Ransomware & Malware

CPUID Hacked: Malware in CPU-Z Downloads

A quick download for CPU specs just infected thousands with sophisticated malware. CPUID's API breach shows how even trusted diagnostics become hacker bait.

Compromised CPUID download page redirecting to malicious HWiNFO installer

Key Takeaways

  • Hackers used a compromised API to poison official CPU-Z and HWMonitor download links with advanced infostealer malware.
  • The attack mirrors FileZilla's breach, targeting trusted utilities for maximum reach among millions of users.
  • Verify file hashes before installing; CPUID has restored clean downloads but transparency lags.

Rain pelted the office window in Paris as CPUID’s team scrambled—hackers had just turned their flagship tools into malware mules.

CPUID hacked. That’s the stark reality hitting millions of users who grab CPU-Z and HWMonitor to peek inside their rigs. These aren’t fringe apps; they’ve got tens of millions of downloads, baked into tech forums, overclockers’ routines, and IT checklists worldwide. But last week, the official site flipped malicious—download links rerouted to Cloudflare R2, serving up a trojanized HWiNFO installer instead of the real deal.

Users spotted it first on Reddit. Clean files still sat at direct URLs, but the main portal? Poisoned. Igor’s Labs and vxunderground dove in, confirming a multi-stage beast: file masquerading from cpuid.com itself, in-memory ops, EDR evasion via proxied NTDLL from .NET. Not amateur hour.

How Did a Simple API Breach Unleash This Chaos?

Look, CPUID externalized downloads—smart for scaling, dumb for security if that API’s the weak link. Hackers slipped in, swapped links while the lead dev vacationed. No ransomware flair here; it’s stealthy infostealer vibes, flagged as Tedy or Artemis on VirusTotal by 20 engines. Russian Inno Setup wrapper screams suspicion—why wrap legit HWiNFO in that?

vxunderground nailed it:

“As I began poking this with a stick, I discovered this is not your typical run-of-the-mill malware. This malware is deeply trojanized, distributes from a compromised domain (cpuid-dot-com), performs file masquerading, is multi-staged, operates (almost) entirely in-memory, and uses some interesting methods to evade EDRs and/or AVs such as proxying NTDLL functionality from a .NET assembly.”

That’s not hype. It’s TTPs echoing last month’s FileZilla hit—same crew, targeting utility kings users install without a second thought.

CPUID fixed it fast, per their statement. Clean binaries flow again. But trust? Shattered. They admitted the timing sucked—dev on holiday, response lagged.

Why Target Diagnostic Tools Like CPU-Z?

Data. Pure, cold market dynamics. CPU-Z and kin run on 100 million+ machines yearly—Steam Hardware Survey alone shows similar tools everywhere. Users grant admin rights blindly: ‘Just need temps.’ Boom—credentials harvested, browsers scraped.

Here’s my unique angle, absent from the chatter: this mirrors the 2017 NotPetya blueprint, where trusted Ukrainian accounting software (M.E.Doc) got backdoored pre-ransomware. Except CPUID’s global, English-facing, hitting gamers to sysadmins. Prediction? We’ll see copycats on Speccy or AIDA64 next quarter. Why? Low barrier—APIs are everywhere, vetting’s rare. Enterprises scan code, not chains.

Numbers back the peril. CPU-Z: 30M+ downloads lifetime. HWMonitor: similar. If 1% grabbed the bad batch? 600,000 infections. Infostealers net $1B yearly (Chainalysis); this group’s just dipping in.

But—hold up—is CPUID’s PR spin holding water? ‘Fixed now, originals intact.’ Sure. Yet no breach date, no affected versions list, no reset-your-passwords nudge. Feels like minimal viable response, not transparency gold standard.

Is Downloading CPU-Z Safe Again?

Short answer: verify hashes, always. CPUID posted SHA-256 for 2.09 (CPU-Z) and 1.63 (HWMonitor)—match ‘em via PowerShell or HashCalc. Direct links work; avoid the portal till they audit.

Worse, check your rig. Task Manager for odd Russian processes? Malwarebytes or ESET scans caught siblings. vxunderground’s loader? Advanced—persists via registry, phones home subtly.

Market ripple: shares dipped nowhere (CPUID’s indie), but trust erosion hits. Alternatives like HWiNFO (ironic victim here) or Open Hardware Monitor surge. Users pivot; CPUID bleeds relevance unless they open-source the chain.

And the human cost—picture the overclocker frying his 13900K, grabs CPU-Z, loses Steam wallet next day. Or the IT pro prepping a fleet, seeding malware firmwide.

CPUID’s statement dodged timelines but promised cleanup. Good enough? Barely. In a world where SolarWinds scorched 18,000 orgs, this demands full postmortem—publicly.

What Does This Mean for Utility Downloads Everywhere?

Supply chain’s the new front. 2023 saw 1,200+ attacks (Sonatype); diagnostics? Sitting ducks—zero-day trust baked in. My take: firms like CPUID need API keys rotated 90-day max, downloads pinned to CDNs with sigs. Users? Shift left—VirusTotal every .exe.

Bold call: expect regulators to mandate chain-of-trust certs for top-100 utils by 2025. EU’s Cyber Resilience Act looms; ignore at peril.

One punchy fix. Ditch auto-downloads. Hash. Scan. Repeat.

This isn’t hype—it’s the new normal for tools we can’t live without.


🧬 Related Insights

Frequently Asked Questions

What happened in the CPUID hack?

Hackers compromised CPUID’s API, redirecting CPU-Z and HWMonitor downloads to a trojanized HWiNFO infostealer hosted on Cloudflare.

Is CPU-Z safe to download now?

Yes, after the fix—verify SHA-256 hashes from official site and scan with VirusTotal before running.

How do I check if I got the CPUID malware?

Run full scans with Malwarebytes or ESET; look for suspicious Russian installers or network calls in Task Manager.

Aisha Patel
Written by

Former ML engineer turned writer. Covers computer vision and robotics with a practitioner perspective.

Frequently asked questions

What happened in the <a href="/tag/cpuid-hack/">CPUID hack</a>?
Hackers compromised CPUID's API, redirecting CPU-Z and HWMonitor downloads to a trojanized HWiNFO infostealer hosted on Cloudflare.
Is CPU-Z safe to download now?
Yes, after the fix—verify SHA-256 hashes from official site and scan with VirusTotal before running.
How do I check if I got the CPUID malware?
Run full scans with Malwarebytes or ESET; look for suspicious Russian installers or network calls in Task Manager.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Bleeping Computer

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.