Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CPUID Breach: STX RAT Spread via Compromised Downloads

CPUID Breach: STX RAT Spread via Compromised Downloads

Posted on April 12, 2026 By CWS

Unknown cybercriminals recently targeted CPUID’s website, cpuid[.]com, which is known for its popular hardware monitoring tools, including CPU-Z and HWMonitor. This breach, lasting less than a day, enabled the attackers to distribute malicious versions of the software that installed a remote access trojan (RAT) known as STX RAT.

Details of the Security Breach

The incident unfolded between April 9 at 15:00 UTC and April 10 at 10:00 UTC. During this period, download links for CPU-Z and HWMonitor were redirected to harmful websites. CPUID acknowledged the breach on X, attributing it to a compromised secondary API feature on their site. Fortunately, the original signed files remained unaffected during the attack.

Security firm Kaspersky identified several rogue websites involved in this breach, including cahayailmukreatif.web[.]id and pub-45c2577dbd174292a02137c18e7b1b5a.r2[.]dev, among others. The attackers distributed compromised software as ZIP archives and standalone installers that included both legitimate executables and a malicious DLL named ‘CRYPTBASE.dll’. This DLL employed a side-loading technique to execute further malicious payloads.

STX RAT Capabilities and Distribution

The malicious DLL initiated contact with an external server to deploy additional payloads, conducting anti-sandbox checks to avoid detection. The primary objective was to install STX RAT, which is equipped with extensive capabilities such as hidden virtual network computing (HVNC) and data-stealing features.

An analysis by eSentire revealed that STX RAT offers a wide range of commands for remote control, execution of subsequent payloads, and other post-exploitation tasks. These include in-memory execution of various file types and desktop interaction. The threat actors recycled a command-and-control (C2) server configuration from a previous campaign that involved fake FileZilla installers, which was documented by Malwarebytes last month.

Impact and Detection

Kaspersky’s investigation identified over 150 victims, predominantly individual users. However, organizations in sectors such as retail, manufacturing, and telecommunications were also affected, with most incidents reported in Brazil, Russia, and China.

Experts noted that the attackers’ major error was reusing the same infection chain and C2 domains from previous attacks, which compromised their operational security and facilitated the detection of the breach. This oversight by the threat actors enabled cybersecurity teams to identify and mitigate the attack promptly.

The CPUID breach underscores the ongoing challenges in the cybersecurity landscape, highlighting the need for continuous vigilance and improved security measures to protect against such threats.

The Hacker News Tags:command-and-control, CPU-Z, CPUID, cyber attack, Cybersecurity, DLL side-loading, HWMonitor, Kaspersky, malicious software, Malware, remote access trojan, security breach, STX RAT, threat intelligence

Post navigation

Previous Post: OpenAI Urges macOS Users to Update Apps Amid Security Threat
Next Post: Critical Adobe Acrobat Reader Flaw Patched Amid Exploitation

Related Posts

SideWinder Adopts New ClickOnce-Based Attack Chain Targeting South Asian Diplomats SideWinder Adopts New ClickOnce-Based Attack Chain Targeting South Asian Diplomats The Hacker News
Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access The Hacker News
SSHStalker Botnet Utilizes IRC to Control Legacy Linux Systems SSHStalker Botnet Utilizes IRC to Control Legacy Linux Systems The Hacker News
Overcoming Risks from Chinese GenAI Tool Usage Overcoming Risks from Chinese GenAI Tool Usage The Hacker News
Cisco Patches ISE Security Vulnerability After Public PoC Exploit Release Cisco Patches ISE Security Vulnerability After Public PoC Exploit Release The Hacker News
Hard-Coded ‘b’ Password in Sitecore XP Sparks Major RCE Risk in Enterprise Deployments Hard-Coded ‘b’ Password in Sitecore XP Sparks Major RCE Risk in Enterprise Deployments The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Adobe Reader Flaw Patched After Months of Exploitation
  • Critical Adobe Acrobat Reader Flaw Patched Amid Exploitation
  • CPUID Breach: STX RAT Spread via Compromised Downloads
  • OpenAI Urges macOS Users to Update Apps Amid Security Threat
  • Google Enhances Gmail with Mobile End-to-End Encryption

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Adobe Reader Flaw Patched After Months of Exploitation
  • Critical Adobe Acrobat Reader Flaw Patched Amid Exploitation
  • CPUID Breach: STX RAT Spread via Compromised Downloads
  • OpenAI Urges macOS Users to Update Apps Amid Security Threat
  • Google Enhances Gmail with Mobile End-to-End Encryption

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark