Friday, September 22, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Protection

Lukas Stefanko: I hope other app developers don’t follow Epic’s example

Researcher by Researcher
June 9, 2023
in Protection
0
Lukas Stefanko: I hope other app developers don’t follow Epic’s example
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


After Epic Games shunned Google Play, debates about threats faced by Android users have taken on a whole new tenor. Joining us to add his voice to the mix is ESET Malware Researcher Lukáš Štefanko

Yesterday, we reviewed a few possible implications of the Epic Games decision to snub Google Play and, instead, distribute the Android version of its wildly popular game, Fortnite, solely through its own epicgames.com website. How to make sure the move isn’t a boon to all manner of scammers? We’ve now caught up with Lukáš to ask for his take on threats faced by Fortnite’s players, both current and potential. Read what he has to say.

Related articles

Security Operations Centers to the rescue!

Security Operations Centers to the rescue!

September 16, 2023
Will you give X your biometric data? – Week in security with Tony Anscombe

APTs target MSP access to customer networks – Week in security with Tony Anscombe

September 16, 2023

Perhaps most importantly, what advice would you give to Fortnite players to stay safe?

Normally, I would urge everybody to stick to Google Play, but for obvious reasons this doesn’t help in this case. The crucial thing here is to download Fortnite’s Android app only from Epic’s website and, once you install it, make sure that you immediately revoke the permission to install apps from “unknown sources”. That will reduce your risk of downloading malware in the future. Under no circumstances should you download the app or what is, in fact, likely to be its malicious imposter, from non-official app stores, torrents, or other shady sources.

Let’s size up the threat now. Just how much of a problem does Epic Games’ move represent?

Put simply, the way in which the game is installed increases the susceptibility of users to a device compromise, be it due to their installing a fake app from an unofficial source or forgetting to disable the “unknown sources” option once Fortnite is installed.

Did you see this coming? Did you expect that a massively popular app would, one day, sidestep Google Play?

Honestly, no. On the other hand, I fully understand that major app developers with massive player bases might want to trigger a bit of a “shake-up”, especially considering that Epic Games CEO Tim Sweeney has referred to Google Play’s 30-percent transaction fee (levied against the vendor) as a “store tax”. But for the sake of security, I hope other app developers don’t follow in Epic’s footsteps.

Threats come in many different shades and hues, but is there any one kind of threat that Fortnite’s players should be particularly wary of?

Malicious YouTube videos that promise extra game features or giveaways and prompt gamers to download apps that purport to complement Fortnite, but whose effects are malicious rather than beneficial.

How exactly can things go awry for users?

For example, victims can end up with fake apps that spy on them, steal their Fortnite accounts, add unexplained charges to their bills by sending premium-rate text messages on their behalf, or lure them into completing “surveys” that request their personal information. Fortnite has been so popular, and the Android version so highly anticipated, that attackers can sneak any malicious code you can think of into the unofficial app. Which is also why a robust security app can go a long way towards enhancing your defenses.

What are the telltale signs of an infection post-installation?

The most common way to identify a scammy app is noticing that as soon as it is launched, it disappears from the victim’s view. This is not to say that the app has been removed; it’s just hidden from the victim’s view and operates in the background, in which case it can do sneaky things without your being aware of them.

What’s the usual chain of events after someone takes the bait and, say, clicks on a dodgy link?

First of all, the lead-up to the compromise evokes trust and imitates the installation process for the bona fide app. After clicking on a link to the purported Fortnite app, you’re redirected to a lookalike version of the legitimate website, and you’re prompted to download the app’s latest version. When you download the installer, you need to install the app manually, but not before changing the device’s settings and permitting app installations from unknown sources. That’s it. If the app was malicious, your device is compromised.

What should you do after realizing that your device has been compromised with malware?

You need to locate the app in App Manager. However, this is often easier said than done, as the app may not be called Fortnite at all there, since it might impersonate other apps, including system apps. A better way to counter the threat is to install security software.

Where does the user’s responsibility for staying safe lie?

Users are responsible for checking whether an app on Google Play is genuine, for example by reading user reviews or going through the app’s description and comments. That way, they see a bigger picture and can decide for themselves if an app is safe for download or if they should choose another one.

What are your thoughts about Google Play security in general?

Our own research has shown multiple times that Google Play’s built-in protections aren’t impregnable. Having said that, although the store isn’t a “Fort Knox of security”, it does a good job of fighting harmful apps, and if such an app is detected, they remove it promptly.



Source link

Tags: appdevelopersdontEpicsFollowHopeLukasStefanko
Share76Tweet47

Related Posts

Security Operations Centers to the rescue!

Security Operations Centers to the rescue!

September 16, 2023
0

The European Union (EU) is transforming itself into a digitally aware, secure, and productive collective, with the aim of entering...

Will you give X your biometric data? – Week in security with Tony Anscombe

APTs target MSP access to customer networks – Week in security with Tony Anscombe

September 16, 2023
0

Video The recent compromise of the networks of several companies via the abuse of a remote access tool used by...

Will you give X your biometric data? – Week in security with Tony Anscombe

The real cost of a free lunch – Week in security with Tony Anscombe

September 16, 2023
0

Video Don't download software from non-reputable websites and sketchy links – you might be in for more than you bargained...

Asylum Ambuscade: crimeware or cyberespionage?

Asylum Ambuscade: crimeware or cyberespionage?

September 15, 2023
0

Asylum Ambuscade is a cybercrime group that has been performing cyberespionage operations on the side. They were first publicly outed...

Will you give X your biometric data? – Week in security with Tony Anscombe

Is a RAT stealing your files? – Week in security with Tony Anscombe

September 15, 2023
0

Video Could your Android phone be home to a remote access tool (RAT) that steals WhatsApp backups or performs other...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
Microsoft to Block Macros by Default in Office Apps

Qakbot Email Thread Hijacking Attacks Drop Multiple Payloads

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Same ol’ rig, new drill pipes

Same ol’ rig, new drill pipes

September 22, 2023
Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

September 22, 2023
LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools

LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools

September 21, 2023
EBANX Furthers Expansion into Africa; Adding 8 new Countries to its Ecosystem

EBANX Furthers Expansion into Africa; Adding 8 new Countries to its Ecosystem

September 21, 2023

Recent Posts

Same ol’ rig, new drill pipes

Same ol’ rig, new drill pipes

September 22, 2023
Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

September 22, 2023
LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools

LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools

September 21, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cyber Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved