Gaming Mouse Maker's Site Was Infiltrated by Malware for Weeks
Hardware/Software

Gaming Mouse Maker's Site Was Infiltrated by Malware for Weeks

Malicious software was reportedly hosted for two weeks on the website of a gaming mouse manufacturer, compromising users' systems.

The configuration tool for the Endgame Gear OP1w 4K V2 has been linked to malware since July 2, 2025. Reports from Igor’s Lab revealed that the software had been compromised with XRed malware for at least two weeks.

According to discussions in the MouseReview subreddit, the infected file was hosted on the official site, making it particularly alarming. The first acknowledgement of the issue was made on Reddit by user Admirable-Raccoon597, who pointed out that the trojanized file was likely delivered from the company’s content delivery network (CDN).

“This clearly shows the vendor’s download path changed sometime between July 2nd and 17th, and the earlier version was infected. It came from their official CDN, not a third-party mirror.”
Translation: Esto demuestra claramente que la ruta de descarga del proveedor cambió en algún momento entre el 2 y el 17 de julio, y la versión anterior estaba infectada. Provino de su CDN oficial, no de un espejo de terceros.

The malware has remote access capabilities, allowing unauthorized individuals to control infected computers. Users are advised to check for signs of infection in the C:\ProgramData\Synaptics folder. Typically, the malware resides as Synaptics.exe.

For a situation where security is paramount, ensure that your antivirus software is activated, as many detected the malware quickly during the exposure period.

Next article

Ubisoft's Executive Claims Star Wars Outlaws Struggled Due to Brand Fatigue

Newsletter

Get the most talked about stories directly in your inbox

Every week we share the most relevant news in tech, culture, and entertainment. Join our community.

Your privacy is important to us. We promise not to send you spam!