ThreatCluster
  • Feed
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Cluster #1385

Hackers Compromised Official Gaming Mouse Software to Deliver Windows-based Xred Malware

Threat Score:
69
2 articles
95.0% similarity
18 hours ago
JSON CSV Text STIX IoCs
Splunk Elastic Sentinel Sigma YARA All Queries

Activity Timeline

2 articles
Click to navigate
Jul 26
Jul 26
Oldest
Latest

Key Insights

1
Endgame Gear's OP1w 4K V2 mouse configuration tool was compromised, distributing Xred malware to users between June 26 and July 9, 2025.
2
The malware infection was limited to the OP1w 4K V2 product page, with no other products or customer data affected.
3
Endgame Gear has issued a security advisory and implemented immediate remediation measures, including enhanced security protocols.
4
Users who downloaded the infected software are urged to uninstall it immediately and run antivirus scans to detect and remove Xred malware.

Threat Overview

Hackers compromised the official software distribution system of gaming peripheral manufacturer Endgame Gear, infecting the OP1w 4K V2 mouse configuration tool with Xred malware from June 26 to July 9, 2025. This incident specifically targeted users who downloaded the tool, posing a risk of malware infection without affecting other products or customer data [1][2]. Endgame Gear has responded with a security advisory and remediation measures, urging affected users to uninstall the tool and perform antivirus scans [1][2]. Immediate actions include monitoring for unusual system behavior and ensuring antivirus definitions are up to date to detect Xred malware [1].

Tactics, Techniques & Procedures (TTPs)

T1193
Spearphishing Link - Malware distributed via compromised software download links [1][2]
T1203
Exploitation for Client Execution - Users executing malware unknowingly by installing infected software [1][2]
T1071.001
Application Layer Protocol: Web Protocols - Use of web-based distribution channels for malware [1][2]
T1499
Endpoint Denial of Service - Potential for malware to disrupt system functionality [1][2]

Timeline of Events

2025-06-26
Malware distribution begins via compromised OP1w 4K V2 configuration tool [1][2]
2025-07-09
Malware distribution ends; infected software remains available for download [1][2]
2025-07-26
Endgame Gear publicly discloses the breach and issues a security advisory [1][2]
Powered by ThreatCluster AI
Generated 17 hours ago
Recent Analysis
AI analysis may contain inaccuracies

Related Articles

2 articles
1

Hackers Compromised Official Gaming Mouse Software to Deliver Windows-based Xred Malware

Cybersecurity News • 20 hours ago

Gaming peripheral manufacturer Endgame Gear has confirmed that hackers successfully compromised its official software distribution system, using the company’s OP1w 4K V2 mouse configuration tool to spread dangerous Xred malware to unsuspecting customers for nearly two weeks. The security breach, which occurred between June 26 and July 9, 2025, represents a troubling example of supply […]

Score
59
99.0% similarity
Read more
2

Hackers Exploit Official Gaming Mouse Software to Spread Windows-based Xred Malware

GB Hackers • 18 hours ago

Hackers Exploit Official Gaming Mouse Software to Spread Windows-based Xred Malware Gaming peripheral manufacturer Endgame Gear has disclosed asecurity incidentinvolving malware-infected software distributed through their official website, affecting users who downloaded the OP1w 4k v2 mouse configuration tool between June 26 and July 9, 2025. The company has issued an urgent security advisory and implemented immediate remediation measures while the investigation into the breach continues. Key Ta

Score
56
99.0% similarity
Read more

Save to Folder

Choose a folder to save this cluster:

Cluster Intelligence

Key entities and indicators for this cluster

PLATFORMS
Windows
Azure
AWS
Linux
VMware ESXi
COMPANIES
Microsoft
Google
Apple
VMware
Amazon
ATTACK TYPES
Ransomware
INDUSTRIES
Banking
Education
VULNERABILITIES
DoS
DDoS
SECURITY VENDORS
Cloudflare
RANSOMWARE
Zlader
DN
Korean
shadow
gunra
MALWARE
Dark
DOMAINS
endgamegear.com
FILE PATH
C:\ProgramData\Synaptics” folder if present.
EMAIL
[email protected]
CLUSTER INFORMATION
Cluster #1385
Created 18 hours ago
Semantic Algorithm