Submitted by CyberHub Summit on Wed, 11/07/2018 - 13:52
Playing Games with Gamers…
Playing Games with Gamers…

Fortnite, the most popular game online ever, is in the news again. Or rather, the online grooming exposé wasn’t enough for media taste buds.

We all read or watched in anguish as the obvious consequences of an online but largely unprotected forum for adolescents unfolded. Fortnite, has become a target for online child predators.

This wasn’t hugely shocking to anyone. A highly addictive game, with plenty of interactivity between players, the location was just too good for cyber predators. Well it seems, it’s also not a bad online spot for financially minded cyber criminals.  

In a recent study, researchers of a well-known cyber security firm, found thousands of instances of cyber-attacks on players. Whilst there are many instances of creepy online predators attempting to get into children’s games, cyber criminals have drummed up numerous ways to exploit unsuspecting Fortnite fans, and we’re about to list a few of them. 

Torrent Sites

Torrent sites have been around for a while and they are notorious places for hackers to steal data. The most common way they do that here is by offering gamers an online portal, which costs $40, giving them unlimited downloads and access to their favorite games. After they pay, they gain several links to torrent files containing malware. 

Phony point sales

Another great feature of most online games is ‘points’, that each player can earn and use to buy items and power ups. Hackers like to sell fake points, through sending files or phishy emails that either steal your money or your credentials 

[ Stay one step ahead of the hacker with CyberHub Summit's Newsletter ]

Item exchanges

Another great scam is item exchanges. Sometimes a game item is sold or exchanged with another player. Be aware that hackers can use these instances to steal your information. 

Sometimes an email with a coupon can be sent for game points or a specific item that asks you to confirm your account information. This is a really simple way for a hacker to login and cause damage. 

Phone scams

Have you noticed how many people play games on their phone these days? Our systems are becoming more and more interconnected to the point that you can access almost anything with your Facebook login. Which means, if hackers get hold of one of your accounts, well, there goes your Social media account.

Hackers have been targeting youngsters with a variety of different hacks, for example, there’s a way that hackers could send a link to someone’s phone that looks like it gives extra points in a game that they’re currently active in. After the user clicks on the link, hackers can start to use the phone to charge long distance calls and texts to that account. The user won’t even know what hit them until they get the bill. 

The worst part is that most of us save our credit card information on our phones. If you play a video game and click on some malware links to get more game points, cyber criminals can actually get your credit card information from your phone.

In short, no games are really safe out there. If you play anything other than minesweeper, or scrabble with your book club on the weekend, you have to make sure to protect yourself. 

Don’t exchange or buy items from someone that you don’t know, don’t buy any points from an email or text, and most of all don’t confirm your game account login by clicking on an email.