Home Security Check Point finds way to bypass Fortnite login process

Israel-based security company Check Point says it has found a vulnerability in the popular game Fortnite which would allow an attacker to log in taking advantage of the use of authentication tokens by the game.

Single sign-on providers like Google, Facebook and X-Box are built into Fortnite's user login process and Check Point researchers used this to bypass the user login process.

When a user logs in to Fortnite from the Epic Games website, a request is generated for a single sign-on token. This token is returned to the login page and the user is then given access.

The Check Point team found a flaw in login page which is accounts.epicgames.com as the domain had not been validated and could hence be tricked through a malicious redirect. The researchers redirected traffic to another Epic Games sub-domain which is not in use.

They then used a cross-site scripting attack to load a JavaScript file that would ask the single sign-on provider to resend the authentication token.

The token would then be resent to the sub-domain and the attacker was able to collect it through the injected code.

"For the attack to be successful, all a victim needs to do is click on the malicious phishing link the attacker sends them," the Check Point team wrote.

"To increase the likelihood of a potential victim clicking on this link, for example, it could be sent with an enticement promising free game credits.

"Once clicked, with no need even for the user to enter any login credentials, their Fortnite authentication token would immediately be captured by the attacker."

FREE SEMINAR

Site24x7 Seminars

Deliver Better User Experience in Today's Era of Digital Transformation

Some IT problems are better solved from the cloud

Join us as we discuss how DevOps in combination with AIOps can assure a seamless user experience, and assist you in monitoring all your individual IT components—including your websites, services, network infrastructure, and private or public clouds—from a single, cloud-based dashboard.

Sydney 7th May 2019

Melbourne 09 May 2019

Don’t miss out! Register Today!

REGISTER HERE!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the sitecame into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications

 

Guest Opinion

 

Sponsored News

 

 

 

 

Connect