TechnoclinicTechnoclinic
  • Home
  • APPS
  • CAMERAS
    • PRINTERS
  • GAMING
    • LAPTOPS
  • HDTV
  • NEWS
  • PHONES
    • TABLETS
  • REVIEWS
  • SOFTWARE
  • Contact Us!
Search
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Reading: FAKE FORTNITE APPS FOR ANDROID SPREAD SPYWARE, CRYPTOMINERS
Share
Sign In
Aa
TechnoclinicTechnoclinic
Aa
Search
  • Home
  • APPS
  • CAMERAS
    • PRINTERS
  • GAMING
    • LAPTOPS
  • HDTV
  • NEWS
  • PHONES
    • TABLETS
  • REVIEWS
  • SOFTWARE
  • Contact Us!
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Technoclinic > APPS > FAKE FORTNITE APPS FOR ANDROID SPREAD SPYWARE, CRYPTOMINERS
APPS

FAKE FORTNITE APPS FOR ANDROID SPREAD SPYWARE, CRYPTOMINERS

Loknath Das
Last updated: 2018/05/18 at 5:38 PM
Loknath Das
Share
SHARE

An array of malicious Android apps purporting to be the popular game known as Fortnite are accessing cameras, harvesting and wiping device data, and recording audio on victims’ phones.

Researchers at Zscaler’s ThreatLabZ said that bad actors are taking advantage of Fortnite owner Epic Games’s recent announcement that it would extend the game’s support to mobile platforms.

Fortnite has 45 million players, making it one of the most popular games currently on the market. Epic Games has launched a version for iOS, but an Android version has not yet been announced. So, when Android users search for it in app stores, they’re finding fake Fortnite apps instead — and they’re riddled with malware.

“There is no official news from Epic games about the release of the Fortnite game on the Android platform,” researchers said in a blog post. “Users should beware of malware authors looking to exploit their desire to play Fortnite on Android. We urge users to download games only from authorized and legitimate sources, such as Google Play.”

ThreatLabZ researchers said that they observed Android spyware, cryptomining malware and a scam app claiming to help players earn free V-bucks, the virtual currency used within the game. The latter was actually found in Google Play, a Zscaler spokesperson told Threatpost, but the remaining were found on third-party app stores.

One case of Android spyware purports to be the game, showing an icon with the Fortnite name when downloaded. However, upon installation, the spyware begins to harvest call logs – including missed calls and phone contacts. It can also make calls, and features a prompt enabling Accessibility services, meaning it can obtain certain privileged operations without user interaction.

“This spyware creates a ‘files’ folder under its installation directory,” researchers said. “Under that directory it writes all logs on a daily basis…Along with the data, keylogging activity is visible…where the spyware is reading keystroke by keystroke and storing the data to file.”

In another incident, researchers said they observed a coin-miner payload being spread under a false Android APK  domain. The CoinHive JavaScript is embedded in the file, named as “engine.html” in the asset folder of an Android package, researchers said. The engine.html file is then called from the asset folder in the code to trigger the coin-mining activity.

“We monitored the app on a device and found that this coin-mining app significantly raises CPU usage once installed,” researchers said.

The app found in Google Play claiming to help Fortnite players earn free V-Bucks shows a fake Fortnite Battle Royal V-Bucks generator screen upon installation. It then prompts users to take a survey and download other apps.

“After completing the survey and downloading the suggested apps, the user doesn’t receive free V-Bucks, but the app author definitely generates real revenue,” researchers said. “This fake app was downloaded over 5,000 times, and has been rated five stars over 4,000 times, before we reached out to Google Security team who promptly removed the app.”

Attackers have long flocked around enthusiast gamers and popular video games. During the peak popularity of Pokemon GO, attackers pushed SMS spam messages to entice players to visit a series of malicious websites. Later, researchers found a malicious backdoor version of the app on a file repository service.

“In the past, the ThreatLabZ research team has seen fake Super Mario and Pokemon GO apps in the wild during the release of the legitimate versions,” researchers said. “We observed this trend with Fortnite as well, in which multiple instances of Android malware were posing as the Fortnite game.”

Neither Epic Games nor Google responded to an email requesting for comment from Threatpost.

[“Source-threatpost”]

TAGGED: Android, Apps, CRYPTOMINERS, Fake, for, Fortnite, SPREAD, Spyware

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
[mc4wp_form]
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Loknath Das May 18, 2018
Share this Article
Facebook Twitter Copy Link Print
Share
Previous Article Best iPhone and iPad apps for wheelchair users
Next Article Apple-Samsung iPhone Design Copying Case Goes to Jury

Latest News

How to Prepare for the Mandatory Windows 11 Upgrade
LAPTOPS
How to Clean Your Flat-Screen TV The Right Way
HDTV
AI and Content Management: How Organizations Can Prepare for the Future
SOFTWARE
What is Application Software: Function and Features of Application
APPS
Case Study: Nissan and Teads’ Immersive Concept Car Campaign Transformed Scrolls into Stories
NEWS
Review of Hootsuite: Advantages, Drawbacks, Features, and Other Options
REVIEWS

Most Viewed Posts

  • Choosing the Right Tablet for Blogging and Writing On the Go (1,122)
  • Bengaluru Lady Turns Blinkit Conveyance Specialist For A Day And Her Choice Prompted Significant Changes In Application (1,081)
  • How to Start a Product Review Blog (Templates & Examples) (1,062)
  • How To Start A Review Blog and Get Free Review Products (1,057)
  • What You Need to Know About Smartphones vs. Tablet use of the Mobile Internet (1,044)

© 2023 TechnoClinic Network. TechnoClinic Company. All Rights Reserved.

Removed from reading list

Undo
Welcome Back!

Sign in to your account

Lost your password?