CPUID breach taints official CPU-Z and HWMonitor downloads with trojanized HWiNFO variant

1 min read
Source: BleepingComputer
CPUID breach taints official CPU-Z and HWMonitor downloads with trojanized HWiNFO variant
Photo: BleepingComputer
TL;DR Summary

A CPUID API breach briefly redirected CPU-Z and HWMonitor download links to a trojanized HWiNFO variant, delivered via HWiNFO_Monitor_Setup with DLL sideloading and a C2 connection. The attack lasted about six hours (Apr 9–10), affecting roughly 150 users and some organizations; targeted products included CPU-Z 2.19, HWMonitor Pro 1.57, HWMonitor 1.63, and PerfMonitor 2.04. CPUID says clean installers are now served; users should download only from official CPUID sources and verify signatures to avoid future tampering.

Share this article

Reading Insights

Total Reads

0

Unique Readers

7

Time Saved

4 min

vs 5 min read

Condensed

92%

96476 words

Want the full story? Read the original article

Read on BleepingComputer