{"id":13128,"date":"2018-08-16T10:45:19","date_gmt":"2018-08-16T18:45:19","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/08\/16\/news-6895\/"},"modified":"2018-08-16T10:45:19","modified_gmt":"2018-08-16T18:45:19","slug":"news-6895","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/08\/16\/news-6895\/","title":{"rendered":"Impostor &#8216;Fortnite&#8217; Android Apps Are Already Spreading Malware"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5b68cf314177c301e3b9b065\/master\/pass\/android_fortnite_malware-01.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Thu, 16 Aug 2018 10:00:00 +0000<\/strong><\/p>\n<p><span class=\"lede\">Two weeks ago, <\/span>Epic Games CEO Tim Sweeney <a href=\"https:\/\/www.eurogamer.net\/articles\/digitalfoundry-2018-fortnite-on-android-doesnt-use-google-play-confirmed\" target=\"_blank\">confirmed<\/a> that the Android version of <em>Fortnite<\/em>, largely seen as <a href=\"https:\/\/www.wired.com\/story\/fortnite-crossover-phenomenon\/\">the most popular game in the world<\/a>, would not be available through the Google Play Store. Instead, fans would have to install it from the web. The announcement drew heaps of attention\u2014not least of which came from peddlers of malware.<\/p>\n<p><em>Fortnite<\/em> only became broadly available on Android this week. But on August 3, the day of Sweeney\u2019s announcement, WIRED quickly discovered seven sites advertising themselves as Android <em>Fortnite<\/em> downloads. Analysis from <a href=\"https:\/\/www.lookout.com\/\" target=\"_blank\">mobile security company Lookout<\/a> found that each of those sites distributed malware to anyone who fell for the scam.<\/p>\n<p class=\"paywall\">The finding serves as a caution to <em>Fortnite<\/em> fans only to download from the <a href=\"https:\/\/www.epicgames.com\/fortnite\/en-US\/mobile\/android\/sign-up\" target=\"_blank\">official Epic Games site<\/a>. More importantly, it\u2019s a reminder of the real risks that come with operating outside of the Google Play Store\u2014risks that could end up extending well beyond the battle bus.<\/p>\n<p class=\"paywall\">There\u2019s not much complexity as to why Epic Games decided to ditch the Play Store. Google takes 30 percent off the top of every purchase that goes through its official channels. One estimate <a href=\"https:\/\/sensortower.com\/blog\/fortnite-daily-revenue-season-five\" target=\"_blank\">pegs<\/a> <em>Fortnite<\/em>\u2019s daily take on iOS at about $2 million. Yes, $2 million <em>a day<\/em>. You don\u2019t need advanced calculus to see why Epic wants to skip a tithe if it can.<\/p>\n<p>&#x27;If I was a bad guy, I would target the largest pool of victims I could. <em>Fortnite<\/em> seems to fit that bill.&#x27;<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">Dan Wiley, Check Point<\/p>\n<p class=\"paywall\">On iOS, it can\u2019t. Every app on your iPhone has to route through the App Store, no exceptions. Android\u2019s an open system, though. It\u2019s more permissive. You can dig into your settings\u2014it varies by device, but you\u2019ll generally find it under some combination of \u201cSecurity\u201d and \u201cApplications\u201d\u2014and allow Chrome or any other app to download whatever you please.<\/p>\n<p class=\"paywall\">As you might imagine, that\u2019s also where the trouble starts. The Google Play Store is <a href=\"https:\/\/www.wired.com\/story\/google-play-store-malware\/\">not perfect<\/a>, but it has aggressive <a href=\"https:\/\/www.wired.com\/2016\/12\/never-ever-ever-download-android-apps-outside-google-play\/\">built-in malware protections<\/a>. The open internet, meanwhile, is a terrible goblin town.<\/p>\n<p class=\"paywall\">\u201cWe have found many examples of apps that have been manipulated to deliver hostile content such as remote access Trojans, banking Trojans, cryptomining software, and other malicious software,\u201d says Dan Wiley, head of incident response at Check Point, another security firm that tracks mobile threats. \u201cThe apps look exactly like the real app and, many times, behave just like the official app.\u201d<\/p>\n<p class=\"paywall\">Which is true of the <em>Fortnite<\/em> impostors as well. At least to a point.<\/p>\n<p class=\"paywall\">Lookout security researchers Adam Bauer and Christoph Hebeisen analyzed software pushed by the seven sites WIRED discovered, each of which claimed to offer the legitimate <em>Fortnite<\/em> Android app. Many of the sites, which we won\u2019t link to here for obvious reasons, include &quot;Fortnite&quot; in the URL and have convincing enough landing pages featuring imagery from the game.<\/p>\n<p class=\"paywall\">All of them distribute malware that comes from two distinct families. The first category, which Lookout calls FakeNight, plays videos that look like a <em>Fortnite<\/em> game-loading screen, then shows a prompt that reads, \u201cMobile Verification Required.\u201d From there, you\u2019re taken to a browser window and told that if you click enough ads, you\u2019ll get a game code in return. The game code never materializes.<\/p>\n<p class=\"paywall\">The other family, which Lookout calls WeakSignal, also presents a convincing <em>Fortnite<\/em> loading screen but places a rotating series of programmatic ads on top of it. Eventually it tells you that you have a weak signal and that you should try again later.<\/p>\n<p class=\"paywall\">As far as malware goes, it\u2019s not the worst outcome\u2014the grift basically enlists you in a click farm, to score money for the attacker off of ad networks. It&#x27;s not a surprising outcome either. \u201cMost commonly, malware is about generating revenue, and the easiest way to do that without having any police force after you is probably adware and click fraud,\u201d says Hebeisen. \u201cFrequently there are no consequences to it.\u201d<\/p>\n<p class=\"paywall\">More troubling, though, is that rather than lurking on some backwater download site, many of these offerings had high search placement on Bing and Yahoo. Which, yes, OK, but those combined still represent more than <a href=\"http:\/\/gs.statcounter.com\/search-engine-market-share\" target=\"_blank\">12 percent<\/a> of US searches, which adds up quickly. And for nearly two weeks, the top result on both for \u201cFortnite android app\u201d was a link to one of the malware impostors. After inquiries from WIRED to both Bing and Epic Games, many of those problematic results were removed. Google had taken several <em>Fortnite<\/em> malware hosting pages down already, citing a DMCA complaint.<\/p>\n<p class=\"paywall\">Bear in mind, too, that this represents just a portion of the impostor <em>Fortnite<\/em> malware that has been and will continue to circulate. In May, a cloud security company called Zscaler said it <a href=\"https:\/\/www.zscaler.com\/blogs\/research\/fake-fortnite-apps-scamming-and-spying-android-gamers\" target=\"_blank\">had found<\/a> a phony <em>Fortnite<\/em> app loaded up with spyware, complete with the ability to harvest call logs. That app also prompted users for Accessibility permissions, which would have granted it access to the phone\u2019s camera and more.<\/p>\n<p class=\"paywall\">Epic Games isn&#x27;t the first major company to circumvent the Play Store tax. Amazon has operated its own <a href=\"https:\/\/www.wired.com\/2011\/03\/amazon-android-app-store-2\/\">Android app storefront<\/a> for years, which requires the <a href=\"https:\/\/www.amazon.com\/gp\/feature.html?docId=1002999431&amp;tag=w050b-20\" target=\"_blank\" rel=\"nofollow\">same workarounds<\/a> as <em>Fortnite<\/em>. It\u2019s also far from the first popular app to inspire malicious copycats. Mike Murray, Lookout vice president of security intelligence, notes that <a href=\"https:\/\/www.wired.com\/story\/pokemon-go-quiet-steady-dominance\/\"><em>Pok\u00e9mon Go<\/em><\/a> imitators at this point number in the thousands.<\/p>\n<p class=\"paywall\">Still, no title this popular has ever operated outside of Android\u2019s garden walls. That has unique implications.<\/p>\n<p class=\"paywall\">\u201cThis is exactly what makes this case interesting and special,\u201d Hebeisen says. \u201cWhen we are looking at fake apps that pretend to be a particular game, and that game is available on the Play Store, there\u2019s a fairly high barrier for people to download that game from somewhere else, because they know that\u2019s not a legitimate source.\u201d<\/p>\n<p>&#x27;Where there\u2019s a market for malware, more malware will follow.&#x27;<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">Christoph Hebeisen, Lookout<\/p>\n<p class=\"paywall\">Not only that, but the unprecedented demand for <em>Fortnite<\/em> makes it an irresistible target for internet miscreants to begin with. Bigger watering holes attract more prey. \u201cA minor app not used by many people is not a large attack surface,&quot; says Check Point\u2019s Wiley. &quot;This is one of the hottest games in town. If I was a bad guy, I would target the largest pool of victims I could. <em>Fortnite<\/em> seems to fit that bill.\u201d<\/p>\n<p class=\"paywall\">Or, as Hebeisen puts it, coining something of a mobile security koan: \u201cWhere there\u2019s a market for malware, more malware will follow.\u201d<\/p>\n<p class=\"paywall\">What concerns the Lookout team more than <em>Fortnite<\/em> copycats, though, is the idea that the developer\u2019s experiment could make dodging the Play Store\u2014and its security protections\u2014more commonplace. If <em>Fortnite<\/em> acclimates people to downloading from the wild web, how many other developers would take a shot? Why give up nearly a third of your revenue if you don\u2019t have to?<\/p>\n<p class=\"paywall\">\u201cIf one app does this, you might know exactly what website to go get that one app at. It\u2019s the situation where this becomes a trend, and if you want 100 apps on your phone, you have to go to 100 websites, and how do you know which one is legitimate,\u201d Murray says. \u201cIt\u2019s when this trend is normalized that we\u2019ll really see the impact.\u201d<\/p>\n<p class=\"paywall\">Epic Games has legitimate reasons for bucking Google\u2019s fee. Google has legitimate reasons for charging it. The only true bad guys in this scenario are the predatory malware authors. But going outside the Play Store unquestionably puts <em>Fortnite<\/em> fans at risk. It already has.<\/p>\n<p class=\"related-cne-video-component__dek\">Brendan Greene (aka PlayerUnknown), creative director of PlayerUnknown&#39;s Battlegrounds, uses the power of Twitter to answer some common questions about PUBG. Why do vehicles seem to weigh so little? Is PUBG coming to PS4? Will the Xbox One get fixed? Will the game include hit indicators?<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/imposter-fortnite-android-apps-already-spreading-malware\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5b68cf314177c301e3b9b065\/master\/pass\/android_fortnite_malware-01.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Thu, 16 Aug 2018 10:00:00 +0000<\/strong><\/p>\n<p>New analysis from mobile security firm Lookout shows that malware authors are taking full advantage of &#8216;Fortnite&#8217; ditching the Google Play Store. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-13128","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13128","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13128"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13128\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13128"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13128"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13128"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}