Particle.news

Download on the App Store

Endgame Gear Replaces XRed-Infected Mouse Configuration Tool and Issues Apology

The gaming peripheral maker says no customer data was compromised, pledging tighter supply-chain security after a two-week malware breach

Image
blank
Image
An Endgame Gear OP1w 4K gaming mouse on a desk.

Overview

  • A Reddit user and German tech site Igor’s Lab confirmed that Endgame Gear’s official CDN hosted the OP1w 4K V2 configuration tool infected with the XRed remote-access trojan from July 2 to July 17
  • Endgame Gear issued a public apology on July 23 and immediately replaced the compromised file with a clean version once the breach was identified
  • Broadcom analysis shows XRed can harvest system information, maintain persistence through hidden folders and registry keys, and propagate via USB drives
  • The incident spotlights growing supply-chain risks in gaming hardware software distribution and the vital role of community detection when vendor safeguards fail
  • Endgame Gear has vowed to implement enhanced security protocols and industry observers continue to monitor for any lingering impacts