{"id":13487,"date":"2018-10-02T07:10:17","date_gmt":"2018-10-02T15:10:17","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/10\/02\/news-7254\/"},"modified":"2018-10-02T07:10:17","modified_gmt":"2018-10-02T15:10:17","slug":"news-7254","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/10\/02\/news-7254\/","title":{"rendered":"Fortnite gamers targeted by data theft malware"},"content":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Tue, 02 Oct 2018 14:00:00 +0000<\/strong><\/p>\n<p>The new season of the incredibly popular video game Fortnite is <a href=\"https:\/\/www.pcgamer.com\/uk\/fortnite-season-6-everything-we-know\/\" target=\"_blank\" rel=\"noopener\">upon us<\/a>, and so too are the scams. It\u2019s no surprise that con artists would jump on this bandwagon, eager to peddle their fakeouts.<\/p>\n<p>Only this time, scammers had something a little more dangerous in mind than your typical low-level surveys and downloads that never actually materialize. Among all the gluttony of scams there hid a malicious file ready to steal data and Bitcoin, for starters.<\/p>\n<p>How did we find it? First, we sifted through a sizable mish-mash of free season six passes, supposedly \u201cfree\u201d Android versions of Fortnite, which were leaked out from under the developer\u2019s noses, the ever-popular blast of \u201cfree V-Bucks\u201d used to purchase additional content in the game, and a lot of bogus cheats, wallhacks, and aimbots.<\/p>\n<p>Here\u2019s the current state of YouTube, for example:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-search-results.jpg\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25702\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/fortnite-gamers-targeted-by-data-theft-malware\/attachment\/fortnite-search-results\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-search-results.jpg\" data-orig-size=\"659,587\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"fortnite search results\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-search-results-300x267.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-search-results-600x534.jpg\" class=\"aligncenter size-medium wp-image-25702\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-search-results-300x267.jpg\" alt=\"fortnite search results\" width=\"300\" height=\"267\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-search-results-300x267.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-search-results-600x534.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-search-results.jpg 659w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center\">Click to enlarge<\/p>\n<p>These videos can drive huge numbers: Here\u2019s one that\u2019s been pulled down, but managed to rack up 120,000 views before the hammer fell:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/120k.jpg\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25703\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/fortnite-gamers-targeted-by-data-theft-malware\/attachment\/120k\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/120k.jpg\" data-orig-size=\"995,661\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"120k views\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/120k-300x199.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/120k-600x399.jpg\" class=\"aligncenter size-medium wp-image-25703\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/120k-300x199.jpg\" alt=\"120k views\" width=\"300\" height=\"199\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/120k-300x199.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/120k-600x399.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/120k.jpg 995w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center\">Click to enlarge<\/p>\n<p>Almost all of the scam tomfoolery followed the typical survey route, as expected. But buried in all of this was a nasty little slice of data theft malware disguised as a cheat tool.<\/p>\n<p>Offering up a malicious file under the pretense of a cheat is as old school as it gets, but that\u2019s never stopped cybercriminals before. In this scenario, would-be cheaters suffer a taste of their own medicine via a daisy chain of clickthroughs and (eventually) some malware as a parting gift. Shall we take a look?<\/p>\n<h3>Setting the scene<\/h3>\n<p>The YouTube account offering this scam up has a little over 700 subscribers, and the video in question already had more than 2,200 views the day after being uploaded.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-scam1.jpg\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25705\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/fortnite-gamers-targeted-by-data-theft-malware\/attachment\/fortnite-scam1\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-scam1.jpg\" data-orig-size=\"1119,882\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"fortnite aimbot video\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-scam1-300x236.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-scam1-600x473.jpg\" class=\"aligncenter size-medium wp-image-25705\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-scam1-300x236.jpg\" alt=\"fortnite aimbot video\" width=\"300\" height=\"236\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-scam1-300x236.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-scam1-600x473.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-scam1.jpg 1119w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center\">Click to enlarge<\/p>\n<p>Clicking the link sends potential victims to a page on Sub2Unlock. This site differs from typical survey pages, where you&#8217;d normally click offers or fill in questions to obtain a theoretical reward. Instead, it asks you to hit subscribe on the social portal of the person sending you there in the first place. So there&#8217;s one difference, right off the bat.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/sub-to-unlock.jpg\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25706\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/fortnite-gamers-targeted-by-data-theft-malware\/attachment\/sub-to-unlock\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/sub-to-unlock.jpg\" data-orig-size=\"792,771\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"sub to unlock\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/sub-to-unlock-300x292.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/sub-to-unlock-600x584.jpg\" class=\"aligncenter size-medium wp-image-25706\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/sub-to-unlock-300x292.jpg\" alt=\"sub to unlock\" width=\"300\" height=\"292\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/sub-to-unlock-300x292.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/sub-to-unlock-600x584.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/sub-to-unlock.jpg 792w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center\">Click to enlarge<\/p>\n<p>Another interesting difference is that any initial survey page requires you to physically complete a survey before progressing. Without doing this, you can&#8217;t gain access to a download link.<\/p>\n<p>Here, we had no validation taking place during our testing. Clicking the subscribe button simply opened up the YouTube channel\u2019s subscribe page but nothing checked to ensure we\u2019d actually subscribed. All we had to do at this point was go back to the Sub2Unlock site and click the download button.<\/p>\n<p>From here, gamers are whisked away to a site located at<\/p>\n<p>bt-fortnite-cheats(dot)tk<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-cheat-site.jpg\" data-rel=\"lightbox-4\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25704\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/fortnite-gamers-targeted-by-data-theft-malware\/attachment\/fortnite-cheat-site\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-cheat-site.jpg\" data-orig-size=\"853,925\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"fortnite cheat site\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-cheat-site-277x300.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-cheat-site-553x600.jpg\" class=\"aligncenter size-medium wp-image-25704\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-cheat-site-277x300.jpg\" alt=\"fortnite cheat site\" width=\"277\" height=\"300\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-cheat-site-277x300.jpg 277w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-cheat-site-553x600.jpg 553w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-cheat-site.jpg 853w\" sizes=\"auto, (max-width: 277px) 100vw, 277px\" \/><\/a><\/p>\n<p style=\"text-align: center\">Click to enlarge<\/p>\n<p>This site is a fairly good-looking portal claiming to offer up the desired cheat tools, and it stands a fair chance of convincing youngsters of its legitimacy. A little bit more button clicking, and potential victims are taken to a more general download site containing what appears to be an awful lot of files alongside a wide range of adverts.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-malware-download-link.jpg\" data-rel=\"lightbox-5\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25707\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/fortnite-gamers-targeted-by-data-theft-malware\/attachment\/fortnite-malware-download-link\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-malware-download-link.jpg\" data-orig-size=\"833,478\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"fortnite malware download link\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-malware-download-link-300x172.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-malware-download-link-600x344.jpg\" class=\"aligncenter size-medium wp-image-25707\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-malware-download-link-300x172.jpg\" alt=\"fortnite malware download link\" width=\"300\" height=\"172\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-malware-download-link-300x172.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-malware-download-link-600x344.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/fortnite-malware-download-link.jpg 833w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center\">Click to enlarge<\/p>\n<p>As far as the malicious file in question goes, at time of writing, 1,207 downloads had taken place. That&#8217;s 1,207 downloads too many.<\/p>\n<h3>File information<\/h3>\n<p>Malwarebytes detects this file as <a href=\"https:\/\/blog.malwarebytes.com\/detections\/trojan-malpack\/\" target=\"_blank\" rel=\"noopener\">Trojan.Malpack<\/a>, a generic detection given to files packed suspiciously. The actual payload could be anything at all, but it will invariably be up to no good. In this case, a little digging showed us the payload is a data stealer.<\/p>\n<p>Once the initial .EXE (which weighs in at just 168KB) runs on the target system, it performs some basic enumeration on details specific to the infected computer. It then attempts to send data via a POST command to an \/index.php file in the Russian Federation, courtesy of the IP address 5(dot)101(dot)78(dot)169.<\/p>\n<p>Some of the most notable things it takes an interest in are browser session information, cookies, Bitcoin wallets, and also Steam sessions.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/a-grab-bag.jpg\" data-rel=\"lightbox-6\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25711\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/fortnite-gamers-targeted-by-data-theft-malware\/attachment\/a-grab-bag\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/a-grab-bag.jpg\" data-orig-size=\"602,184\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"a grab bag\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/a-grab-bag-300x92.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/a-grab-bag-600x183.jpg\" class=\"aligncenter size-medium wp-image-25711\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/a-grab-bag-300x92.jpg\" alt=\"a grab bag\" width=\"300\" height=\"92\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/a-grab-bag-300x92.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/a-grab-bag-600x183.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/a-grab-bag.jpg 602w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center\">Click to enlarge<\/p>\n<p>Bizarrely, it also wrote this to our test system:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/radio-stations.jpg\" data-rel=\"lightbox-7\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25712\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/fortnite-gamers-targeted-by-data-theft-malware\/attachment\/radio-stations\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/radio-stations.jpg\" data-orig-size=\"511,366\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"radio stations\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/radio-stations-300x215.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/radio-stations.jpg\" class=\"aligncenter size-medium wp-image-25712\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/radio-stations-300x215.jpg\" alt=\"radio stations\" width=\"300\" height=\"215\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/radio-stations-300x215.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/radio-stations.jpg 511w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center\">Click to enlarge<\/p>\n<p>\u2026Grateful Dead, anyone?<\/p>\n<p>The IP address up above has been seen many times in relation to similarly named\/themed files.<\/p>\n<p>Lots of the files contained in this download are packed in entirely different ways. One of them has a process called \u201cStealer.exe.\u201d Many more post the stolen information to \/gate.php instead of index.php, which is a common sign of Zbot and a few others.<\/p>\n<p>While this particular file probably isn\u2019t that new, it\u2019s still going to do a fair bit of damage to anyone that runs in. Combining it with the current fever for new Fortnite content is a recipe for stolen data and a lot of cleanup required afterward.<\/p>\n<p>As a final note, we should mention the readme file accompanying the stealer advertises being able to purchase additional Fortnite cheats for \u201c$80 Bitcoin.\u201d<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/read-me.jpg\" data-rel=\"lightbox-8\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25713\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/fortnite-gamers-targeted-by-data-theft-malware\/attachment\/read-me\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/read-me.jpg\" data-orig-size=\"585,216\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"read me\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/read-me-300x111.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/read-me.jpg\" class=\"aligncenter size-medium wp-image-25713\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/read-me-300x111.jpg\" alt=\"read me\" width=\"300\" height=\"111\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/read-me-300x111.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/read-me.jpg 585w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center\">Click to enlarge<\/p>\n<p>Given how things up above panned out, we\u2019d advise anyone tempted to cheat to steer well clear of this one. Winning is great, but it\u2019s absolutely not worth risking a huge slice of personal information to get the job done.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/fortnite-gamers-targeted-by-data-theft-malware\/\">Fortnite gamers targeted by data theft malware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/fortnite-gamers-targeted-by-data-theft-malware\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Tue, 02 Oct 2018 14:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/fortnite-gamers-targeted-by-data-theft-malware\/' title='Fortnite gamers targeted by data theft malware'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/reflection-pad-gaming-gamepad.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>If you&#8217;ve ever been tempted to cheat at Fortnite, think again\u2014with the release of season six of the popular video game, we found a data theft malware masquerading as a cheat tool, ready to steal your browser sessions, cookies, and even your Bitcoin. <\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/malware\/\" rel=\"category tag\">Malware<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/exe\/\" rel=\"tag\">.EXE<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/bitcoin\/\" rel=\"tag\">bitcoin<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/bt-fortnite-cheatsdottk\/\" rel=\"tag\">bt-fortnite-cheats(dot)tk<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/fortnite\/\" rel=\"tag\">fortnite<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/fortnite-malware\/\" rel=\"tag\">fortnite malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/free-v-bucks\/\" rel=\"tag\">free V-Bucks<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/games\/\" rel=\"tag\">games<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/gaming\/\" rel=\"tag\">gaming<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rat\/\" rel=\"tag\">rat<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/stealer\/\" rel=\"tag\">stealer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/steam\/\" rel=\"tag\">steam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/sub2unlock\/\" rel=\"tag\">Sub2Unlock<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trojan-malpack\/\" rel=\"tag\">Trojan.Malpack<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/video-games\/\" rel=\"tag\">video games<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/wallet\/\" rel=\"tag\">wallet<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/fortnite-gamers-targeted-by-data-theft-malware\/' title='Fortnite gamers targeted by data theft malware'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/fortnite-gamers-targeted-by-data-theft-malware\/\">Fortnite gamers targeted by data theft malware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[19661,10490,19662,4503,18501,19663,19664,11059,1445,3764,1810,19665,11227,19666,19667,4433,14646],"class_list":["post-13487","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-exe","tag-bitcoin","tag-bt-fortnite-cheatsdottk","tag-cybercrime","tag-fortnite","tag-fortnite-malware","tag-free-v-bucks","tag-games","tag-gaming","tag-malware","tag-rat","tag-stealer","tag-steam","tag-sub2unlock","tag-trojan-malpack","tag-video-games","tag-wallet"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13487","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13487"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13487\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13487"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13487"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13487"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}