Check Point identified serious security weaknesses in Fortnight the most popular game in the world

wwwww

by Ifi Reporter Category:Hitech Jan 16, 2019

Check Point's cyber investigators, Eran Voknin and Alon Buxiner, have identified serious security weaknesses in the most popular network game in the world - Fortnight. Fortnight has a variety of platforms. Every month nearly 80 million players use Fortnight.
The weaknesses found by the researchers enable, in effect, total control over the personal accounts of the users of the game, including the user's personal details, including his credit card information, and the total data on the acount. The users who play with him. The weaknesses allow an attacker to make in-game purchases in his virtual currency - V-Buckets.
The identified weaknesses exist in the process of registering and identifying the users of the network game. The weaknesses were found on the operator's platform, with an emphasis on the user's identity authentication methodology when entering the game.
The weaknesses are exploited to attack by clicking the user on a dedicated link sent by the attacker and seemingly from the domain of the game what the user sees as a completely innocent and normal action. When the link is clicked, the attacker obtains the user's identity verification information without the user having typed them himself.
Previously there were reports of fraud in Fortnight's user accounts by redirecting users to fake sites where users typed their personal details to make purchases in the game.
Oded Vanunu, head of research at Check Point Product weaknesses, Fortnight is today one of the most popular hobbies of children around the world. The weaknesses we have found allow attackers to carry out very serious infringements on their privacy and the dangerous exploitation of their identity and personal details. Over the past year, we have seen cyber criminals increasingly attacking cloud services and obtaining a huge amount of personal information stored in them. They do this through the same identity verification process that we have proved to be under control. Identity theft Internet users are one of the most significant threats in today's cyber world. Check Point recommends that users on digital platforms use two-stage detection as a means to prevent account theft and privacy. Users should examine the legitimacy of the links.

684 Views

Comments

No comments have been left here yet. Be the first who will do it.
Safety

captchaPlease input letters you see on the image.
Click on image to redraw.

ABOUT IFI TODAY

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum

Testimonials

No testimonials. Click here to add your testimonials.