Security Market Segment LS
Thursday, 17 January 2019 10:21

Check Point finds way to bypass Fortnite login process


Israel-based security company Check Point says it has found a vulnerability in the popular game Fortnite which would allow an attacker to log in taking advantage of the use of authentication tokens by the game.

Single sign-on providers like Google, Facebook and X-Box are built into Fortnite's user login process and Check Point researchers used this to bypass the user login process.

When a user logs in to Fortnite from the Epic Games website, a request is generated for a single sign-on token. This token is returned to the login page and the user is then given access.

The Check Point team found a flaw in login page which is as the domain had not been validated and could hence be tricked through a malicious redirect. The researchers redirected traffic to another Epic Games sub-domain which is not in use.

They then used a cross-site scripting attack to load a JavaScript file that would ask the single sign-on provider to resend the authentication token.

The token would then be resent to the sub-domain and the attacker was able to collect it through the injected code.

"For the attack to be successful, all a victim needs to do is click on the malicious phishing link the attacker sends them," the Check Point team wrote.

"To increase the likelihood of a potential victim clicking on this link, for example, it could be sent with an enticement promising free game credits.

"Once clicked, with no need even for the user to enter any login credentials, their Fortnite authentication token would immediately be captured by the attacker."


Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has high potential to be exposed to risk.

It only takes one awry email to expose an accounts payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 steps to improve your Business Cyber Security’ you will learn some simple steps you should be taking to prevent devastating malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you will learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips


Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.



Recent Comments