Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CPUID Site Delivers Compromised CPU-Z and HWMonitor Tools

CPUID Site Delivers Compromised CPU-Z and HWMonitor Tools

Posted on April 10, 2026 By CWS

The CPUID website, known for popular utilities like CPU-Z and HWMonitor, is currently involved in a significant security breach impacting its supply chain. Users who have downloaded HWMonitor 1.63 or CPU-Z since early April have reportedly been exposed to trojanized installers. These malicious files are capable of deploying harmful DLLs, evading antivirus detection through memory-based execution, and connecting to attacker-managed infrastructures.

Details of the Security Incident

On April 10, 2026, discussions emerged on platforms like Reddit, highlighting a troubling trend. Users attempting to download HWMonitor from the official CPUID site found themselves receiving a file named HWiNFO_Monitor_Setup.exe instead of the expected hwmonitor_1.63.exe. This discrepancy in filenames seems to be a deliberate attempt to confuse users by merging names of reputable hardware monitoring tools—CPUID and HWMonitor.

Chris Titus, a technology content creator, confirmed the compromise of both CPU-Z and HWMonitor. Via social media, he emphasized the sophisticated nature of the malware, which originates from the compromised CPUID domain.

Technical Mechanisms Behind the Threat

Community reports also indicated Windows Defender alerts, Russian text within installation dialogs, and multiple detections on VirusTotal. The malicious payload primarily employs DLL hijacking, with cryptbase.dll frequently observed, allowing for persistent and stealthy operations by circumventing traditional antivirus checks.

The exact method of compromise has not yet been fully determined. The CPUID website serves HWMonitor files from varied infrastructures: the setup installer from download.cpuid.com and the ZIP files from a Cloudflare R2 domain. This separation could signify a potential manipulation point.

Recommended User Actions and Future Outlook

At this time, download links on cpuid.com are resulting in 404 errors, possibly indicating that the site operators have removed the affected files. Although CPUID has yet to release an official statement, they are reportedly investigating the issue. Security experts have flagged the installer samples on VirusTotal as multi-stage threats, urging users to exercise caution.

Users are advised to refrain from downloading from cpuid.com until a verified resolution is announced. Those who have downloaded the tools post-April 3, 2026, should conduct immediate system scans and look for cryptbase.dll as a compromise indicator. Switching to HWiNFO, a reliable alternative, is also recommended. This incident underscores the potential risks even trusted diagnostic tools can pose if the supporting infrastructure is compromised.

Cyber Security News Tags:Cloudflare, CPU-Z, CPUID, Cybersecurity, DLL hijacking, download compromise, HWiNFO, HWMonitor, in-memory execution, Malware, security incident, supply chain attack, Trojan, virus, VirusTotal, Windows Defender

Post navigation

Previous Post: Chrome Enhances Security with New Cookie Protection
Next Post: Google Enhances Chrome Security with DBSC Rollout

Related Posts

Akira Ransomware Uses Windows Drivers to Bypass AV/EDR in SonicWall Attacks Akira Ransomware Uses Windows Drivers to Bypass AV/EDR in SonicWall Attacks Cyber Security News
Google Chrome Update: Critical Security Fixes Released Google Chrome Update: Critical Security Fixes Released Cyber Security News
Chrome Security Update Patches Critical Remote Code Execution Vulnerability Chrome Security Update Patches Critical Remote Code Execution Vulnerability Cyber Security News
Microsoft Rolls Out Windows 11 Cumulative Updates KB5058411 and KB5058405 Microsoft Rolls Out Windows 11 Cumulative Updates KB5058411 and KB5058405 Cyber Security News
Fortinet Issues Patch for Critical FortiClient EMS Vulnerability Fortinet Issues Patch for Critical FortiClient EMS Vulnerability Cyber Security News
A New Tool that Automates GitHub Device Code Phishing Attack A New Tool that Automates GitHub Device Code Phishing Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chrome 147 Fixes 60 Security Flaws, Two Critical
  • AI Extensions: The Emerging Security Threat in Browsers
  • Mallory Unveils AI-Driven Threat Intelligence Platform
  • MITRE Unveils Comprehensive Fraud Prevention Framework
  • Malicious OpenVSX Extension Infects Multiple Code Editors

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chrome 147 Fixes 60 Security Flaws, Two Critical
  • AI Extensions: The Emerging Security Threat in Browsers
  • Mallory Unveils AI-Driven Threat Intelligence Platform
  • MITRE Unveils Comprehensive Fraud Prevention Framework
  • Malicious OpenVSX Extension Infects Multiple Code Editors

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark