{"id":45297,"date":"2026-04-10T21:31:30","date_gmt":"2026-04-10T13:31:30","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/10\/supply-chain-attack-at-cpuid-pushes-malware-with-cpu-z-hwmonitor\/"},"modified":"2026-04-10T21:31:30","modified_gmt":"2026-04-10T13:31:30","slug":"supply-chain-attack-at-cpuid-pushes-malware-with-cpu-z-hwmonitor","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/10\/supply-chain-attack-at-cpuid-pushes-malware-with-cpu-z-hwmonitor\/","title":{"rendered":"Supply chain attack at CPUID pushes malware with CPU-Z\/HWMonitor"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2023\/11\/09\/CPU-Z.jpg\" width=\"1600\" alt=\"Supply chain attack at CPUID pushes malware with CPU-Z\/HWMonitor\"><\/p>\n<p>Hackers gained access to an API for the CPUID project and&nbsp;changed the download links on the official website to serve malicious executables for the popular CPU-Z and HWMonitor tools.<\/p>\n<p>The two utilities have millions of users who rely on them for tracking the physical health of internal computer hardware and for comprehensive specifications of a system.<\/p>\n<p>Users who downloaded either tool <a href=\"https:\/\/www.reddit.com\/r\/pcmasterrace\/comments\/1sh4e5l\/warning_hwmonitor_163_download_on_the_official\/\" rel=\"nofollow noopener\">reported on Reddit<\/a> recently that the official download portal points to the Cloudflare R2 storage service and fetches a trojanized version of HWiNFO, another diagnostic and monitoring tool from a different developer.<\/p>\n<p>The name of the malicious file is HWiNFO_Monitor_Setup, and running it launches a Russian installer with an Inno Setup wrapper, which is atypical and highly suspicious.<\/p>\n<p>Users reported that downloading the clean hwmonitor_1.63.exe from the direct URL was still possible, indicating that the original binaries were intact, but the distribution links appear to have been poisoned.<\/p>\n<p>The externalized download chain was also confirmed by <a href=\"https:\/\/www.igorslab.de\/en\/warning-cpuid-suspected-of-being-a-virus-suspicious-hwmonitor-downloads-are-causing-alarm\/\" target=\"_blank\" rel=\"nofollow noopener\">Igor&rsquo;s Labs<\/a> and @vxunderground, who reported that a fairly advanced loader using known techniques, tactics, and procedures (TTPs) is involved.<\/p>\n<p>&ldquo;As I began poking this with a stick, I discovered this is not your typical run-of-the-mill malware,&rdquo; <a href=\"https:\/\/x.com\/vxunderground\/status\/2042483067655262461\" rel=\"nofollow noopener\">stated vxunderground<\/a>.<\/p>\n<p>&ldquo;This malware is deeply trojanized, distributes from a compromised domain (cpuid-dot-com), performs file masquerading, is multi-staged, operates (almost) entirely in-memory, and uses some interesting methods to evade EDRs and\/or AVs such as proxying NTDLL functionality from a .NET assembly.&rdquo;<\/p>\n<p style=\"text-align:center\"><a href=\"https:\/\/x.com\/vxunderground\/status\/2042483067655262461\" target=\"_blank\" rel=\"nofollow noopener\"><img loading=\"lazy\" decoding=\"async\" height=\"419\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/April\/tweet.png\" width=\"450\" alt=\"Supply chain attack at CPUID pushes malware with CPU-Z\/HWMonitor\"><\/a><\/p>\n<p>The researcher claims that the same threat group targeted users of the FileZilla FTP solution last month, suggesting that the attacker is focusing on widely used utilities.<\/p>\n<p>The downloaded ZIP is flagged by 20 antivirus engines <a href=\"https:\/\/www.virustotal.com\/gui\/file\/eff5ece65fb30b21a3ebc1ceb738556b774b452d13e119d5a2bfb489459b4a46\" rel=\"nofollow noopener\">on VirusTotal<\/a>, although not clearly identified. Some classify it as Tedy Trojan, and others as Artemis Trojan.<\/p>\n<p>Some researchers on Virustotal say that the fake HWiNFO variant is an infostealer malware.<\/p>\n<p>BleepingComputer has contacted CPUID to learn more about what happened, the date of the compromise, the affected versions, and what impacted users should do. A spokesperson has pr<\/p>\n<div style=\"background:#eeeeee; border:1px solid #cccccc; padding:5px 10px\">\n<p>&#8220;Investigations are still ongoing, but it appears that a secondary feature (basically a side API) was compromised for approximately six hours between April 9 and April 10, causing the main website to randomly display malicious links (our signed original files were not compromised). The breach was found and has since been fixed.&#8221; &#8211; CPUID<\/p>\n<\/p><\/div>\n<p>The same person told us that the hackers hit them at a time when the main developer was away on holiday.<\/p>\n<p>Currently, it appears that CPUID has fixed the problem and now serves clean versions for both CPU-Z and HWMonitor.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/p\/picus-whitepaper.jpg\" alt=\"Supply chain attack at CPUID pushes malware with CPU-Z\/HWMonitor\">         <\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Automated Pentesting Covers Only 1 of 6 Surfaces.<\/a><\/h2>\n<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.<\/p>\n<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.<\/p>\n<p>           <button><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Get Your Copy Now<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/smart-slider-updates-hijacked-to-push-malicious-wordpress-joomla-versions\/\">Smart Slider updates hijacked to push malicious WordPress, Joomla versions<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-compromise-axios-npm-package-to-drop-cross-platform-malware\/\">Hackers compromise Axios npm package to drop cross-platform malware<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/backdoored-telnyx-pypi-package-pushes-malware-hidden-in-wav-audio\/\">Backdoored Telnyx PyPI package pushes malware hidden in WAV audio<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/trivy-supply-chain-attack-spreads-to-docker-github-repos\/\">Trivy supply-chain attack spreads to Docker, GitHub repos<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/glassworm-malware-hits-400-plus-code-repos-on-github-npm-vscode-openvsx\/\">GlassWorm malware hits 400+ code repos on GitHub, npm, VSCode, OpenVSX<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Hackers gained access to an API for the CPUID project a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-45297","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45297","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45297"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45297\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}