Malware & RansomwareHIGH

Supply Chain Attack - Malware Disguised as CPU-Z and HWMonitor

Featured image for Supply Chain Attack - Malware Disguised as CPU-Z and HWMonitor
#CPU-Z#HWMonitor#HWiNFO#Trojan#CPUID

Original Reporting

BCBleepingComputer·Bill Toulas

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk — action recommended within 24-48 hours

🦠
🦠 MALWARE PROFILE
Malware NameHWiNFO_Monitor_Setup
Malware TypeTrojan
Threat ActorUnknown
Target PlatformWindows
Delivery MethodCompromised Download Links
Persistence MechanismIn-memory Execution
C2 InfrastructureCompromised Domain
CapabilitiesData Theft, System Monitoring
IOCs AvailableMalicious File Name
Detection Rate20/60 on VirusTotal
MITRE ATT&CKT1071.001 (Application Layer Protocol)
🎯

Basically, hackers tricked users into downloading harmful software disguised as popular system tools.

Quick Summary

Hackers compromised CPUID's API, redirecting users to malicious downloads for CPU-Z and HWMonitor. Millions could be at risk from this sophisticated malware. Stay vigilant and check your downloads!

What Happened

Hackers executed a supply chain attack on the CPUID project, manipulating the official download links for the widely used tools CPU-Z and HWMonitor. By gaining access to an API, they redirected users to download malicious executables instead of the legitimate software. This incident raises significant concerns given the millions of users who rely on these tools for monitoring their computer's health.

How It Works

The malicious files were hosted on a compromised domain, specifically designed to masquerade as legitimate software. Users reported that the download links pointed to a trojanized version of HWiNFO, which is another diagnostic tool. The malicious file, named HWiNFO_Monitor_Setup, executes a suspicious installer that is atypical for legitimate software. This sophisticated malware employs advanced techniques to evade detection, operating primarily in-memory and using proxy methods to avoid security software.

Who's Being Targeted

The attack primarily targets users of CPU-Z and HWMonitor, two tools with a vast user base. These tools are essential for many users, including gamers and IT professionals, who depend on accurate hardware monitoring and diagnostics. The compromised download links were only active for a short period, approximately six hours, but they could have impacted a significant number of users during that time.

Signs of Infection

Users who downloaded the compromised versions might notice unusual behavior from their systems. Signs of infection could include:

  • Unexpected pop-ups or prompts during installation.
  • Unrecognized processes running in the background.
  • Antivirus flags on the downloaded files.

How to Protect Yourself

To safeguard against such attacks, users should:

  • Always download software from official websites or trusted sources.
  • Verify the integrity of downloaded files using checksums when available.
  • Keep antivirus software updated and run regular scans.

What You Should Do

If you suspect that you have downloaded the malicious version of CPU-Z or HWMonitor, it is crucial to take immediate action. Uninstall the software, run a complete system scan with an updated antivirus program, and monitor your system for any unusual activity. Additionally, stay informed about updates from CPUID regarding the incident and follow any recommended actions they provide.

🔍 How to Check If You're Affected

  1. 1.Check your download history for CPU-Z or HWMonitor installations from April 9-10.
  2. 2.Run a full system scan with updated antivirus software.
  3. 3.Look for unusual processes or applications in your task manager.

🏢 Impacted Sectors

Technology

Pro Insight

🔒 Pro insight: This attack exemplifies the growing trend of supply chain compromises targeting widely used software, necessitating enhanced vigilance in software sourcing.

Sources

Original Report

BCBleepingComputer· Bill Toulas
Read Original

Related Pings

HIGHMalware & Ransomware

CPUID Website Compromised - Weaponized HWMonitor and CPU-Z Tools

The CPUID website has been compromised, delivering trojanized versions of HWMonitor and CPU-Z. Users downloading these tools may face serious malware risks. Immediate action is advised.

Cyber Security News·
MEDIUMMalware & Ransomware

Obfuscated JavaScript Delivered via Phishing Email Alert

A malicious JavaScript file named cbmjlzan.JS was found in a phishing email. Only 15 antivirus programs flagged it, raising concerns about detection. Stay vigilant against such threats.

SANS ISC Full Text·
HIGHMalware & Ransomware

Cracked Software - 5 Ways to Mitigate Security Risks

Cracked software is a hidden danger in many organizations. Employees often download these versions without realizing the risks. Discover five effective strategies to mitigate these threats.

SC Media·
HIGHMalware & Ransomware

STX RAT - Targets Finance Sector With Stealth Tactics

A new remote access trojan, STX RAT, targets the finance sector using advanced stealth tactics. Its sophisticated delivery methods pose a significant threat to sensitive data. Organizations must enhance their defenses to combat this emerging threat.

Infosecurity Magazine·
HIGHMalware & Ransomware

Phishing Attack - Google Storage Delivers Remcos RAT

A new phishing attack is using Google Cloud Storage to deliver Remcos RAT. This sophisticated campaign targets unsuspecting users globally, exploiting trust in Google. Stay alert to avoid falling victim.

Cyber Security News·
HIGHMalware & Ransomware

RoningLoader - New Malware Campaign Evades Detection Tactics

A new stealthy malware campaign named RoningLoader has emerged, targeting Chinese-speaking users. It cleverly disguises itself as trusted software to evade detection, posing serious risks to security tools. Organizations must remain vigilant against this sophisticated threat.

Cyber Security News·