

It’s a great place to learn a bit about account security, including some of the most basic techniques we’ll discuss in this post. Check the account security bulletinĮpic Games has released a bulletin that offers a good crash course in basic account security with a focus on what Fortnite specifically offers to keep players safe. Make sure you’re getting the launcher through Epic Games itself, and not a third-party download service.

I’m not about to download any of these files to see what they are, and neither should you. The problem is that a lot of those places aren’t Epic Games. There is only one safe place to get Fortniteįortnite drives a massive amount of Google traffic at the moment, and you’ll find many places to download the PC game after a quick search. And they begin before you even install the game. “Any players who believe their account has been compromised should reach out to our player support immediately.”īefore that happens, however, you can take steps to keep your account safe. “We are aware of instances where users’ accounts have been compromised using well-known hacking techniques and are working to resolve these issues directly with those players affected,” the company told Polygon via email. Epic Games seems to think it’s the latter. It’s unclear if hackers are taking advantage of a unique flaw in Fortnite, or if they’re using standard phishing techniques and exploiting bad password practices on the part of the players. That means someone else is trying very hard to get in, and now no one has access.

“Your Epic Games account has been locked due to multiple invalid login attempts,” the launcher will tell players. Fraudulent card charges, sometimes totaling hundreds of dollars, seem to be a relatively common complaint among those who find themselves with hacked accounts. Players reporting compromised accounts have become something of a trend on the game’s subreddit, in fact. Fortnite has become one of the most popular games in the world, and that sort of ubiquity can make any game a target for hackers who want to exploit a system’s weaknesses.
