Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CPUID Website Breach Distributes Malicious Software

CPUID Website Breach Distributes Malicious Software

Posted on April 13, 2026 By CWS

The CPUID website, highly regarded among PC hardware enthusiasts, recently experienced a security breach. This compromise resulted in the distribution of malicious software versions of popular tools like CPU-Z, HWMonitor, and PerfMonitor.

Compromised Software Details

CPU-Z, HWMonitor, and PerfMonitor are widely used to analyze PC hardware performance. CPU-Z provides comprehensive system information about a computer’s components, HWMonitor tracks real-time sensor data, and PerfMonitor assesses processor performance. These applications, with millions of downloads, are essential for both individual users and businesses.

According to CPUID’s maintainer, a secondary feature of their site was attacked, leading to the intermittent display of links to third-party domains that hosted infected versions of these tools. However, the original software files on CPUID’s site remained secure.

Scope of the Security Breach

Kaspersky, a renowned cybersecurity firm, conducted an analysis of the attack, identifying it as a supply chain and watering hole tactic. During the breach, the CPUID website inadvertently served harmful installers for CPU-Z, HWMonitor, HWMonitor Pro, and PerfMonitor.

The attack affected over 150 users, including individuals and companies across sectors like manufacturing and telecoms. Most infections were reported in Brazil, China, and Russia, although Kaspersky acknowledged limited visibility in North America and Europe.

Malware Distribution and Impact

The attackers used ZIP archives and standalone installers to distribute the legitimate software alongside a harmful file, cryptbase.dll, through DLL sideloading techniques. The primary objective was to deploy a new Windows malware known as STX RAT. This malware allows attackers to control compromised systems and steal sensitive data, including browser credentials and cryptocurrency wallets.

The incident reportedly began on April 10, with the breach lasting approximately six hours. However, Kaspersky’s findings suggest a longer compromise from April 9 to April 10. Breakglass Intelligence researchers linked this to a broader campaign involving trojanized FileZilla software, speculating the attack may have started on April 3, possibly orchestrated by a Russian-speaking threat actor.

This incident underscores the importance of cybersecurity vigilance and the need for organizations to protect themselves against supply chain attacks that can compromise widely used software.

Security Week News Tags:Breakglass Intelligence, CPUID, Cybersecurity, DLL Sideloading, FileZilla, Kaspersky, Malware, STX RAT, supply chain attack, Trojan

Post navigation

Previous Post: Adobe Fixes Critical Acrobat Reader Security Flaw
Next Post: APT37 Exploits Social Media in New Cyber Attack

Related Posts

Printer Company Procolored Served Infected Software for Months Printer Company Procolored Served Infected Software for Months Security Week News
Salesforce Instances Hacked via Gainsight Integrations Salesforce Instances Hacked via Gainsight Integrations Security Week News
Rising Tides: When Cybersecurity Becomes Personal – Inside the Work of an OSINT Investigator Rising Tides: When Cybersecurity Becomes Personal – Inside the Work of an OSINT Investigator Security Week News
Spektrum Labs Emerges From Stealth to Help Companies Prove Resilience Spektrum Labs Emerges From Stealth to Help Companies Prove Resilience Security Week News
Widespread Exploitation of XWiki Vulnerability Observed Widespread Exploitation of XWiki Vulnerability Observed Security Week News
Canadian Airline WestJet Says Hackers Stole Customer Data Canadian Airline WestJet Says Hackers Stole Customer Data Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VIPERTUNNEL Backdoor Exploits Obfuscated Python Code
  • Global Operation Halts Major Cryptocurrency Theft Schemes
  • AI Advances Transform Cybersecurity Post-Alert Response
  • APT37 Exploits Social Media in New Cyber Attack
  • CPUID Website Breach Distributes Malicious Software

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VIPERTUNNEL Backdoor Exploits Obfuscated Python Code
  • Global Operation Halts Major Cryptocurrency Theft Schemes
  • AI Advances Transform Cybersecurity Post-Alert Response
  • APT37 Exploits Social Media in New Cyber Attack
  • CPUID Website Breach Distributes Malicious Software

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark