Malware & RansomwareHIGH

CPUID Website Compromised - Weaponized HWMonitor and CPU-Z Tools

Featured image for CPUID Website Compromised - Weaponized HWMonitor and CPU-Z Tools
#HWMonitor#CPU-Z#trojan#CPUID#malware

Original Reporting

CSCyber Security News·Guru Baran

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk — action recommended within 24-48 hours

🦠
🦠 MALWARE PROFILE
Malware NameTrojanized HWMonitor and CPU-Z
Malware Type
Threat Actor
Target Platform
Delivery Method
Persistence MechanismDLL hijacking
C2 Infrastructure
Capabilities
IOCs Available
Detection RateVaries by antivirus vendor
MITRE ATT&CK
🎯

Basically, the CPUID website was hacked to spread dangerous software disguised as popular tools.

Quick Summary

The CPUID website has been compromised, delivering trojanized versions of HWMonitor and CPU-Z. Users downloading these tools may face serious malware risks. Immediate action is advised.

What Happened

The CPUID website, known for its widely used utilities CPU-Z and HWMonitor, has fallen victim to a significant supply chain attack. Users who downloaded HWMonitor version 1.63 or CPU-Z ZIP files since early April 2026 have reported receiving trojanized installers instead of the legitimate software. These malicious installers are capable of dropping harmful DLL files and can evade antivirus detection by executing in memory.

Who's Affected

Anyone who downloaded HWMonitor 1.63 or CPU-Z from cpuid.com during this timeframe is at risk. Users reported issues primarily through community platforms like Reddit, highlighting a concerning trend where expected files were replaced with suspicious ones, such as HWiNFO_Monitor_Setup.exe.

Signs of Infection

Reports indicate that users experienced unexpected alerts from Windows Defender and encountered Russian-language text during installation. The malicious payload is designed to drop a DLL file named cryptbase.dll, which is commonly used for stealthy execution techniques. This malware employs sophisticated methods to bypass traditional antivirus scanning, making it particularly dangerous.

How to Protect Yourself

  • Do not download any files from cpuid.com until further notice.
  • Immediately scan your system if you downloaded HWMonitor or CPU-Z after April 3, 2026.
  • Look for cryptbase.dll in your application directories as a potential indicator of compromise.
  • Consider switching to HWiNFO (hwinfo.com), a safe alternative for hardware monitoring.
  • Always verify file hashes against official sources before executing any software.

This incident serves as a stark reminder that even trusted diagnostic tools can become vectors for malware when their underlying infrastructure is compromised. Users are urged to remain vigilant and take necessary precautions.

🔍 How to Check If You're Affected

  1. 1.Check for the presence of cryptbase.dll in application directories.
  2. 2.Run a full antivirus scan to detect any malicious files.
  3. 3.Verify the integrity of downloaded files against official sources.

🏢 Impacted Sectors

Technology

Pro Insight

🔒 Pro insight: This incident highlights the critical need for supply chain security, as trusted software can be weaponized through compromised delivery channels.

Sources

Original Report

CSCyber Security News· Guru Baran
Read Original

Related Pings

HIGHMalware & Ransomware

MuddyWater - Adopts Russian Malware-as-a-Service for Campaign

MuddyWater has shifted tactics, now using Russian malware to target Israeli organizations. This change raises significant concerns for critical sectors worldwide. Organizations must bolster their defenses against this evolving threat.

Cyber Security News·
MEDIUMMalware & Ransomware

Obfuscated JavaScript Delivered via Phishing Email Alert

A malicious JavaScript file named cbmjlzan.JS was found in a phishing email. Only 15 antivirus programs flagged it, raising concerns about detection. Stay vigilant against such threats.

SANS ISC Full Text·
HIGHMalware & Ransomware

Cracked Software - 5 Ways to Mitigate Security Risks

Cracked software is a hidden danger in many organizations. Employees often download these versions without realizing the risks. Discover five effective strategies to mitigate these threats.

SC Media·
HIGHMalware & Ransomware

STX RAT - Targets Finance Sector With Stealth Tactics

A new remote access trojan, STX RAT, targets the finance sector using advanced stealth tactics. Its sophisticated delivery methods pose a significant threat to sensitive data. Organizations must enhance their defenses to combat this emerging threat.

Infosecurity Magazine·
HIGHMalware & Ransomware

Phishing Attack - Google Storage Delivers Remcos RAT

A new phishing attack is using Google Cloud Storage to deliver Remcos RAT. This sophisticated campaign targets unsuspecting users globally, exploiting trust in Google. Stay alert to avoid falling victim.

Cyber Security News·
HIGHMalware & Ransomware

RoningLoader - New Malware Campaign Evades Detection Tactics

A new stealthy malware campaign named RoningLoader has emerged, targeting Chinese-speaking users. It cleverly disguises itself as trusted software to evade detection, posing serious risks to security tools. Organizations must remain vigilant against this sophisticated threat.

Cyber Security News·