Cyber Crime

Don’t install Fortnite Android APK because it could infect your mobile device

Fortnite is currently the most popular game, crooks are attempting to exploit the interest in forthcoming Fortnite Android to infect millions of fans.

No doubt, Fortnite is currently the most popular game, it is a co-op sandbox survival game developed by Epic Games and People Can Fly.

The game was released as a paid-for early access title for Microsoft Windows, macOS, PlayStation 4 and Xbox One on July 25, 2017, with a full free-to-play releases in 2018.

The Fortnite game has now more than 125 million active users.

The great success obtained by the Fortnite attracted cyber criminals that are attempting to exploit its popularity to target the fans.

Unfortunately for Android users, Fortnite for Android devices is not available yet, it is currently under development while the iOS version was released in March by Epic Games.

The company announced that the Battle Royale game is planned to be released for Android devices this summer.

In the recent weeks, crooks attempted to take advantage of Android users’ interest in an alleged version for their devices of the popular game.

Surfing online it is quite easy to find blog posts and video tutorial with instructions to install fake Fortnite Android App.

I spent an entire week to explain to my son and his friends the risks of installing APK from untrusted sources, believe me … it was the unique real battle royal of this story 🙂

Just searching for ‘Fortnite Android App’ on YouTube you will get an impressive number of videos on “How to install Fortnite on Android,” many of these videos were viewed millions of times also include links to actual Fortnite APK files.

A growing number of users is searching for Fortnite Android as reported by Google Trends:

Scammers are exploiting this interest to trick Android fans into downloading tainted version of the game that can compromise Android devices.

Some video tutorials appeared online recommend Android users to “install a few other apps” to unlock the Android Fortnite game. These apps could hide any kind of code, from cryptocurrency miners to apps used to generate revenue for their developers.

An impressive number of links purport to be official Fortnite app downloads, are used by crooks to deliver malicious applications.

If you are a fan of the Fornite game you have to wait until next summer for the official Android version, meantime don’t install alleged beta versions of the popular game from third-party stores.

Even if you see the Fortnite Android version in the official Google Play store, do not download it, unfortunately, scammers are able to deploy fake apps also on the official store.

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs – Fortnite Android, malware)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

A cyber attack paralyzed operations at Synlab Italia

A cyber attack has been disrupting operations at Synlab Italia, a leading provider of medical…

23 seconds ago

Russia-linked APT28 used post-compromise tool GooseEgg to exploit CVE-2022-38028 Windows flaw

Russia-linked APT28 group used a previously unknown tool, dubbed GooseEgg, to exploit Windows Print Spooler…

10 hours ago

Hackers threaten to leak a copy of the World-Check database used to assess potential risks associated with entities

A financially motivated group named GhostR claims the theft of a sensitive database from World-Check…

18 hours ago

Windows DOS-to-NT flaws exploited to achieve unprivileged rootkit-like capabilities

Researcher demonstrated how to exploit vulnerabilities in the Windows DOS-to-NT path conversion process to achieve…

20 hours ago

A flaw in the Forminator plugin impacts hundreds of thousands of WordPress sites

Japan's CERT warns of a vulnerability in the Forminator WordPress plugin that allows unrestricted file uploads…

24 hours ago

Akira ransomware received $42M in ransom payments from over 250 victims

Government agencies revealed that Akira ransomware has breached over 250 entities worldwide and received over…

1 day ago

This website uses cookies.