- ENDGAME GEAR -SOFTWARE that was hijacked to serve malware
- Attacked stained by the company’s community
- Endgame makes significant changes to prevent repeated occurrences
Gaming Kit Maker Endgame Gear has confirmed that it was the victim of a supply chain attack that so unidentified threat actors break into his site and replace a legitimate configuration tool with a trojanized version containing malware.
In a message published on the company’s site, it said on June 26, 2025, someone managed to replace a version of the configuration tool for Endgame Gear Op1W 4K V2 Wireless Mouse found on its product page with a malicious fraud.
The painted version remained on the spot until July 9 when it was removed.
Hiding the attack in plain sight
Malware acts as an infoTealer, so users should also change their passwords, especially for important accounts such as banking, work, social media, e -mail and the like.
The company did not discuss how the threat actors broke in or who they were, but emphasized the Trojanized version was found only on the product page of the specific peripheral, while the versions found on the downloads -the website, GitHub or Discord remained clean.
Software for other peripheral devices was also not targeted.
Endgame said it only discovered the penetration after seeing “online discussions”, which means it was the community that marked the attack.
A more thorough analysis has shown that access to file servers was not compromised and customer data did not become access to.
To prevent similar events from happening in the future, killing Endgame product-specific downloads and centralizing all downloads on its most important download page.
In addition, it implements additional malware scans and strengthens protection against malware on its hosting servers.
Users who downloaded malware are advised to remove it and check for the presence of the “C: Program Data Synaptics” folder (it could be hidden).
They also need to run a complete system scan and download a clean version.
Via Bleeping computer



