{"id":1667,"date":"2018-08-30T16:28:54","date_gmt":"2018-08-30T15:28:54","guid":{"rendered":"http:\/\/blogs.kent.ac.uk\/unikentcomp-news\/?p=1667"},"modified":"2018-08-30T16:28:54","modified_gmt":"2018-08-30T15:28:54","slug":"fortnite-is-setting-a-dangerous-security-trend","status":"publish","type":"post","link":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/2018\/08\/30\/fortnite-is-setting-a-dangerous-security-trend\/","title":{"rendered":"Fortnite is setting a dangerous security trend"},"content":{"rendered":"<figure><figcaption><span class=\"attribution\"><a class=\"source\" href=\"https:\/\/www.shutterstock.com\/image-photo\/san-francisco-ca-usa-august-2018-1159820950?src=9cA5iMzKjwOrSbMg2PDOTg-1-30\">Shutterstock<\/a><\/span><\/p>\n<\/figcaption><\/figure>\n<p><a href=\"https:\/\/theconversation.com\/profiles\/jason-nurse-392784\">Jason Nurse<\/a>, <em><a href=\"http:\/\/theconversation.com\/institutions\/university-of-kent-1248\">University of Kent<\/a><\/em><\/p>\n<p>Cybercriminals have just been given yet another route to get malicious software (malware) onto your personal mobile devices. The hugely popular video game Fortnite has become one of the first major apps to bypass official app stores and encourage users to download its software directly.<\/p>\n<p>In doing so, it\u2019s also bypassing the security protections of the app stores and chipping away at a system that has worked reasonably well at keeping malware off people\u2019s phones and tablets. And we\u2019re already starting to see the dangerous results of this, as Fortnite\u2019s installation method created a <a href=\"https:\/\/www.telegraph.co.uk\/technology\/2018\/08\/25\/fortnite-app-allowed-hackers-secretly-install-anything-android\/\">security vulnerability<\/a> that may have opened up some users\u2019 devices to hacking.<\/p>\n<p>Fortnite\u2019s maker, Epic Games, shocked the industry when it announced at the start of August that it would release the app <a href=\"https:\/\/www.theguardian.com\/games\/2018\/aug\/06\/fortnite-is-coming-to-android-phones-but-not-through-google-play\">directly to consumers<\/a> instead of through the official Google Play store (although it\u2019s still available through Apple\u2019s App Store). The firm said this was to create a direct relationship with customers instead of depending on middlemen distributors. Google <a href=\"https:\/\/support.google.com\/googleplay\/android-developer\/answer\/112622?hl=en-GB\">takes 30%<\/a> of the money paid for any app or in-app purchase in the Play store.<\/p>\n<p>This goes even further than the likes of Netflix, which recently confirmed it was <a href=\"https:\/\/techcrunch.com\/2018\/08\/21\/netflix-itunes-2\/\">testing a bypass of Apple\u2019s iTunes billing<\/a> system in 33 markets worldwide. This meant that some subscribers would be unable to pay using iTunes and instead would have to complete payments via Netflix\u2019s website, reducing their engagement with the official Apple store.<\/p>\n<p><a href=\"https:\/\/sensortower.com\/blog\/app-revenue-and-downloads-1h-2018\">Current estimates<\/a> suggest that in the first half of 2018, users of the Apple App Store and the Google Play Store spent a combined US$34.4 billion on mobile apps and games. These official stores still represent the first port-of-call for millions of mobile users, and in return <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/USEC2012-Conundrum.pdf\">they have come to expect<\/a> trustworthy, vetted, malware-free, high-quality apps.<\/p>\n<p>The issue with attempts to bypass official stores is that they contradict <a href=\"https:\/\/www.ncsc.gov.uk\/guidance\/protecting-your-organisation-malware\">recommended security best practice<\/a>. Engaging with these stores is highly endorsed because of the added protection they offer. Apple, for instance, has <a href=\"https:\/\/developer.apple.com\/app-store\/review\/\">a set of detailed guidelines<\/a> that app submissions are checked against. Similarly, Google has a series of <a href=\"https:\/\/source.android.com\/security\/reports\/Android_WhitePaper_Final_02092016.pdf\">automated and manual techniques<\/a> to vet apps.<\/p>\n<p>Directing users away from these stores means less protection. And even worse, it stands to encourage a wider behaviour change. It sends the message to users that official app stores are no longer the primary trusted way to engage with apps.<\/p>\n<figure class=\"align-center \"><img src=\"https:\/\/images.theconversation.com\/files\/234060\/original\/file-20180829-195322-5raaup.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" alt=\"\" \/><figcaption><span class=\"caption\">Bypassing official app stores is a risky game.<\/span><br \/>\n<span class=\"attribution\"><a class=\"source\" href=\"https:\/\/www.shutterstock.com\/image-photo\/melbourne-australia-may-23-2016-closeup-424829353?src=W5YMty38eGU1V13XXlzdHw-1-18\">Shutterstock<\/a><\/span><\/figcaption><\/figure>\n<p><a href=\"https:\/\/blog.trendmicro.com\/update-mobile-threats-on-the-rise\/\">Industry research<\/a> has validated the importance of this advice time and time again, by revealing that third-party app sources \u2013 particularly on the Android platform \u2013 are often plagued with malware and can expose users and their data to a <a href=\"https:\/\/www.wandera.com\/reddrop-malware\/\">variety of security and privacy risks<\/a>. According to the 2018 Symantec <a href=\"https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-23-2018-en.pdf\">Threat Report<\/a>, the vast majority (99.9%) of discovered mobile malware was found in third-party app stores. This <a href=\"https:\/\/www.wired.com\/story\/google-play-store-malware\/\">doesn\u2019t mean<\/a> that official stores are free from malware but they do have the advantage of another set of specialists checking apps for potential problems.<\/p>\n<p>As such, direct downloads create a substantially greater security risk. A perfect example of this was revealed recently when <a href=\"https:\/\/issuetracker.google.com\/issues\/112630336\">Google discovered<\/a> <a href=\"https:\/\/www.androidcentral.com\/epic-games-first-fortnite-installer-allowed-hackers-download-install-silently\">a severe security vulnerability<\/a> in the Fortnite installation process. This essentially made it possible for malicious apps to download and install anything on a user\u2019s device without their permission \u2013 a cyber-security nightmare. Although Epic Games has since released a fix, it is very likely that <a href=\"https:\/\/techcrunch.com\/2018\/08\/24\/fortnites-android-installer-shipped-with-an-epic-security-flaw\/\">many users have yet to install it<\/a>, which means they may still be vulnerable.<\/p>\n<h2>Eroding good habits<\/h2>\n<p>A more long-term impact of the shift to direct downloads and engagement is the potential erosion of best security practice. For years, <a href=\"https:\/\/www.sans.org\/security-awareness-training\/ouch-newsletter\/2017\/securely-using-mobile-apps\">security awareness campaigns<\/a> <a href=\"https:\/\/www.wired.com\/2016\/12\/never-ever-ever-download-android-apps-outside-google-play\/\">and guidance<\/a> have emphasised the importance of sourcing apps only from official stores. This has been a difficult (yet crucial) task as security awareness campaigns <a href=\"https:\/\/kar.kent.ac.uk\/67511\/1\/csss2015_bada_et_al.pdf\">are hard to get right<\/a>, actually changing people\u2019s behaviour <a href=\"https:\/\/www.nspw.org\/papers\/2008\/nspw2008-beautement.pdf\">is even harder<\/a>, and attackers are constantly updating <a href=\"https:\/\/link.springer.com\/article\/10.1186\/s13673-016-0065-2\">their tricks<\/a>.<\/p>\n<p>Encouraging or redirecting users away from traditional channels may well undo some of these ingrained secure habits. For example, the Fortnite installation process requires gamers <a href=\"https:\/\/techcrunch.com\/2018\/08\/24\/fortnites-android-installer-shipped-with-an-epic-security-flaw\/\">to enable installations<\/a> <a href=\"https:\/\/www.grahamcluley.com\/android-security-fortnite\/\">from unknown apps<\/a>. But doing so puts users at higher risk. A user would need to navigate to this setting later to disable third-party installations as it does not reset automatically.<\/p>\n<p>If more large app developers bypass the official stores in this way, it will almost certainly have an impact on people\u2019s broader behaviours. This could result in the belief that trusted sources of apps are no longer necessary and that disabling protective security measures isn\u2019t a problem. What\u2019s more, it could create a higher temptation to look to third-party app stores for new apps or better deals \u2013 app channels that are, as mentioned, unfortunately <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/red-alert-2-0-android-trojan-spreads-via-third-party-app-stores\">infested with malware<\/a>.<\/p>\n<p>The ultimate result of these actions will be further malware infections and a higher compromise in privacy and security. Ordinary users will pay the costs of app developers\u2019 desire to avoid the regulations and fees of the official stores.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img loading=\"lazy\" style=\"border: none !important;margin: 0 !important;max-height: 1px !important;max-width: 1px !important;min-height: 1px !important;min-width: 1px !important;padding: 0 !important\" src=\"https:\/\/counter.theconversation.com\/content\/102294\/count.gif?distributor=republish-lightbox-basic\" alt=\"The Conversation\" width=\"1\" height=\"1\" \/><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: http:\/\/theconversation.com\/republishing-guidelines --><\/p>\n<p><a href=\"https:\/\/theconversation.com\/profiles\/jason-nurse-392784\">Jason Nurse<\/a>, Assistant Professor in Cyber Security, <em><a href=\"http:\/\/theconversation.com\/institutions\/university-of-kent-1248\">University of Kent<\/a><\/em><\/p>\n<p>This article was originally published on <a href=\"http:\/\/theconversation.com\">The Conversation<\/a>. Read the <a href=\"https:\/\/theconversation.com\/fortnite-is-setting-a-dangerous-security-trend-102294\">original article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Shutterstock Jason Nurse, University of Kent Cybercriminals have just been given yet another route to get malicious software (malware) onto your personal mobile devices. The &hellip; <a href=\"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/2018\/08\/30\/fortnite-is-setting-a-dangerous-security-trend\/\">Read&nbsp;more<\/a><\/p>\n","protected":false},"author":5321,"featured_media":1668,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[124,122],"tags":[37339,178049,178050],"_links":{"self":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts\/1667"}],"collection":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/users\/5321"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/comments?post=1667"}],"version-history":[{"count":1,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts\/1667\/revisions"}],"predecessor-version":[{"id":1669,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts\/1667\/revisions\/1669"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/media\/1668"}],"wp:attachment":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/media?parent=1667"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/categories?post=1667"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/tags?post=1667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}