{"id":4013,"date":"2018-06-22T20:44:05","date_gmt":"2018-06-22T20:44:05","guid":{"rendered":"https:\/\/kasperskycontenthub.com\/threatpost\/?p=133029"},"modified":"2018-06-22T20:44:05","modified_gmt":"2018-06-22T20:44:05","slug":"fortnite-fraudsters-infest-the-web-with-fake-apps-scams","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams\/","title":{"rendered":"Fortnite Fraudsters Infest the Web with Fake Apps, Scams"},"content":{"rendered":"<div class=\"media_block\"><\/div>\n<p>Fortnite, the sandbox video game, has become so popular that its maker, Epic Games, is ponying up $100 to $300 million to supply prize money for eSports tournaments. What it hasn\u2019t ponied up for \u2013 at least not yet \u2013 is an Android version. Which means the bad guys are having a field day.<\/p>\n<p>We reported not too long ago on the <a href=\"https:\/\/threatpost.com\/fake-fortnite-apps-for-android-spread-spyware-cryptominers\/132062\/\" target=\"_blank\" rel=\"noopener\">scourge of fake Fortnite Android apps<\/a> spreading around the web, looking to entice desperate mobile gamers hungry for a version they can play on their Galaxy devices, et al \u2013 and because the game has not been officially released for the platform, these have been quite successful. The Google search \u201cFortnite for Android\u201d is one of the first auto-fill suggestions for search terms, indicating its popularity. All too often these searches go to scam sites.<\/p>\n<p>Fortnite is a mostly-free online multiplayer role-playing game where gamers can buy \u201cskins\u201d to become different characters and species, along with armor and other accoutrements; they can also build structures and do battle and generally live an alt-life within the Fortnite world. It doesn\u2019t take itself too seriously, either: It has a cartoon look and offers a \u201cdisco bomb\u201d that makes opposing warriors break into dance numbers.<\/p>\n<p>It is, in short, fun\u2014and has attracted, to date, <a href=\"https:\/\/www.pcgamesn.com\/fortnite\/fortnite-battle-royale-player-numbers\" target=\"_blank\" rel=\"noopener\">125 million active players<\/a> for its most popular mode, \u201cBattle Royale\u201d \u2013 which is a pretty spectacular threat surface of potentially non-security-savvy consumers to go after, if you\u2019re a cybercriminal type.<\/p>\n<p>Recently, malefactors have doubled down on duping Fortnite enthusiasts, releasing <a href=\"https:\/\/www.reddit.com\/r\/videos\/comments\/8mmd0q\/this_is_an_advertised_video_on_youtube_currently\/\" target=\"_blank\" rel=\"noopener\">YouTube videos<\/a> with links to scam versions of the game. Once a faux version is installed, it asks for more downloads, one after another \u2013 and the scammers make a commission on each download. These scam apps can also spread malware.<\/p>\n<p>\u201cEpic Games is on the verge of releasing a version of its immensely popular online game Fortnite for Android users, and everyone\u2019s excited,\u201d said Paul Ducklin, senior technologist at Sophos, in an email interview. \u201cUnfortunately, many people just can\u2019t wait and are hunting for early access versions \u2013 and, guess what, cybercrooks are happy to oblige\u2026 with malware. Don\u2019t do it!\u201d<\/p>\n<p>Of course, sticking to the official Google Play store can go a long way to solving the problem, as is the case with most malicious app issues.<\/p>\n<p>\u201cThe root problem is not fake Fortnite apps per-se, but the existence of malicious apps in general, and in the excitement of the moment, an individual downloading what looks to be an app via a mobile browser vs an official app store,\u201d said Anupam Sahai, vice president of product management at Cavirin, in an email to Threatpost. \u201cThis opens up a host of potential vulnerabilities, and with the increasing use of one\u2019s smartphone for both business and pleasure, sometimes without any formal security management controls, the potential that this creates a vector for an enterprise breach is great.\u201d<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/31\/2018\/06\/22162415\/fortnite1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-133031 alignleft\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/31\/2018\/06\/22162415\/fortnite1-300x169.jpg\" alt=\"\" width=\"300\" height=\"169\"\/><\/a>Then there\u2019s the basic strategy of installing updates.<\/p>\n<p>\u201cAnother reason that Android phones are at high risk is that most of them are not up-to-date,\u201d said Nick Bilogorskiy, cybersecurity strategist at Juniper Networks, in an email to Threatpost. \u201cMost Android users are on the 6.0 Marshmallow version, which is several versions behind, and less than 1 percent of users are running the newest 8.1 Oreo version.\u201d<\/p>\n<p><strong>Hack Royale: Not Just Fake Apps to Worry About<\/strong><\/p>\n<p>There are other Fortnite-related dangers too. Gad Naveh, advanced threat prevention evangelist at Check Point, told Threatpost that Fortnite accounts have also become lucrative targets for hacking.<\/p>\n<p>\u201cHacking gaming accounts is as interesting \u2013 or even more \u2013 than other cloud services like Office365, Salesforce and Dropbox,\u201d he said. \u201cAccounts that were taken over either by phishing or weak passwords can give nice revenues. Especially for gaming hackers who are usually more interested in in-game resources than actual funds.\u201d<\/p>\n<p>He added, \u201cAttackers are always looking for ways like phishing and social engineering to take over accounts and monetize from other scams, such as free in-game money (VBucks). As a father to a child playing this game, I noticed Fortnite developers are trying to educate players against risk in such scams \u2013 you can only buy VBucks through the in-game store \u2013 which is important step. But some users will click and fall for the promise of free gifts eventually, and preventive measures should be taken as well against phishing and malicious apps on your phone.\u201d<\/p>\n<p>Dirk Morris, chief product officer at Untangle, told us that straight-up scams are becoming popular too.<\/p>\n<p>\u201cFortnite is an absolute phenomenon at this point, so it is naturally attracting cybercriminals,\u201d he said. \u201cScams targeting unsuspecting gamers range from selling fake vBucks to presenting malicious app downloads. Users must always exercise caution when trusting third party apps, whether they are browser plug-ins, Facebook quizzes or mobile phone apps. Malware and privacy concerns require constant vigilance.\u201d<\/p>\n<p>It should be noted as well that not just consumers are at risk.<\/p>\n<p>\u201cAny enterprise that allows employees to connect their own Android phones to the corporate network is also at risk,\u201d Juniper\u2019s Bilogorskiy told Threatpost. \u201cTo reduce the risk of infection on Android, make sure to update to the latest version, lock your phone to only allow downloads from Google Play and avoid apps that have very few reviews.\u201d<\/p>\n<p>Fortnite is not the first popular new game to be hounded by cybercriminals. In 2016, the then-wildly popular Pokemon GO app <a href=\"https:\/\/threatpost.com\/malicious-pokemon-go-app-installs-backdoor-on-android-devices\/119174\/\" target=\"_blank\" rel=\"noopener\">went through a similar cycle<\/a>, with legions of fake versions of the app spreading nasty malware like DroidJack, a remote-access tool.<\/p>\n<p><em>Images courtesy of Epic Games.<\/em><\/p>\n<p> READ MORE <a href=\"https:\/\/threatpost.com\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams\/133029\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malefactors have doubled down on duping Fortnite enthusiasts, releasing YouTube videos with links to scam versions of the game. And that&#8217;s not all. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":4014,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[3],"tags":[1491,1492,525,621,28,29,1323,69,1493],"class_list":["post-4013","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threatpost","tag-android-version","tag-fake-app","tag-fortnite","tag-google-play","tag-malware","tag-mobile-security","tag-scams","tag-web-security","tag-youtube-videos"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fortnite Fraudsters Infest the Web with Fake Apps, Scams 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fortnite Fraudsters Infest the Web with Fake Apps, Scams 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-22T20:44:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"169\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Fortnite Fraudsters Infest the Web with Fake Apps, Scams\",\"datePublished\":\"2018-06-22T20:44:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams\\\/\"},\"wordCount\":927,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams.jpg\",\"keywords\":[\"android version\",\"fake app\",\"Fortnite\",\"google play\",\"Malware\",\"Mobile Security\",\"Scams\",\"Web Security\",\"youtube videos\"],\"articleSection\":[\"Threatpost\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams\\\/\",\"name\":\"Fortnite Fraudsters Infest the Web with Fake Apps, Scams 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams.jpg\",\"datePublished\":\"2018-06-22T20:44:05+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams.jpg\",\"width\":300,\"height\":169},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"android version\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/android-version\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Fortnite Fraudsters Infest the Web with Fake Apps, Scams\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fortnite Fraudsters Infest the Web with Fake Apps, Scams 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams\/","og_locale":"en_US","og_type":"article","og_title":"Fortnite Fraudsters Infest the Web with Fake Apps, Scams 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-06-22T20:44:05+00:00","og_image":[{"width":300,"height":169,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Fortnite Fraudsters Infest the Web with Fake Apps, Scams","datePublished":"2018-06-22T20:44:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams\/"},"wordCount":927,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams.jpg","keywords":["android version","fake app","Fortnite","google play","Malware","Mobile Security","Scams","Web Security","youtube videos"],"articleSection":["Threatpost"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams\/","url":"https:\/\/www.threatshub.org\/blog\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams\/","name":"Fortnite Fraudsters Infest the Web with Fake Apps, Scams 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams.jpg","datePublished":"2018-06-22T20:44:05+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams.jpg","width":300,"height":169},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/fortnite-fraudsters-infest-the-web-with-fake-apps-scams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"android version","item":"https:\/\/www.threatshub.org\/blog\/tag\/android-version\/"},{"@type":"ListItem","position":3,"name":"Fortnite Fraudsters Infest the Web with Fake Apps, Scams"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/4013","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=4013"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/4013\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/4014"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=4013"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=4013"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=4013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}