{"id":27290,"date":"2020-12-14T15:33:31","date_gmt":"2020-12-14T21:33:31","guid":{"rendered":"https:\/\/www.hostgator.com\/blog\/?p=27290"},"modified":"2020-12-15T11:34:58","modified_gmt":"2020-12-15T17:34:58","slug":"malware-explained-among-us","status":"publish","type":"post","link":"https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/","title":{"rendered":"&#8216;Among Us&#8217; Imposters Show Why Malware Is So Hard to Spot"},"content":{"rendered":"\n<p><em>This article is part of HostGator\u2019s Web Pros Series. In this series, we feature articles from our team of experts here at HostGator. Our Product Managers, Linux Administrators, Marketers, and Tech Support engineers share their best tips for getting the most out of your website.<\/em><\/p>\n\n\n\n<p>Everyone from me to AOC is playing '\u02dcAmong Us\u2019&nbsp; now, and guess what? While we\u2019re sneaking around murdering our friends in-game or trying not to get murdered while we complete our tasks, we\u2019re also learning a valuable skill-watching out for imposters.&nbsp;<\/p>\n\n\n\n<p>That\u2019s important when we\u2019re trapped on a spaceship with a sneaky serial killer who looks and acts (almost) just like us. It can also help us learn how&nbsp; to avoid one of the worst imposters of the digital age: malware.<\/p>\n\n\n\n<p>Really, the whole '\u02dcAmong Us\u2019&nbsp; scenario offers a pretty good analogy for what malware is and does. So, if you\u2019re wondering exactly what makes malware so tricky and what you can do about it, consider what you may have already learned from playing '\u02dcAmong Us\u2019 .<\/p>\n\n\n<div class=\"hgrp\"><h4>You might like&#8230;<\/h4><ul><li><span class=\"prod-icon\"><a href=\"https:\/\/www.hostgator.com\/web-hosting\" data-element-location=\"body.post_content.related_prod_block\" data-element-type=\"button\" data-element-label=\"shared_hosting\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2020\/11\/shared-150x150.png\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" srcset=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2020\/11\/shared-150x150.png 150w, https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2020\/11\/shared-300x300.png 300w, https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2020\/11\/shared.png 500w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/span><a href=\"https:\/\/www.hostgator.com\/web-hosting\" class=\"hgrp-link\" data-element-location=\"body.post_content.related_prod_block\" data-element-type=\"link\" data-element-label=\"shared_hosting\">Shared Hosting<\/a><\/li><li><span class=\"prod-icon\"><a href=\"https:\/\/www.hostgator.com\/managed-wordpress-hosting\" data-element-location=\"body.post_content.related_prod_block\" data-element-type=\"button\" data-element-label=\"wordpress_hosting\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2020\/11\/wp-hosting-150x150.png\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" srcset=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2020\/11\/wp-hosting-150x150.png 150w, https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2020\/11\/wp-hosting-300x300.png 300w, https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2020\/11\/wp-hosting.png 500w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/span><a href=\"https:\/\/www.hostgator.com\/managed-wordpress-hosting\" class=\"hgrp-link\" data-element-location=\"body.post_content.related_prod_block\" data-element-type=\"link\" data-element-label=\"wordpress_hosting\">WordPress Hosting<\/a><\/li><\/ul><\/div>\n\n\n<h2 class=\"wp-block-heading\" id=\"h-everyone-just-wants-to-get-their-tasks-done\">Everyone just wants to get their tasks done<\/h2>\n\n\n\n<p>In '\u02dcAmong Us\u2019 , you and your crewmates and are all trying to get your tasks finished so you can keep the spaceship going.&nbsp;<\/p>\n\n\n\n<p>Do all the tasks, win the game, just like real life, right? It\u2019s not much different from collaborating with your coworkers or friends on a group project.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-but-there-s-a-hidden-threat\">But there\u2019s a hidden threat<\/h2>\n\n\n\n<p>At least one of your crewmates (maybe it\u2019s you!) is an imposter. The imposter looks and acts like one of the team-except for when they lash out and sabotage everyone\u2019s tasks or murder crewmates.&nbsp;<\/p>\n\n\n\n<p>Like an imposter, <a href=\"https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/\">malware<\/a> gets into the system you\u2019re using for work or school disguised as something normal, like ordinary messages, files and scripts. Malware often looks like it\u2019s part of the team, '\u02dchelping\u2019 you log in to your email system or downloading '\u02dcimportant\u2019 files.&nbsp;<\/p>\n\n\n\n<p>Once it\u2019s onboard, an imposter (or malware) can start creating mayhem right away. When that happens, you know you have a problem even if you\u2019re not sure yet who or what is causing it.&nbsp;<\/p>\n\n\n\n<p>Or imposters\/malware can lurk quietly for a long time-think passive play where the imposter just bides their time, acting normal and waiting for the perfect time to unleash some chaos.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/kDDeutLazZ6JxV83cAkzZzSsFiTt9uGILX6jpCK_vari8QeoW0HZxnFFFSbXZKngtXz5-TUdUSNWgc_59Syitw5huls7ca9kBxWTOt5xW6Te3M-nkw34ZTlEM8QvN0hGv8_bpqAruM7wOrkBhg\" alt=\"whos your cyber imposter\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-and-there-may-be-trust-issues\">And there may be trust issues<\/h2>\n\n\n\n<p>While they\u2019re lulling everyone into a false sense of security, imposters and phishing scammers can play on your trust and trick you into thinking they\u2019re your buddy. You wouldn\u2019t eject your buddy into the cold, airless void of space, would you?&nbsp;<\/p>\n\n\n\n<p>Just like that fake email that says it\u2019s from your bank, asking you to enter your username and password (don\u2019t do it!), the imposter may come across as friendly and helpful. You\u2019re teaming up to get things done-yay, friendship!-and then all of a sudden you get assassinated.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-trouble-begins\">The trouble begins<\/h2>\n\n\n\n<p>For an '\u02dcAmong Us\u2019&nbsp; imposter, troublemaking means sabotage and murder. With malware, it\u2019s whatever problems the creators designed it to cause. That could be&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>stealing payment data as customers enter it on your website<\/li><li>locking you out of your databases and making you pay for access<\/li><li>defacing or crashing your website<\/li><li>impersonating you via email or social media account takeovers&nbsp;<\/li><li>silently taking control of your computer to infect your work or home network<\/li><li>directing customers looking for your website to an imposter site instead<\/li><li>temporarily <a href=\"https:\/\/www.spin.com\/2018\/04\/despacito-youtube-hack\/\" target=\"_blank\" rel=\"noopener noreferrer\">removing the 'Despacito'\u009d video<\/a> from YouTube<\/li><li><a href=\"https:\/\/www.wired.com\/story\/notpetya-cyberattack-ukraine-russia-code-crashed-the-world\/\" target=\"_blank\" rel=\"noopener noreferrer\">disrupting worldwide shipping traffic<\/a><\/li><li>mining bitcoin using your resources<\/li><\/ul>\n\n\n\n<p>Regardless of what the crisis is-maybe one of your '\u02dcAmong Us\u2019 crewmates gets killed and no one\u2019s sure who the killer is, maybe you\u2019re locked out of your website-once the problems start, you have to react.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-and-you-have-to-stop-it\">And you have to stop it<\/h2>\n\n\n\n<p>You and your crewmates meet and look at where everybody was at the time of the murder. You try to narrow it down to who was the most probable killer, and you vote them off.<\/p>\n\n\n\n<p>Problem solved? Only if you really ejected the imposter. If not, they\u2019re going to keep on sabotaging and killing until you ID them and send them into space. If they do enough damage and your crew can\u2019t fix it in time, the imposter wins.<\/p>\n\n\n\n<p>Same thing with some kinds of malware. If you don\u2019t <a href=\"https:\/\/www.hostgator.com\/blog\/small-business-using-virus-removal-tool\/\">completely remove it<\/a> from every machine on your network, you and your colleagues are going keep taking damage. Your whole project might even fail. Ugh.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-use-your-security-tools\">Use your security tools<\/h2>\n\n\n\n<p>Even with an imposter on board, the other crewmates aren&#8217;t completely helpless. They have&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>vitals to see who\u2019s alive and who\u2019s been killed<\/li><li>cams to scan different areas of the ship<\/li><li>admin to see where each player is<\/li><li>logs to show you who\u2019s moving between checkpoints&nbsp;<\/li><\/ul>\n\n\n\n<p>Sometimes you can just straight up catch someone on cams killing a crewmate, which means you\u2019ve found your imposter and you can vote them off.&nbsp;<\/p>\n\n\n\n<p>More often, you have to do detective work and pull together info from logs, admin and cams to see who was where, when. To win, it really helps to have team members using each tool so there\u2019s continuous monitoring.&nbsp;<\/p>\n\n\n\n<p>The same idea is true for malware detection. You need <a href=\"https:\/\/www.hostgator.com\/blog\/benefits-using-website-security-checker\/\">continuous scans<\/a> to make sure that, for example, your site code hasn\u2019t been corrupted. You need scanning across your entire website, computer or network to make sure there\u2019s not trouble brewing in one area that can spread.&nbsp;<\/p>\n\n\n\n<p>You need <a href=\"https:\/\/www.hostgator.com\/blog\/setting-secure-password-remember\/\">good password hygiene<\/a> to make sure the people who log in to your site or system are who they say they are. And you need logs to show who\u2019s visited your site, who logged in, who tried to log in using fake credentials, when any changes were made to your code and what they were.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-among-us-is-a-fun-game-malware-not-so-much\">'\u02dcAmong Us\u2019&nbsp; is a fun game. Malware, not so much<\/h2>\n\n\n\n<p>When you\u2019re the imposter, you\u2019re trying to win through sabotage and murder. There\u2019s no other goal because it\u2019s just for fun.&nbsp;<\/p>\n\n\n\n<p>Cybersecurity isn\u2019t a game, though. If online imposters inject malware into your site, hijack your email domain to run phishing campaigns or hold your data hostage, it could take a lot of time and money to repair the damage.&nbsp;<\/p>\n\n\n\n<p>'\u02dcAmong Us\u2019&nbsp; kind of trains us to always check the behavior of things around us, whether that\u2019s fellow players on an alien ship or email messages and web forms that don\u2019t seem quite right.&nbsp;<\/p>\n\n\n\n<p>'\u02dcAmong Us\u2019&nbsp; also shows us how to use all the tools we have to spot threats early, before they take over our ship, our business or our home network.&nbsp;<\/p>\n\n\n\n<p>When we use cams and Admin to keep an eye on a fellow player who was being sus the past couple of meetings, we\u2019re doing a kind of threat detection. However, the internet is a lot bigger than just a spaceship and 10 crewmates.&nbsp;<\/p>\n\n\n\n<p>Outside the game, we can and should pay attention to odd files, messages and activity on our systems. But we also need help to scan for malware around the clock and eject it before it can sabotage our goals. That way we can get our tasks done-whatever they are-and win.<\/p>\n\n\n\n<p><em>Get the tools you need to keep malware from cutting into your gaming (and working) time. HostGator <a href=\"https:\/\/www.hostgator.com\/managed-wordpress-hosting\">Managed WordPress Hosting<\/a> packages include <a href=\"https:\/\/www.hostgator.com\/sitelock\">SiteLock Fix<\/a> to scan your site, screen your data and clean out any 'imposter'\u009d code.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article is part of HostGator\u2019s Web Pros Series. In this series, we feature articles from our team of experts&#8230;<\/p>\n","protected":false},"author":225,"featured_media":27293,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19],"tags":[104,137,120,140,121],"class_list":["post-27290","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-web-and-hosting-tips","tag-featured","tag-hostgator-web-pros","tag-shared-hosting","tag-website-security","tag-wordpress-hosting"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.2 (Yoast SEO v23.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>&#039;Among Us&#039; Imposters Show Why Malware Is So Hard to Spot - HostGator<\/title>\n<meta name=\"description\" content=\"Not sure how malware works or what to watch out for? Playing &#039;Among Us&#039; can help. You&#039;ll be a cyber security analyst in no time!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"&#039;Among Us&#039; Imposters Show Why Malware Is So Hard to Spot\" \/>\n<meta property=\"og:description\" content=\"Not sure how malware works or what to watch out for? Playing &#039;Among Us&#039; can help. You&#039;ll be a cyber security analyst in no time!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/\" \/>\n<meta property=\"og:site_name\" content=\"HostGator\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/HostGator\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-14T21:33:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-15T17:34:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hostgator.com\/blog\/wp-content\/\/uploads\/2020\/12\/What-Among-Us-can-teach-you-about-malware.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"629\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kevin Williams\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@HostGator\" \/>\n<meta name=\"twitter:site\" content=\"@HostGator\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kevin Williams\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/\"},\"author\":{\"name\":\"Kevin Williams\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/3e25067127e42447d75c51af36c97338\"},\"headline\":\"&#8216;Among Us&#8217; Imposters Show Why Malware Is So Hard to Spot\",\"datePublished\":\"2020-12-14T21:33:31+00:00\",\"dateModified\":\"2020-12-15T17:34:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/\"},\"wordCount\":1304,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2020\/12\/What-Among-Us-can-teach-you-about-malware.jpeg\",\"keywords\":[\"featured\",\"HostGator Web Pros\",\"Shared Hosting\",\"Website Security\",\"WordPress Hosting\"],\"articleSection\":[\"Web Hosting Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/\",\"url\":\"https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/\",\"name\":\"'Among Us' Imposters Show Why Malware Is So Hard to Spot - HostGator\",\"isPartOf\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2020\/12\/What-Among-Us-can-teach-you-about-malware.jpeg\",\"datePublished\":\"2020-12-14T21:33:31+00:00\",\"dateModified\":\"2020-12-15T17:34:58+00:00\",\"description\":\"Not sure how malware works or what to watch out for? Playing 'Among Us' can help. You'll be a cyber security analyst in no time!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/#primaryimage\",\"url\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2020\/12\/What-Among-Us-can-teach-you-about-malware.jpeg\",\"contentUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2020\/12\/What-Among-Us-can-teach-you-about-malware.jpeg\",\"width\":1200,\"height\":629,\"caption\":\"What Among Us can teach you about malware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.hostgator.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"&#8216;Among Us&#8217; Imposters Show Why Malware Is So Hard to Spot\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#website\",\"url\":\"https:\/\/www.hostgator.com\/blog\/\",\"name\":\"HostGtaor\",\"description\":\"Web Hosting and Marketing Tips for Entrepreneurs\",\"publisher\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.hostgator.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#organization\",\"name\":\"HostGtaor\",\"url\":\"https:\/\/www.hostgator.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png\",\"contentUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png\",\"width\":1092,\"height\":215,\"caption\":\"HostGtaor\"},\"image\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/HostGator\",\"https:\/\/x.com\/HostGator\",\"https:\/\/www.instagram.com\/hostgator\",\"https:\/\/www.linkedin.com\/company\/hostgator-com\",\"https:\/\/www.pinterest.com\/hostgator\/\",\"https:\/\/www.youtube.com\/user\/hostgator\"],\"email\":\"support@gator.com\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/3e25067127e42447d75c51af36c97338\",\"name\":\"Kevin Williams\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2aef1fb4fec4b01fffc31b2e5b843bfd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2aef1fb4fec4b01fffc31b2e5b843bfd?s=96&d=mm&r=g\",\"caption\":\"Kevin Williams\"},\"description\":\"Kevin Williams is part of HostGator\u00e2\u20ac\u2122s social media team, where he\u00e2\u20ac\u2122s like our go-to resident nerdy-tech guy. But he was once that guy answering the phones on our support staff. When he\u00e2\u20ac\u2122s not playing the voice of Snappy on social, Kevin is reading, hiking, building PCs, and playing videos games. You know, the stuff that makes him our resident nerdy-tech guy.\",\"url\":\"https:\/\/www.hostgator.com\/blog\/author\/kevin-williams\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"'Among Us' Imposters Show Why Malware Is So Hard to Spot - HostGator","description":"Not sure how malware works or what to watch out for? Playing 'Among Us' can help. You'll be a cyber security analyst in no time!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/","og_locale":"en_US","og_type":"article","og_title":"'Among Us' Imposters Show Why Malware Is So Hard to Spot","og_description":"Not sure how malware works or what to watch out for? Playing 'Among Us' can help. You'll be a cyber security analyst in no time!","og_url":"https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/","og_site_name":"HostGator","article_publisher":"https:\/\/www.facebook.com\/HostGator","article_published_time":"2020-12-14T21:33:31+00:00","article_modified_time":"2020-12-15T17:34:58+00:00","og_image":[{"width":1200,"height":629,"url":"https:\/\/www.hostgator.com\/blog\/wp-content\/\/uploads\/2020\/12\/What-Among-Us-can-teach-you-about-malware.jpeg","type":"image\/jpeg"}],"author":"Kevin Williams","twitter_card":"summary_large_image","twitter_creator":"@HostGator","twitter_site":"@HostGator","twitter_misc":{"Written by":"Kevin Williams","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/#article","isPartOf":{"@id":"https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/"},"author":{"name":"Kevin Williams","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/3e25067127e42447d75c51af36c97338"},"headline":"&#8216;Among Us&#8217; Imposters Show Why Malware Is So Hard to Spot","datePublished":"2020-12-14T21:33:31+00:00","dateModified":"2020-12-15T17:34:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/"},"wordCount":1304,"commentCount":0,"publisher":{"@id":"https:\/\/www.hostgator.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2020\/12\/What-Among-Us-can-teach-you-about-malware.jpeg","keywords":["featured","HostGator Web Pros","Shared Hosting","Website Security","WordPress Hosting"],"articleSection":["Web Hosting Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/","url":"https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/","name":"'Among Us' Imposters Show Why Malware Is So Hard to Spot - HostGator","isPartOf":{"@id":"https:\/\/www.hostgator.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/#primaryimage"},"image":{"@id":"https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2020\/12\/What-Among-Us-can-teach-you-about-malware.jpeg","datePublished":"2020-12-14T21:33:31+00:00","dateModified":"2020-12-15T17:34:58+00:00","description":"Not sure how malware works or what to watch out for? Playing 'Among Us' can help. You'll be a cyber security analyst in no time!","breadcrumb":{"@id":"https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/#primaryimage","url":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2020\/12\/What-Among-Us-can-teach-you-about-malware.jpeg","contentUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2020\/12\/What-Among-Us-can-teach-you-about-malware.jpeg","width":1200,"height":629,"caption":"What Among Us can teach you about malware"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hostgator.com\/blog\/malware-explained-among-us\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hostgator.com\/blog\/"},{"@type":"ListItem","position":2,"name":"&#8216;Among Us&#8217; Imposters Show Why Malware Is So Hard to Spot"}]},{"@type":"WebSite","@id":"https:\/\/www.hostgator.com\/blog\/#website","url":"https:\/\/www.hostgator.com\/blog\/","name":"HostGtaor","description":"Web Hosting and Marketing Tips for Entrepreneurs","publisher":{"@id":"https:\/\/www.hostgator.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hostgator.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hostgator.com\/blog\/#organization","name":"HostGtaor","url":"https:\/\/www.hostgator.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png","contentUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png","width":1092,"height":215,"caption":"HostGtaor"},"image":{"@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/HostGator","https:\/\/x.com\/HostGator","https:\/\/www.instagram.com\/hostgator","https:\/\/www.linkedin.com\/company\/hostgator-com","https:\/\/www.pinterest.com\/hostgator\/","https:\/\/www.youtube.com\/user\/hostgator"],"email":"support@gator.com"},{"@type":"Person","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/3e25067127e42447d75c51af36c97338","name":"Kevin Williams","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2aef1fb4fec4b01fffc31b2e5b843bfd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2aef1fb4fec4b01fffc31b2e5b843bfd?s=96&d=mm&r=g","caption":"Kevin Williams"},"description":"Kevin Williams is part of HostGator\u00e2\u20ac\u2122s social media team, where he\u00e2\u20ac\u2122s like our go-to resident nerdy-tech guy. But he was once that guy answering the phones on our support staff. When he\u00e2\u20ac\u2122s not playing the voice of Snappy on social, Kevin is reading, hiking, building PCs, and playing videos games. You know, the stuff that makes him our resident nerdy-tech guy.","url":"https:\/\/www.hostgator.com\/blog\/author\/kevin-williams\/"}]}},"_links":{"self":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts\/27290"}],"collection":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/users\/225"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/comments?post=27290"}],"version-history":[{"count":2,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts\/27290\/revisions"}],"predecessor-version":[{"id":27297,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts\/27290\/revisions\/27297"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/media\/27293"}],"wp:attachment":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/media?parent=27290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/categories?post=27290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/tags?post=27290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}