{"id":68230,"date":"2025-10-15T14:34:11","date_gmt":"2025-10-15T19:34:11","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=68230"},"modified":"2025-10-15T14:34:12","modified_gmt":"2025-10-15T19:34:12","slug":"gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\/","title":{"rendered":"Gaming Cheats Are the New Cyber Threat: Insights from a Cybersecurity Expert"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">A Growing Danger Behind Online Gaming<\/h2>\n\n\n\n<p>Cheating in video games once meant faster reloads or infinite lives. Today, it\u2019s a gateway to cybercrime. What began as a gaming shortcut has evolved into a serious cybersecurity threat, according to penetration tester and researcher <strong>Jace Randolph<\/strong>.<\/p>\n\n\n\n<p>\u201cCheating at video games has become an attack surface that can no longer be ignored because it\u2019s not just cheating at games anymore,\u201d Randolph said. \u201cThe data being siphoned off these networks\u2014home, business, even government\u2014is staggering.\u201d<\/p>\n\n\n\n<p>In a recent interview with <strong>Corey Munson of PC Matic<\/strong>, Randolph described how cheat software is now being used to bypass antivirus protection, capture network traffic, and steal sensitive data.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">How Game Cheats Became Malware<\/h2>\n\n\n\n<p>Randolph\u2019s research began after he noticed a discussion about <strong>Direct Memory Access (DMA)<\/strong> in the gaming community. \u201cDirect memory access is something that\u2019s hardware-based,\u201d he said. \u201cI\u2019m really big into hacking hardware and pen testing devices, so I wanted to learn more.\u201d<\/p>\n\n\n\n<p>That curiosity led him into underground forums where cheat developers and users collaborate. \u201cI started realizing there\u2019s an entire attack surface I\u2019d never considered,\u201d he explained.<\/p>\n\n\n\n<p>Installing these cheats often requires disabling critical security features. \u201cMost come with a manual,\u201d Randolph said. \u201cIt walks you through turning off Secure Boot, disabling MMU for DMA, or changing PCIe generation settings. We\u2019re talking kernel-level access.\u201d<\/p>\n\n\n\n<p>Once those protections are removed, the system becomes wide open. \u201cThe one machine that has turned all this off and has kernel access is now probing the network and seeing all the traffic going across,\u201d he said. \u201cThere\u2019s nothing a VPN or tunnel can do at that point because it\u2019s operating before encryption.\u201d<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">An Underground Business Built on Cheats<\/h2>\n\n\n\n<p>What Randolph found wasn\u2019t a loose group of hobbyists but a sophisticated supply chain. \u201cThere are three tiers,\u201d he said. \u201cDevelopers create the cheats, resellers market them through Discord, Telegram, and WhatsApp, and users sit at the bottom.\u201d<\/p>\n\n\n\n<p>Resellers treat cheating like a business. \u201cThey\u2019re dealing in crypto, using offshore accounts, building shell companies,\u201d Randolph said. \u201cThey even hire ad specialists. It\u2019s organized and profitable.\u201d<\/p>\n\n\n\n<p>Cheat advertising is aggressive and targeted. \u201cType in \u2018I want to get better at Call of Duty,\u2019 and you\u2019ll be flooded with offers to download hacks,\u201d he said. \u201cThat\u2019s how quickly someone can fall into it.\u201d<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Lateral Movement: One Device Infects Them All<\/h2>\n\n\n\n<p>Randolph\u2019s experiments confirmed how easily one infected computer can compromise an entire network. \u201cI\u2019m still seeing contamination at the network level from a single, non-associated device,\u201d he said. \u201cAntivirus can be bypassed because the system has kernel access.\u201d<\/p>\n\n\n\n<p>That infection can spread to work computers, phones, and IoT devices on the same Wi-Fi. \u201cIt\u2019s not as simple as it used to be,\u201d he warned. \u201cIf one person in the household cheats and connects that system, everything on that network is exposed.\u201d<\/p>\n\n\n\n<p>For small businesses, the risk multiplies under <strong>bring-your-own-device (BYOD)<\/strong> policies. \u201cIf an employee cheats on a personal laptop and then connects that device to the company network,\u201d Randolph said, \u201cthat infection can move laterally into corporate systems. And yes, this has already happened.\u201d<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">The Role of AI and Cryptocurrency<\/h2>\n\n\n\n<p>Automation has accelerated the problem. \u201cWhat AI is doing is speeding up distribution,\u201d Randolph said. \u201cIt allows cheat developers to manufacture and spread their tools faster.\u201d<\/p>\n\n\n\n<p>He added that some use machine learning to analyze stolen data and improve detection evasion. \u201cThere are servers taking in information collected from these cheats at scale,\u201d he said. \u201cThat data is then used to refine future exploits.\u201d<\/p>\n\n\n\n<p>At the same time, infected systems are being hijacked for cryptocurrency mining. \u201cA lot of host machines are taken over,\u201d Randolph noted. \u201cThey\u2019re mining off your computer and using your hardware\u2014and that\u2019s the least of your worries.\u201d<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Practical Steps for Families and Small Businesses<\/h2>\n\n\n\n<p>Randolph\u2019s advice for parents is straightforward. \u201cBe involved,\u201d he said. \u201cGaming has become a babysitter for kids. The best thing I ever did was play alongside mine.\u201d<\/p>\n\n\n\n<p>For small and midsize businesses, the same principle applies: separate work and personal systems, keep software up to date, and block unauthorized applications. \u201cIf I owned a small business and employees worked remotely,\u201d he said, \u201cI\u2019d invest in private network access for each one. Compare that cost to what a ransom could cost you.\u201d<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">A Cultural Problem Demanding Awareness<\/h2>\n\n\n\n<p>Randolph believes the challenge is as much cultural as it is technical. \u201cGame publishers are doing what they can,\u201d he said, \u201cbut unless there\u2019s some form of legal deterrent against developing and distributing cheats, this will continue to grow.\u201d<\/p>\n\n\n\n<p>He sees cheating culture as a training ground for more serious cybercrime. \u201cIf we don\u2019t start recognizing how far this has evolved,\u201d he warned, \u201cit\u2019s only going to get harder to stop.\u201d<\/p>\n\n\n\n<p>The message for families and organizations is clear: <strong>cybersecurity begins with awareness and control over what runs in your environment.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Growing Danger Behind Online Gaming Cheating in video games once meant faster reloads or infinite lives. Today, it\u2019s a gateway to cybercrime. What began as a gaming shortcut has evolved into a serious cybersecurity threat, according to penetration tester and researcher Jace Randolph. \u201cCheating at video games has become an attack surface that can [&hellip;]<\/p>\n","protected":false},"author":83,"featured_media":68223,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[6223],"tags":[],"class_list":["post-68230","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-scam-alert"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Gaming Cheats Are the New Cyber Threat: Insights from a Cybersecurity Expert<\/title>\n<meta name=\"description\" content=\"A Growing Danger Behind Online Gaming Cheating in video games once meant faster reloads or infinite lives. Today, it\u2019s a gateway to cybercrime. What began\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gaming Cheats Are the New Cyber Threat: Insights from a Cybersecurity Expert\" \/>\n<meta property=\"og:description\" content=\"A Growing Danger Behind Online Gaming Cheating in video games once meant faster reloads or infinite lives. Today, it\u2019s a gateway to cybercrime. What began\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-15T19:34:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-15T19:34:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-1-18.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"506\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jessica Molden\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Molden\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\\\/\"},\"author\":{\"name\":\"Jessica Molden\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\"},\"headline\":\"Gaming Cheats Are the New Cyber Threat: Insights from a Cybersecurity Expert\",\"datePublished\":\"2025-10-15T19:34:11+00:00\",\"dateModified\":\"2025-10-15T19:34:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\\\/\"},\"wordCount\":842,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-1-18.jpg\",\"articleSection\":[\"Scam Alert\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\\\/\",\"name\":\"Gaming Cheats Are the New Cyber Threat: Insights from a Cybersecurity Expert\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-1-18.jpg\",\"datePublished\":\"2025-10-15T19:34:11+00:00\",\"dateModified\":\"2025-10-15T19:34:12+00:00\",\"description\":\"A Growing Danger Behind Online Gaming Cheating in video games once meant faster reloads or infinite lives. Today, it\u2019s a gateway to cybercrime. What began\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-1-18.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-1-18.jpg\",\"width\":900,\"height\":506},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gaming Cheats Are the New Cyber Threat: Insights from a Cybersecurity Expert\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\",\"name\":\"Jessica Molden\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/jmolden\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gaming Cheats Are the New Cyber Threat: Insights from a Cybersecurity Expert","description":"A Growing Danger Behind Online Gaming Cheating in video games once meant faster reloads or infinite lives. Today, it\u2019s a gateway to cybercrime. What began","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\/","og_locale":"en_US","og_type":"article","og_title":"Gaming Cheats Are the New Cyber Threat: Insights from a Cybersecurity Expert","og_description":"A Growing Danger Behind Online Gaming Cheating in video games once meant faster reloads or infinite lives. Today, it\u2019s a gateway to cybercrime. What began","og_url":"https:\/\/www.pcmatic.com\/blog\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2025-10-15T19:34:11+00:00","article_modified_time":"2025-10-15T19:34:12+00:00","og_image":[{"width":900,"height":506,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-1-18.jpg","type":"image\/jpeg"}],"author":"Jessica Molden","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Jessica Molden","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\/"},"author":{"name":"Jessica Molden","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700"},"headline":"Gaming Cheats Are the New Cyber Threat: Insights from a Cybersecurity Expert","datePublished":"2025-10-15T19:34:11+00:00","dateModified":"2025-10-15T19:34:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\/"},"wordCount":842,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-1-18.jpg","articleSection":["Scam Alert"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\/","url":"https:\/\/www.pcmatic.com\/blog\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\/","name":"Gaming Cheats Are the New Cyber Threat: Insights from a Cybersecurity Expert","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-1-18.jpg","datePublished":"2025-10-15T19:34:11+00:00","dateModified":"2025-10-15T19:34:12+00:00","description":"A Growing Danger Behind Online Gaming Cheating in video games once meant faster reloads or infinite lives. Today, it\u2019s a gateway to cybercrime. What began","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-1-18.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-1-18.jpg","width":900,"height":506},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/gaming-cheats-are-the-new-cyber-threat-insights-from-a-cybersecurity-expert\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Gaming Cheats Are the New Cyber Threat: Insights from a Cybersecurity Expert"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700","name":"Jessica Molden","url":"https:\/\/www.pcmatic.com\/blog\/author\/jmolden\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/68230","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=68230"}],"version-history":[{"count":1,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/68230\/revisions"}],"predecessor-version":[{"id":68231,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/68230\/revisions\/68231"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/68223"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=68230"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=68230"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=68230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}