Why Fortnite Data Breach is a Problem For All Gamers

  • By David Lukic
  • Published: Sep 17, 2020
  • Last Updated: Mar 18, 2022

Be careful what you post online; it can come back to bite you later. As was the case with Epic Games’ standout online game Fortnite. Due to an unsecured page on the Epic Games website, which was coded in 2004, hackers were able to gain access to millions of Fortnite user accounts and use credit card information to make in-game purchases. CheckPoint, a cybersecurity research company, discovered the Epic Games data breach. The cybercriminals sent phishing emails with a fake login, to many Fortnite users who clicked the link, and their accounts were hacked using token technology. The thieves also scavenged millions of user accounts and sold them on the dark web for a profit. Experts say the hackers got away with thousands just from in-app purchases. The hack also allowed criminals to listen in on chats along with taking over accounts. The most disturbing aspect of this is that kids mostly play the game, and the accounts were theirs. 

When Did the Epic Games Data Breach Happen?

The actual epic games hack occurred sometime in late 2018. CheckPoint found the security flaw and reported it to Epic Games in November of 2018. However, it wasn’t until  January of 2019 that Epic Games acknowledged the incident and repaired the vulnerability. They never confirmed the number of victims, but there are more than 200 million Fortnite players online, and security officials assume that all of them were breached. 

fortnite account hacked

Was Your Fortnite Hacked? How to Check

Currently, there is no way to check online if your account was breached, and Epic Games has not confirmed an actual list of victims. However, they did post this response to the Epic Games data breach on their website

“At Epic, we’ve been working hard to try to hunt down password dumps in order to proactively reset passwords for player accounts when we believe they are leaked online. While this approach involves a lot of manual work on our side, we believe that it prevents a significant amount of fraud. However, this approach doesn’t find every impacted account, or you might have created your Epic account after we checked a particular password dump.

As a result, we’re working to further automate our process to check our account database against password dumps to close the gap on identifying impacted users and resetting their passwords. We’ve also enabled multi-factor authentication, which provides players with additional security options.”

Was Your Fortnite Account Hacked? Here's What To Do

If you were a player of Fortnite and had an account before January of 2019, you were most likely a victim of data breach. Thousands of users complained of fraudulent charges on their credit and debit cards stolen during the Epic Games data breach. A few things you should address immediately are:

  • Cancel the credit or debit card and have your bank issue you a new one.
  • Change the password for your Fortnite account and use a strong password.
  • If you used the same password elsewhere, change those too.
  • If your child plays Fortnite, educate them about never clicking links in emails and how to stay safe online.
  • Consider signing up for credit monitoring with a company like IDStrong.com for peace of mind.

The Fortnite Lawsuit

FDAzar law firm filed a class-action lawsuit on August 8, 2019. The case is still in process and being decided by The Honorable Terrence W. Boyle. The law firm is encouraging anyone who was a victim of the Epic Games data breach is asked to contact an attorney at the law firm for assistance. 

epic games security breach

Can My Information From Epic Games Security Breach Be Used for Identity Theft?

Yes, the account information stolen from Fortnite hack and sold on the dark web can be used to steal your identity. Once the hackers had your email address, they may have sent you a phishing email that looked like it came from Fortnite but did not. Many players also had their credit card information stolen. It doesn’t take much for thieves to steal your identity.

Online Gaming Safety Tips To Follow While Playing Fortnite

Online games are great fun, but you have to be diligent in staying safe. Follow these tips to keep your accounts safe from hackers.

  • Change your passwords frequently and always use strong ones.
  • Never reuse passwords on multiple websites.
  • Monitor your credit card accounts carefully and look for fraudulent charges.
  • Keep your computer and other devices updated with the latest security patches and antivirus software. 
  • Never click a link in email or download attachments.
About the Author
IDStrong Logo

Related Articles

What is Data Leak and How to Prevent Accidental Data Leakage

Data breaches take many forms, and one of them is through data leak and accidental web exposure. M ... Read More

The Saga of T-Mobile Data Breach: 2013, 2015, 2021 and 2023 Hacks

T-Mobile has experienced a number of data breaches in the past decade. The first case occurred som ... Read More

Anthem Data Breach Exposed 78 Million Records

In the Anthem Data Breach of 2015, hackers were able to steal 78.8 million member’s records. ... Read More

Everything You Need to Know About Insider Data Breach

Data breaches are on the news frequently, but the average person doesn’t really know that much a ... Read More

The NSA Hack, How Did it Happen?

The National Security Agency (NSA) was the main attraction in a major data breach involving three ... Read More

Latest Articles

What You Need to Know about the Hot Topic Data Breach

What You Need to Know about the Hot Topic Data Breach

Hot Topic plays in the fashion, apparel, and shoe industry as a retailer of music-influenced apparel and accessories, such as jeans, tops, belts, dresses, pajamas, sunglasses, jewelry, and tees.

Google Voice Scams: What They Are and How to Stay Safe

Google Voice Scams: What They Are and How to Stay Safe

Google Voice scams continue to pose a risk for users of this service. Scammers continuously attempt to lure users into divulging their verification PIN code.

What Are Pretexting Attacks: Scam Types and Security Tips?

What Are Pretexting Attacks: Scam Types and Security Tips?

Have you ever received a text from someone you do not know? Did you become alarmed by the message? Did the message contain information about you and the people you know?

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close