Back

CPUID Website Compromised, Malware Distributed via CPU-Z and HWMonitor Downloads

Severity: High (Score: 71.0)

Sources: Overclock3D, Cybersecuritynews, Bleepingcomputer, Theregister, Ground.News

Summary

The CPUID website was compromised for approximately six hours between April 9 and April 10, 2026, allowing attackers to redirect downloads for the popular utilities CPU-Z and HWMonitor to malicious executables. Users reported downloading a trojanized installer named 'HWiNFO_Monitor_Setup.exe,' which was flagged by multiple antivirus engines as malicious. The malware is designed to operate primarily in memory, evade detection, and potentially steal sensitive information. CPUID confirmed that their original software files were not compromised, but the attack exploited a secondary API feature. Security experts have warned users to avoid unverified downloads and to rotate sensitive credentials if they suspect infection. The issue has since been resolved, and CPUID is now serving clean versions of their software. Investigations are ongoing to determine the full scope of the attack and how the API was accessed. Key Points: • CPUID's website was compromised, redirecting users to malicious downloads for CPU-Z and HWMonitor. • The malware operates primarily in memory and is capable of stealing sensitive user data. • CPUID has fixed the issue and is now providing clean downloads, but users are advised to check for infections.

Key Entities

  • Malware (attack_type)
  • Supply Chain Attack (attack_type)
  • Trojan (attack_type)
  • Cpuid (company)
  • cpuid.com (domain)
  • T1003 - OS Credential Dumping (mitre_attack)
  • T1055 - Process Injection (mitre_attack)
  • T1059.001 - PowerShell (mitre_attack)
  • T1071 - Application Layer Protocol (mitre_attack)
  • Google Chrome (tool)
  • PowerShell (tool)
  • Windows (platform)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed