{"id":24648,"date":"2025-09-18T07:55:58","date_gmt":"2025-09-18T11:55:58","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=24648"},"modified":"2026-04-08T18:46:28","modified_gmt":"2026-04-08T14:46:28","slug":"gamer-malware-endgame-gear-steam-minecraft","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/gamer-malware-endgame-gear-steam-minecraft\/24648\/","title":{"rendered":"Gamers under fire: malware on official websites"},"content":{"rendered":"<p>Experienced gamers are well aware of the risks of downloading games, mods, skins, and other gaming software from unofficial sources. However, infections can also originate from platforms users typically trust \u2014 developer websites and official stores.<\/p>\n<p>In this post, we review several cases where attackers distributed malware through official gaming resources. We also explain how to protect your system, loot, and account \u2014 so you can keep playing on your favorite platforms without any nasty surprises.<\/p>\n<h2>Infected Endgame Gear mouse-configuration tool<\/h2>\n<p>In July 2025, <strong>Endgame Gear<\/strong>, a manufacturer of advanced mice aimed at esports players and seasoned gamers, reported a malware infection in its <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/endgame-gear-mouse-config-tool-infected-users-with-malware\/\" target=\"_blank\" rel=\"nofollow noopener\">OP1w 4k v2 mouse-config utility<\/a>. The Trojan remained on the company\u2019s official site for almost two weeks, from June 26 to July 9, 2025.<\/p>\n<p><\/p><div id=\"attachment_54340\" style=\"width: 2886px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/09\/18155741\/gamer-malware-endgame-gear-steam-minecraft-1.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-54340\" class=\"size-full wp-image-54340\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/09\/18155741\/gamer-malware-endgame-gear-steam-minecraft-1.jpg\" alt=\"Endgame Gear OP1w 4k v2 \u2014 the gaming mouse whose configuration utility was infected \" width=\"2876\" height=\"1470\"><\/a><p id=\"caption-attachment-54340\" class=\"wp-caption-text\">The official page for the Endgame Gear OP1w 4k v2 mouse hosted a malware-infected setup tool. <a href=\"https:\/\/www.endgamegear.com\/en-us\/gaming-mice\/op1w-4k-v2?attribute%5Bcolor%5D=White\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>As a result, users who downloaded the utility from the product page during that period also received malware with it. <strong>Endgame Gear<\/strong> did not specify what the malicious payload was, but user-scan data suggests it was an <strong>XRed<\/strong> backdoor.\n<p><strong>XRed<\/strong> offers a wide range of capabilities for remote control of infected systems. These include a keylogger and enables attackers to access the command line, browse disks and folders, download and delete files, and take screenshots. <strong>XRed<\/strong> can also download additional modules and exfiltrate system data to remote servers.<\/p>\n<p>It was gamers themselves who first noticed something was wrong with the <strong>OP1w 4k v2<\/strong> configuration tool. They began <a href=\"https:\/\/www.reddit.com\/r\/EndGameGear\/comments\/1m29q06\/security_alert_endgame_gears_op1w_4k_v2\/\" target=\"_blank\" rel=\"nofollow noopener\">discussing suspicious signs on Reddit<\/a> nearly two weeks before <strong>Endgame Gear<\/strong> released an official statement. The key details that raised user suspicions were the size of the program \u2014 the infected version was 2.8MB instead of the usual 2.3MB \u2014 and the file signature, listed as \u201cSynaptics Pointing Device Driver\u201d instead of \u201cEndgame Gear OP1w 4k v2 Configuration Tool\u201d.<\/p>\n<p>In its <a href=\"https:\/\/www.endgamegear.com\/security-update\" target=\"_blank\" rel=\"nofollow noopener\">official statement on the incident<\/a>, <strong>Endgame Gear<\/strong> clarified that users who downloaded the tool from the general downloads page (<em>endgamegear.com\/downloads<\/em>), GitHub, or the company\u2019s Discord channel are safe. The threat only affected gamers who downloaded software directly from the <strong>OP1w 4k v2<\/strong> product page between June 26 and July 9, 2025. After that, the malware was removed from the company\u2019s site.<\/p>\n<p>The mouse manufacturer recommends the following steps for any potentially affected users:<\/p>\n<ul>\n<li>Delete all contents of the folder <em>C:ProgramDataSynaptics<\/em>.<\/li>\n<li>Run a full system scan with a <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">reliable antivirus<\/a>.<\/li>\n<li>Download a clean version of the utility.<\/li>\n<\/ul>\n<p>In addition, users should change passwords for all important accounts, including financial services, email, and work-related logins.<\/p>\n<h2>Malware in three early-access Steam games<\/h2>\n<p>In 2025, several cases were reported of malware being distributed through early-access games on Steam.<\/p>\n<ul>\n<li>In February, this involved <strong>PirateFi<\/strong>, a survival sim (we <a href=\"https:\/\/www.kaspersky.com\/blog\/games-with-trojans-in-steam\/53038\/\" target=\"_blank\" rel=\"noopener nofollow\">covered<\/a> this case on the Kaspersky Daily blog).<\/li>\n<li>In March, a similar incident occurred with the tactical shooter <strong>Sniper: Phantom\u2019s Resolution<\/strong>.<\/li>\n<li>In July, attackers uploaded an infected version of <strong>Chemia<\/strong>, another survival game.<\/li>\n<\/ul>\n<p>All three cases involved early-access titles \u2014 likely because Steam applies looser verification procedures for pre-release games. Let\u2019s take a closer look at these three cases.<\/p>\n<p>A few days after the beta release of <strong>PirateFi<\/strong> \u2014 the first game developed by a studio called <strong>Seaworth Interactive<\/strong> \u2014 one user reported on a Steam forum that his antivirus had prevented the game from launching. The security software <a href=\"https:\/\/steamcommunity.com\/discussions\/forum\/26\/595140423952896647\/\" target=\"_blank\" rel=\"nofollow noopener\">detected<\/a> the presence of <em>Trojan.Win32.Lazzzy.gen<\/em> malware, which the game attempted to install in the <em>AppData\/Temp<\/em> directory after launch.<\/p>\n<div id=\"attachment_54343\" style=\"width: 910px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/09\/18155744\/gamer-malware-endgame-gear-steam-minecraft-2-2.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-54343\" class=\"size-full wp-image-54343\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/09\/18155744\/gamer-malware-endgame-gear-steam-minecraft-2-2.jpg\" alt=\"PirateFi: a malicious game on Steam \" width=\"900\" height=\"506\"><\/a><p id=\"caption-attachment-54343\" class=\"wp-caption-text\">PirateFi promised players a pirate-themed survival sim, but in reality it stole browser cookies to hijack accounts. <a href=\"https:\/\/www.kaspersky.com\/blog\/games-with-trojans-in-steam\/53038\/\" target=\"_blank\" rel=\"noopener nofollow\">Source<\/a><\/p><\/div>\n<p>The Trojan\u2019s primary goal was to steal browser cookies. These cookies allowed the attackers to <a href=\"https:\/\/www.kaspersky.com\/blog\/types-of-cookie-files-and-how-to-protect-them\/54243\/\" target=\"_blank\" rel=\"noopener nofollow\">access victims\u2019 accounts<\/a> for financial services, social networks, and other online platforms. Several players who downloaded and ran the game reported that the criminals changed the passwords on their accounts and stole funds. <strong>PirateFi<\/strong> was pulled from Steam just four days after release. All users who had downloaded the game \u2014 fortunately, only around 800 people \u2014 <a href=\"https:\/\/x.com\/SteamDB\/status\/1889610974484705314\" target=\"_blank\" rel=\"nofollow noopener\">received an official notification from the platform<\/a> warning them of the malware on their devices.<\/p>\n<div id=\"attachment_54345\" style=\"width: 1486px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/09\/18155747\/gamer-malware-endgame-gear-steam-minecraft-3-1.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-54345\" class=\"size-full wp-image-54345\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/09\/18155747\/gamer-malware-endgame-gear-steam-minecraft-3-1.jpg\" alt=\"Steam warning players about PirateFi \" width=\"1476\" height=\"1492\"><\/a><p id=\"caption-attachment-54345\" class=\"wp-caption-text\">Steam users who downloaded the infected PirateFi game were warned of malware on their devices. <a href=\"https:\/\/x.com\/SteamDB\/status\/1889610974484705314\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>Just a month later, a similar situation <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/steam-pulls-game-demo-infecting-windows-with-info-stealing-malware\/\" target=\"_blank\" rel=\"nofollow noopener\">occurred<\/a> with another game \u2014 <strong>Sniper: Phantom\u2019s Resolution<\/strong> by <strong>Sierra Six Studios<\/strong>. Once again, players were the first to suspect something was wrong: they noticed that the game\u2019s description and screenshots were clearly copied from other projects. Another red flag was the developer\u2019s offering a demo installer hosted on an external GitHub repository rather than through Steam.<\/p>\n<p>Further examination of the installer\u2019s code by Reddit users <a href=\"https:\/\/www.reddit.com\/r\/pcgaming\/comments\/1jd12u3\/game_listed_on_steam_has_a_demo_that_is_a_virus\/?rdt=34227\" target=\"_blank\" rel=\"nofollow noopener\">revealed suspicious software<\/a> hidden inside. Like the creators of <strong>PirateFi<\/strong>, those behind <strong>Sniper: Phantom\u2019s Resolution<\/strong> seemed to be after victims\u2019 online accounts. Following user reports, both GitHub and Steam quickly removed the malicious game from their platforms.<\/p>\n<div id=\"attachment_54349\" style=\"width: 973px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/09\/18155750\/gamer-malware-endgame-gear-steam-minecraft-4-2.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-54349\" class=\"size-full wp-image-54349\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/09\/18155750\/gamer-malware-endgame-gear-steam-minecraft-4-2.jpg\" alt=\"Sniper: Phantom's Resolution on Steam \" width=\"963\" height=\"1022\"><\/a><p id=\"caption-attachment-54349\" class=\"wp-caption-text\">The game Sniper: Phantom\u2019s Resolution was published on Steam with an installer containing malware, and was removed after user complaints. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/steam-pulls-game-demo-infecting-windows-with-info-stealing-malware\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>The third case, involving a game called <strong>Chemia<\/strong> by <strong>Aether Forge Studios<\/strong>, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hacker-sneaks-infostealer-malware-into-early-access-steam-game\/\" target=\"_blank\" rel=\"nofollow noopener\">was a little different<\/a>: this time, it was a beta version of a legitimate game that was infected. Cybersecurity researchers believe the attack was carried out by the hacker group <strong>EncryptHub<\/strong>, also known as <strong>Larva-208<\/strong>.<\/p>\n<p>It remains unclear how the attackers managed to inject malware into the game. However, players who launched the <strong>Chemia<\/strong> playtest unknowingly downloaded two infostealers to their devices. Both ran silently in the background without affecting gameplay, leaving gamers unaware their systems were compromised.<\/p>\n<div id=\"attachment_54351\" style=\"width: 970px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/09\/18155753\/gamer-malware-endgame-gear-steam-minecraft-5-1.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-54351\" class=\"size-full wp-image-54351\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/09\/18155753\/gamer-malware-endgame-gear-steam-minecraft-5-1.jpg\" alt=\"Chemia on Steam \" width=\"960\" height=\"1073\"><\/a><p id=\"caption-attachment-54351\" class=\"wp-caption-text\">The Chemia playtest on Steam was distributed with infostealing malware that ran in the background, extracting data from browsers. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hacker-sneaks-infostealer-malware-into-early-access-steam-game\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>The attackers were targeting data stored in browsers, including saved passwords, autofill info, cookies, and cryptowallet details. At the time of writing, the game is no longer available on Steam. However, neither the platform nor the game\u2019s developer has issued an official statement.<\/p>\n<h2>Malicious skins on the official Minecraft website<\/h2>\n<p>Sometimes dangers lurk not just on Steam, but also on developers\u2019 official sites \u2014 including the biggest names. In 2018, about <a href=\"https:\/\/variety.com\/2018\/gaming\/news\/minecraft-malware-1202757936\/\" target=\"_blank\" rel=\"nofollow noopener\">fifty thousand <strong>Minecraft<\/strong> players fell victim to attackers<\/a> who uploaded malicious skins to the official <strong>Minecraft<\/strong> website. That platform has a fan-interaction system where any player can share skins they create with others \u2014 and that\u2019s what the attackers exploited.<\/p>\n<div id=\"attachment_54354\" style=\"width: 810px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/09\/18155755\/gamer-malware-endgame-gear-steam-minecraft-6-1.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-54354\" class=\"size-full wp-image-54354\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/09\/18155755\/gamer-malware-endgame-gear-steam-minecraft-6-1.jpg\" alt=\"Malicious Minecraft skins \" width=\"800\" height=\"484\"><\/a><p id=\"caption-attachment-54354\" class=\"wp-caption-text\">The Minecraft skins that could reformat hard drives and delete system programs. <a href=\"https:\/\/www.pcgamer.com\/beware-of-malicious-minecraft-skins-that-attempt-to-erase-your-hard-drive\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>The malware was spread via PNG skin files, and was capable of deleting programs, formatting hard drives, and destroying backup data. One peculiar detail was that some victims received bizarre messages with titles such as:<\/p>\n<ul>\n<li>\u201cYou Are Nailed, Buy A New Computer This Is A Piece Of Sh*t\u201d,<\/li>\n<li>\u201cYou have maxed your internet usage for a lifetime\u201d,<\/li>\n<li>\u201cYour a** got glued.\u201d<\/li>\n<\/ul>\n<p>The malicious code\u2019s specifics make experts believe that professional cybercriminals were likely not behind the attack. Still, the <strong>Minecraft<\/strong> case clearly demonstrated the vulnerability of content-sharing mechanisms on gaming platforms.<\/p>\n<h2>How to avoid becoming a victim<\/h2>\n<p>Installing games, mods, skins, and other gaming software from official sources is, of course, safer than pirating them from shady ones. However, as we\u2019ve shown in this post, even legitimate sites require vigilance.<\/p>\n<ul>\n<li>Read reviews carefully before downloading any game or gaming software. Do a quick background check \u2014 a simple search might lead you to a Reddit thread discussing suspicious issues.<\/li>\n<li>Be cautious with early-access games on Steam. Three malicious games in a single year already signals a trend.<\/li>\n<li>Install <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">reliable protection<\/a> on your device.<\/li>\n<\/ul>\n<p>Many gamers may be skeptical about this last tip, as it\u2019s a common belief in the gaming community that antivirus software slows down games. That may have been true years ago, but tests these days show that the latest security solutions <a href=\"https:\/\/www.kaspersky.com\/blog\/tests-gamers-antiviruses\/47576\/\" target=\"_blank\" rel=\"noopener nofollow\">cause no measurable drops in performance<\/a>.<\/p>\n<p>Moreover, <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a> even includes a dedicated gaming mode. It turns on automatically when a game launches, postponing database updates, notifications, and routine scans until the session ends \u2014 thus minimizing system resource usage.<\/p>\n<blockquote><p>How else do attackers target gamers? Check out our selection of articles on this topic:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/arcane-stealer-instead-of-cheats-for-minecraft\/53178\/\" target=\"_blank\" rel=\"noopener nofollow\">Arcane stealer instead of Minecraft cheats<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/hacker-attacks-apex-legends-global-series-tournament\/50900\/\" target=\"_blank\" rel=\"noopener nofollow\">Live hack: Apex Legends esports tournament scandal<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/how-scammers-attack-young-gamers-2024\/52099\/\" target=\"_blank\" rel=\"noopener nofollow\">How scammers attack young gamers<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/mario-forever-malware-too\/48547\/\" target=\"_blank\" rel=\"noopener nofollow\">Mario Forever, malware too: a free game with a miner and Trojans inside<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/modern-gamers-threats\/47363\/\" target=\"_blank\" rel=\"noopener nofollow\">The Phantom Menace: how gamers of different ages are being attacked<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-gamer\">\n","protected":false},"excerpt":{"rendered":"<p>Official gaming websites and platforms may seem safe, but even there gamers occasionally encounter malware. We break down infection cases involving Endgame Gear, Steam, and Minecraft.<\/p>\n","protected":false},"author":2726,"featured_media":24656,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486],"tags":[1520,617,2836,1129,36,2378,2151,164,692],"class_list":{"0":"post-24648","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-backdoors","9":"tag-gamers","10":"tag-games","11":"tag-keyloggers","12":"tag-malware-2","13":"tag-minecraft","14":"tag-stealers","15":"tag-steam","16":"tag-trojans"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/gamer-malware-endgame-gear-steam-minecraft\/24648\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/gamer-malware-endgame-gear-steam-minecraft\/29549\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/gamer-malware-endgame-gear-steam-minecraft\/29474\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/gamer-malware-endgame-gear-steam-minecraft\/40529\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/gamer-malware-endgame-gear-steam-minecraft\/54336\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/gamer-malware-endgame-gear-steam-minecraft\/29657\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/gamer-malware-endgame-gear-steam-minecraft\/35403\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/gamer-malware-endgame-gear-steam-minecraft\/35031\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/gamers\/","name":"gamers"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24648","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=24648"}],"version-history":[{"count":6,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24648\/revisions"}],"predecessor-version":[{"id":25435,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24648\/revisions\/25435"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/24656"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=24648"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=24648"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=24648"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}