Security Market Segment LS
Thursday, 17 January 2019 10:21

Check Point finds way to bypass Fortnite login process

By

Israel-based security company Check Point says it has found a vulnerability in the popular game Fortnite which would allow an attacker to log in taking advantage of the use of authentication tokens by the game.

Single sign-on providers like Google, Facebook and X-Box are built into Fortnite's user login process and Check Point researchers used this to bypass the user login process.

When a user logs in to Fortnite from the Epic Games website, a request is generated for a single sign-on token. This token is returned to the login page and the user is then given access.

The Check Point team found a flaw in login page which is accounts.epicgames.com as the domain had not been validated and could hence be tricked through a malicious redirect. The researchers redirected traffic to another Epic Games sub-domain which is not in use.

They then used a cross-site scripting attack to load a JavaScript file that would ask the single sign-on provider to resend the authentication token.

The token would then be resent to the sub-domain and the attacker was able to collect it through the injected code.

"For the attack to be successful, all a victim needs to do is click on the malicious phishing link the attacker sends them," the Check Point team wrote.

"To increase the likelihood of a potential victim clicking on this link, for example, it could be sent with an enticement promising free game credits.

"Once clicked, with no need even for the user to enter any login credentials, their Fortnite authentication token would immediately be captured by the attacker."

CHIEF DATA & ANALYTICS OFFICER BRISBANE 2020

26-27 February 2020 | Hilton Brisbane

Connecting the region’s leading data analytics professionals to drive and inspire your future strategy

Leading the data analytics division has never been easy, but now the challenge is on to remain ahead of the competition and reap the massive rewards as a strategic executive.

Do you want to leverage data governance as an enabler?Are you working at driving AI/ML implementation?

Want to stay abreast of data privacy and AI ethics requirements? Are you working hard to push predictive analytics to the limits?

With so much to keep on top of in such a rapidly changing technology space, collaboration is key to success. You don't need to struggle alone, network and share your struggles as well as your tips for success at CDAO Brisbane.

Discover how your peers have tackled the very same issues you face daily. Network with over 140 of your peers and hear from the leading professionals in your industry. Leverage this community of data and analytics enthusiasts to advance your strategy to the next level.

Download the Agenda to find out more

DOWNLOAD NOW!

Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

VENDOR NEWS & EVENTS

REVIEWS

Recent Comments