Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CPUID Site Delivers Compromised CPU-Z and HWMonitor Tools

CPUID Site Delivers Compromised CPU-Z and HWMonitor Tools

Posted on April 10, 2026 By CWS

The CPUID website, known for popular utilities like CPU-Z and HWMonitor, is currently involved in a significant security breach impacting its supply chain. Users who have downloaded HWMonitor 1.63 or CPU-Z since early April have reportedly been exposed to trojanized installers. These malicious files are capable of deploying harmful DLLs, evading antivirus detection through memory-based execution, and connecting to attacker-managed infrastructures.

Details of the Security Incident

On April 10, 2026, discussions emerged on platforms like Reddit, highlighting a troubling trend. Users attempting to download HWMonitor from the official CPUID site found themselves receiving a file named HWiNFO_Monitor_Setup.exe instead of the expected hwmonitor_1.63.exe. This discrepancy in filenames seems to be a deliberate attempt to confuse users by merging names of reputable hardware monitoring tools—CPUID and HWMonitor.

Chris Titus, a technology content creator, confirmed the compromise of both CPU-Z and HWMonitor. Via social media, he emphasized the sophisticated nature of the malware, which originates from the compromised CPUID domain.

Technical Mechanisms Behind the Threat

Community reports also indicated Windows Defender alerts, Russian text within installation dialogs, and multiple detections on VirusTotal. The malicious payload primarily employs DLL hijacking, with cryptbase.dll frequently observed, allowing for persistent and stealthy operations by circumventing traditional antivirus checks.

The exact method of compromise has not yet been fully determined. The CPUID website serves HWMonitor files from varied infrastructures: the setup installer from download.cpuid.com and the ZIP files from a Cloudflare R2 domain. This separation could signify a potential manipulation point.

Recommended User Actions and Future Outlook

At this time, download links on cpuid.com are resulting in 404 errors, possibly indicating that the site operators have removed the affected files. Although CPUID has yet to release an official statement, they are reportedly investigating the issue. Security experts have flagged the installer samples on VirusTotal as multi-stage threats, urging users to exercise caution.

Users are advised to refrain from downloading from cpuid.com until a verified resolution is announced. Those who have downloaded the tools post-April 3, 2026, should conduct immediate system scans and look for cryptbase.dll as a compromise indicator. Switching to HWiNFO, a reliable alternative, is also recommended. This incident underscores the potential risks even trusted diagnostic tools can pose if the supporting infrastructure is compromised.

Cyber Security News Tags:Cloudflare, CPU-Z, CPUID, Cybersecurity, DLL hijacking, download compromise, HWiNFO, HWMonitor, in-memory execution, Malware, security incident, supply chain attack, Trojan, virus, VirusTotal, Windows Defender

Post navigation

Previous Post: Chrome Enhances Security with New Cookie Protection
Next Post: Google Enhances Chrome Security with DBSC Rollout

Related Posts

Chinese Silk Typhoon Hackers Filed 10+ Patents for Highly Intrusive Hacking Tools Chinese Silk Typhoon Hackers Filed 10+ Patents for Highly Intrusive Hacking Tools Cyber Security News
Oracle Allegedly Breached by Clop Ransomware via E-Business Suite 0-Day Hack Oracle Allegedly Breached by Clop Ransomware via E-Business Suite 0-Day Hack Cyber Security News
Kimsuky APT Data Leak – GPKI Certificates, Rootkits and Cobalt Strike Personal Uncovered Kimsuky APT Data Leak – GPKI Certificates, Rootkits and Cobalt Strike Personal Uncovered Cyber Security News
CISA Warns of Dassault Systèmes Vulnerabilities Actively Exploited in Attacks CISA Warns of Dassault Systèmes Vulnerabilities Actively Exploited in Attacks Cyber Security News
Telecommunications Companies in Spain Experiencing Downtime Telecommunications Companies in Spain Experiencing Downtime Cyber Security News
MongoBleed Detector Tool Released to Detect MongoDB Vulnerability(CVE-2025-14847) MongoBleed Detector Tool Released to Detect MongoDB Vulnerability(CVE-2025-14847) Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Orthanc DICOM Server Flaws Pose Security Risks
  • Critical Marimo RCE Vulnerability Exploited Rapidly
  • MuddyWater Embraces Russian Malware in ChainShell Attack
  • Chrome 147 Fixes 60 Security Flaws, Two Critical
  • AI Extensions: The Emerging Security Threat in Browsers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Orthanc DICOM Server Flaws Pose Security Risks
  • Critical Marimo RCE Vulnerability Exploited Rapidly
  • MuddyWater Embraces Russian Malware in ChainShell Attack
  • Chrome 147 Fixes 60 Security Flaws, Two Critical
  • AI Extensions: The Emerging Security Threat in Browsers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark