
Endgame Gear has disclosed a security incident involving a malware-infected version of its configuration software for the OP1w 4k v2 wireless gaming mouse.
The compromised installer was available on a specific product page between June 26 and July 9, 2025, before it was removed.
The issue came to light after community discussions prompted the company to investigate, ultimately leading to the discovery of the malware-laced installer. The affected file was distributed exclusively through the product page at www.endgamegear.com/gaming-mice/op1w-4k-v2, and did not impact other distribution channels such as Endgame Gear's main Downloads page, GitHub repository, or Discord server.

Endgame Gear, a Berlin-based gaming peripherals manufacturer known for its high-performance mice and keyboards tailored to esports and competitive gamers, emphasized that the breach did not involve a compromise of its file servers. Additionally, no customer data was accessed or exposed during the incident.
The infected file, “Endgame Gear OP1w 4k v2 Configuration Tool v1.00.exe,” can be identified by its abnormal size (approximately 2.8MB unzipped, versus the legitimate 2.3MB) and metadata showing “Synaptics Pointing Device Driver” as the product name. Affected systems may also contain a suspicious folder at C:\ProgramData\Synaptics; users are advised to manually delete if present.
The malware's exact capabilities and infection vector remain under investigation. Meanwhile, Endgame Gear has taken several steps to prevent future incidents, including scanning all hosted files for malware, extending checks across its hosting infrastructure, and phasing out product-specific downloads in favor of a centralized and monitored Downloads page. In addition, integrity verification mechanisms, such as SHA hash values, are being introduced for all software, while digital signatures will soon be applied to all distributed executables to ensure authenticity.
Users who downloaded the tool during the affected period are urged to check the file size and metadata as described above, and delete the installer if it matches the infected characteristics. Then, remove the hidden C:\ProgramData\Synaptics folder, if it exists, and run a full antivirus scan using reputable security software. Finally, re-download the clean version from endgamegear.com/downloads.
Leave a Reply