Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
New cPanel & WHM Flaws Allow Code Execution Enable Attacks
May 10, 2026
TCLBANKER Malware Spreads Via WhatsApp Targets Users
May 9, 2026
NVIDIA Data Breach Exposes GeForce Users Reportedly Personal
May 9, 2026
Home/CyberSecurity News/CPUID Website Hacked: Weaponized HWMonitor & Compromised Deliver
CyberSecurity News

CPUID Website Hacked: Weaponized HWMonitor & Compromised Deliver

The cpuid.com website, host to popular system utilities CPU-Z and HWMonitor, is at the center of an active supply chain security incident. Users downloading HWMonitor 1.63 or CPU-Z ZIPs since early...

Marcus Rodriguez
Marcus Rodriguez
April 10, 2026 3 Min Read
4 0

The cpuid.com website, host to popular system utilities CPU-Z and HWMonitor, is at the center of an active supply chain security incident.

Users downloading HWMonitor 1.63 or CPU-Z ZIPs since early April have reportedly received trojanized installers capable of dropping malicious DLLs, evading antivirus detection through in-memory execution, and establishing connections to attacker-controlled infrastructure.

Community reports surfaced primarily on Reddit on April 10, 2026, describing a consistent and alarming pattern: users who clicked the official HWMonitor 1.63 download link on cpuid.com did not receive the expected file, hwmonitor_1.63.exe, but instead downloaded a file named HWiNFO_Monitor_Setup.exe.

Website Compromised to Deliver Weaponized versions

The discrepancy doesn’t appear accidental. The filename appears deliberately crafted to blend two trusted hardware monitoring brands — CPUID and HWiNFO exploiting the habit users have of trusting familiar utility names over scrutinizing exact package filenames.

Mr. Titus Tech is correct. cpuid-dot-com is indeed delivering malware right now.

As I began poking this with I stick I discovered this is not your typical run-of-the-mill malware. This malware is deeply trojanized, distributes from a compromised domain (cpuid-dot-com), performs… https://t.co/ubkXmG7LKV pic.twitter.com/jPlAMmpijN

— vx-underground (@vxunderground) April 10, 2026

Multiple users additionally reported Windows Defender alerts triggering on download, Russian-language dialog text appearing within the Inno Setup installer wrapper, and detection flags across multiple VirusTotal scanners.

The malicious payload has been observed dropping cryptbase.dll, a DLL hijacking technique commonly used to gain persistent, stealthy execution. The multi-stage threat uses in-memory tricks to bypass conventional antivirus scanning, making detection at the filesystem level unreliable.

What is confirmed is a compromised download environment. What remains forensically unresolved is the precise mechanism. The CPUID website itself presents a notable technical asymmetry: the setup installer and ZIP packages for HWMonitor 1.63 do not serve from the same infrastructure.

The setup path routes through a dedicated download.cpuid.com subdomain, while the ZIP version links directly to a Cloudflare R2 object storage domain, a split infrastructure that could represent a manipulation point.

The most plausible explanation currently is that a download path within the CPUID backend was redirected, replaced, or otherwise tampered with not that the HWiNFO project itself was compromised.

This distinction matters. HWiNFO’s official download page lists version 8.44 as the current stable release (published March 4, 2026), with consistent version history and multiple verified mirrors. An earlier Bitdefender detection of HWiNFO in January 2026 was confirmed as a false positive and subsequently withdrawn as a separate and unrelated event.

Whether the CPUID incident stems from website defacement, a compromised backend object, server-side redirect manipulation, or a DNS hijack has not yet been publicly established. Treating suspicion as forensic certainty at this stage would be premature but caution is absolutely warranted.

Download links on cpuid.com are currently returning 404 errors, suggesting the site operators have pulled affected files. CPUID has not issued a public statement as of publication time, though the company is reportedly investigating. Security researchers have dissected the installer samples and flagged them on VirusTotal as multi-stage threats.

Recommended Actions

  • Do not download anything from cpuid.com until the company issues a verified all-clear
  • Scan your system immediately if you downloaded HWMonitor or CPU-Z after April 3, 2026
  • Check for cryptbase.dll in application directories as an indicator of compromise
  • Switch to HWiNFO (hwinfo.com) as a safe, actively maintained alternative for hardware monitoring
  • Verify file hashes against official sources before executing any system utility installer

This incident is a sharp reminder that even the most routine diagnostic tools can become threat delivery vectors when the infrastructure behind them is targeted.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwareSecurityThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Trojanized OpenVSX Extension Spreads GlassWorm Across Code

Next Post

TP-Link Flaws Let Attackers Seize Multiple Vulnerabilities

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Deploy Modular RAT for Credential Theft With Screenshot
May 8, 2026
PamDOORa Backdoor Attacks Linux, Attacking Systems
May 8, 2026
Škoda Online Shop Security Incident Exposes Customers Data
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us