A configuration utility designed for an Endgame Gear gaming mouse was recently found to have been compromised with malware, raising concerns among users and prompting a swift response from the company.
Endgame Gear issued a public alert on Wednesday after a customer flagged suspicious activity related to the configuration tool for the OP1w 4k v2 mouse. The user had downloaded the software directly from Endgame Gear’s official site, only to discover it was laced with Xred—a Windows-based malware known for creating backdoors, stealing user data, and executing further malicious payloads on infected systems.
The malware was active on the product page between June 26 and July 9, according to Endgame Gear. “We have since removed the infected file,” the company stated, emphasizing that “this issue was isolated to the OP1w 4k v2 product page download only.”
While it’s still unclear how the malware infiltrated the page, Endgame Gear insists its file servers remain uncompromised and no customer data has been accessed. An internal investigation is ongoing to determine whether this was an isolated incident or part of a broader breach.
The compromised tool came to light when a Reddit user warned others, stating: “This did not come from a sketchy site or a th
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents
Read the original article: