerable

Epic Games, the company behind the wildly popular video game, Fortnite, acknowledged that a vulnerability had risked users' account information.

Since its arrival in 2017, Epic Games' wildly popular video game, Fortnite, has garnered the attention of over 200 million players who spend hours fighting for survival in the computer generated world. Now, researchers from security company Check Point are saying those millions of players could have had their account information accessed thanks to a vulnerability in Epic Games' domain.

Check Point researchers say they discovered a susceptible website hosted on Epic Games' domain—which has since been taken down—that could be used to capture users' authentication tokens. These tokens would allow hackers to log into Fortnite accounts without the need for a user name and password giving bad actors access to live audio while users played the game, access to user information and the last four digits of saved credit cards.

A spokesperson for Epic Games said that the company had patched the vulnerability. 

"We were made aware of the vulnerabilities and they were soon addressed," the statement to BuzzFeed News said. "As always, we encourage players to protect their accounts by not re-using passwords, using strong passwords, and not sharing accounts information with others."

This vulnerability, however, did not need a password hack into the accounts of players. Check Point's researchers suggest enabling a two-factor authentication for your accounts so that if someone is trying to get in, you would be notified.

Fortnite accounts are highly valued, especially if the account has amassed a large amount of accessories, which are earned or purchased through the game. Oftentimes, you can find a Fortnite account being sold through online marketplaces like eBay and Craigslist—sometimes for thousands of dollars. This gives hackers incentive to go after the free-to-play online game's users, many of who are teens and children.

Check Point told BuzzFeed News that they hoped the news of the vulnerability would spark conversations at home between parents and children about cybersecurity and online fraud.

"Fortnite is not a game," Check Point's head of products vulnerability Oded Vanunu said. "It is an infrastructure, a platform, where you buy things, communicate with friends, joke with people online, and [where] most of the players are kids. That's why we are happy to help Epic Games fix this, and Mae sure that consumers understand what is happening."

This isn't the first time Epic Games has dealt with security issues. In August of 2018, Google publicly disclosed that the original Fortnite installer for Android could be exploited to secretly install unwanted apps or malware on phones, without users' knowledge.

About the Author

Sydny Shepard is the Executive Editor of Campus Security & Life Safety.

Featured

  • The Future is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reason. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. But as the number of cameras grows and resolutions push from HD to 4K and beyond, the cloud’s limits are becoming unavoidable. Bandwidth bottlenecks. Latency lags. Rising storage costs. These are not abstract concerns. Read Now

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.