Fortnite Installer vulnerability used to download malware on Android

Fortnite installer vulnerability discovered by Google. On August 15, the company announced this call to Epic Games. Due to this vulnerability in the installer, malware might have been downloaded to Android phones. The game’ s content package could be replaced by other content, including malicious applications. Epic Games reacted quickly.

A Fortnite Installer vulnerability for downloading malware to Android

Fortnite Installer, Fortnite Installer vulnerability used to download malware on Android, Optocrypto

A few days later, on August 17, the company announced that the bug had been fixed forever and the bug had been fixed.

Security problem for Fortnite

The vulnerability Google found could be exploited on Samsung’s Galaxy phones, which can download Fortnite’s APK. This is a man-in-the-disk exploit that makes it possible to control the processes running in the internal memory of the device in question. In addition to reading permissions. Downloading the game from the store to Samsung phones resulted in all permissions being granted automatically.

The game is installed on the external memory of the device. When the download was complete, Fortnite was replaced by a malicious package. And with all permissions, the user did not know exactly what was downloaded to the device. Epic Games has already solved this problem, so the game is downloaded directly to internal memory.

At the moment, the number of Android users affected by the problem is unknown. It happened in the first week of the game during which Epic Games was available for download, so the figure could be high.