{"id":11026,"date":"2018-08-29T11:24:30","date_gmt":"2018-08-29T11:24:30","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android\/"},"modified":"2018-08-29T11:24:30","modified_gmt":"2018-08-29T11:24:30","slug":"were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android\/","title":{"rendered":"We&#8217;re all sick of Fortnite, but the flaw found in its downloader is the latest way to attack Android"},"content":{"rendered":"<p>A newfound way to hack Android using a technique dubbed &#8220;Man-in-the-Disk&#8221; is central to the recent security flap about Fortnite on the mobile platform.<\/p>\n<p>Man-in-the-Disk can circumvent sandboxes and infect a smartphone or tablet using shared external storage through a seemingly harmless Android application.<\/p>\n<p>Sandboxing isolates applications from each other. The idea is that even if a malicious application found its way on to an Android device, it wouldn&#8217;t be able to steal data associated with other apps.<\/p>\n<p>Check Point researcher Slava Makkaveev explained, during a presentation at the DEF CON hacking jamboree in Las Vegas, how an application with no particularly dangerous or suspicious permissions can escape the sandbox.<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/blog.checkpoint.com\/2018\/08\/12\/man-in-the-disk-a-new-attack-surface-for-android-apps\/\">The technique<\/a> \u2013 named after the well-known Man-in-the-Middle type of attack \u2013 works by abusing calls to read or write to external storage, a routine function of mobile applications.<\/p>\n<p>External storage is also often used for temporarily storing data downloads from the internet. An application may use the area to store supplementary modules that it installs to expand its functionality, like additional content or updates.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2017\/09\/06\/angry-laptop.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"Man frustrated with computer\"\/><\/p>\n<h2 title=\"Normal policy \u2013 or punishment for stepping outside ad giant's walled garden?\">Ah, um, let&#8217;s see. Yup&#8230; Fortnite CEO is still mad at Google for revealing security hole early<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2018\/08\/27\/fortnite_ceo_slams_google_for_revealing_security_hole_early\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>The problem is that any application with read\/write access to the external storage can gain access to the files and modify them, adding something malicious. Google has already warned app developers to be wary of malfeasance in this area.<\/p>\n<p>Makkaveev discovered that not all app developers, not even Google employees or certain smartphone manufacturers, follow the <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/developer.android.com\/training\/articles\/security-tips\">advice<\/a>. Makkaveev demonstrated exploitation of the vulnerability in Google Translate, Yandex.Translate, Google Voice Typing, and Google Text-to-Speech, as well as system applications by LG and the Xiaomi browser.<\/p>\n<p>He warned that vulnerable apps are likely numerous, an observation evidenced by events over the last few days.<\/p>\n<p>Google researchers recently discovered that the same Man-in-the-Disk attack can be applied to the Android version of the popular game Fortnite. To download the game, users need to install a helper app first. This, in turn, is supposed to download the game files.<\/p>\n<p>But by using the Man-in-the-Disk attack, a crook can trick the helper into installing a malicious application.<\/p>\n<p>Fortnite&#8217;s developer, Epic Games, is aware of this vulnerability and has already issued a new version of the installer. Players should be using version 2.1.0 to stay safe. If you have Fortnite already installed, remove it then reinstall from scratch using the patched version of the software.<\/p>\n<p>Epic Games is none too pleased that Google went public with the exposure of Fortnite to this class of vulnerability, as <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/08\/27\/fortnite_ceo_slams_google_for_revealing_security_hole_early\/\">previously reported<\/a>. Kaspersky Lab CTO Nikita Shvetsov <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/twitter.com\/nikitium\/status\/1034126433516433408\">noted<\/a> on Monday that the flaw stemmed from the same &#8220;Man-in-the-Disk&#8221; attack some Google apps were revealed as being vulnerable to earlier this month.<\/p>\n<p>Kaspersky Lab&#8217;s explanation of the Man-in-the-Disk vulnerability \u2013 and how consumers can minimise their exposure to the problem \u2013 can be found <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.kaspersky.com\/blog\/man-in-the-disk\/23622\/\">here<\/a>. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1787\/-6625\/following-bottomlines-journey-to-the-hybrid-cloud?td=wptl1787\">Following Bottomline\u2019s journey to the Hybrid Cloud<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2018\/08\/29\/android_external_storage_man_in_the_disk\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Man-in-the-Disk technique able to add malicious files to a device&#8217;s external storage A newfound way to hack Android using a technique dubbed &#8220;Man-in-the-Disk&#8221; is central to the recent security flap about Fortnite on the mobile platform.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":11027,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-11026","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>We&#039;re all sick of Fortnite, but the flaw found in its downloader is the latest way to attack Android 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"We&#039;re all sick of Fortnite, but the flaw found in its downloader is the latest way to attack Android 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-29T11:24:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"We&#8217;re all sick of Fortnite, but the flaw found in its downloader is the latest way to attack Android\",\"datePublished\":\"2018-08-29T11:24:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android\\\/\"},\"wordCount\":511,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android\\\/\",\"name\":\"We're all sick of Fortnite, but the flaw found in its downloader is the latest way to attack Android 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android.jpg\",\"datePublished\":\"2018-08-29T11:24:30+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"We&#8217;re all sick of Fortnite, but the flaw found in its downloader is the latest way to attack Android\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"We're all sick of Fortnite, but the flaw found in its downloader is the latest way to attack Android 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android\/","og_locale":"en_US","og_type":"article","og_title":"We're all sick of Fortnite, but the flaw found in its downloader is the latest way to attack Android 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-08-29T11:24:30+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"We&#8217;re all sick of Fortnite, but the flaw found in its downloader is the latest way to attack Android","datePublished":"2018-08-29T11:24:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android\/"},"wordCount":511,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android\/","url":"https:\/\/www.threatshub.org\/blog\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android\/","name":"We're all sick of Fortnite, but the flaw found in its downloader is the latest way to attack Android 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android.jpg","datePublished":"2018-08-29T11:24:30+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/were-all-sick-of-fortnite-but-the-flaw-found-in-its-downloader-is-the-latest-way-to-attack-android\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"We&#8217;re all sick of Fortnite, but the flaw found in its downloader is the latest way to attack Android"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/11026","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=11026"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/11026\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/11027"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=11026"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=11026"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=11026"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}