Overview
- A Reddit user and German tech site Igor’s Lab confirmed that Endgame Gear’s official CDN hosted the OP1w 4K V2 configuration tool infected with the XRed remote-access trojan from July 2 to July 17
- Endgame Gear issued a public apology on July 23 and immediately replaced the compromised file with a clean version once the breach was identified
- Broadcom analysis shows XRed can harvest system information, maintain persistence through hidden folders and registry keys, and propagate via USB drives
- The incident spotlights growing supply-chain risks in gaming hardware software distribution and the vital role of community detection when vendor safeguards fail
- Endgame Gear has vowed to implement enhanced security protocols and industry observers continue to monitor for any lingering impacts