Gamasutra is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Gamasutra: The Art & Business of Making Gamesspacer
View All     RSS
August 5, 2020
arrowPress Releases

If you enjoy reading this site, you might also want to check out these UBM Tech sites:

A closer look at the malware that masquerades as  Fortnite  cheats

A closer look at the malware that masquerades as Fortnite cheats

October 5, 2018 | By Alissa McAloon

Malware that lures unsuspecting people into giving away personal information by promising cheats or free currency for big online games is not a brand new concept, and the age-old scams are currently running amok with Epic’s free-to-play battle royale game Fortnite.

The company behind the anti-malware software Malwarebytes, for example, has tracked down one particular scam that’s been making the rounds while disguised as a Fortnite cheat. The scam itself is similar to one unearthed earlier this year by the streaming platform Rainway, as well as several others that can be found online at any given moment.

But what makes Malwarebytes' report particularly interesting is its dive into how the malware itself actually operates. The specific malicious program the company tracks has grabbed a little over 1,200 downloads to date and attempts to steal information from infected systems about everything from cookies and Steam sessions to Bitcoin wallet info.

This particular “cheat” originates from a YouTube video that grabbed over 2,000 views in its first day live and promises an undetectable Fortnite aimbot, Fortnite hacks, loot detecting tools, along with other cheats. A link in the description sends would-be cheaters to a page that promises to deliver a link to the cheat download in exchange for a YouTube channel subscribe, something that Malwarebytes notes is slightly different from the more survey-focused route most malicious programs take. From there, the site directs people to a second site that offers Fortnite cheats, and then a file hosting site to download  the “cheat” itself, which Malwarebytes’ software IDs as a ‘trojen.malpack’ that aims to take info on browser sessions, cookies, Bitcoin wallets, and Steam sessions to an IP based out of the Russian Federation.

The site’s blog post has a full breakdown that's worth checking out about how this specific bit of malware targets the systems and personal information of Fortnite players looking for an illegitimate leg up on their competition.

Related Jobs

Airship Syndicate
Airship Syndicate — Austin, Texas, United States

Senior VFX Artist
Airship Syndicate
Airship Syndicate — Austin, Texas, United States

Mid to Senior Worldbuilder - Unreal Engine
Disbelief — Cambridge, Massachusetts, United States

Mountaintop Studios
Mountaintop Studios — Los Angeles, California, United States

Engine/Systems Engineer (remote)

Loading Comments

loader image