CPU-Z and HWMonitor compromised

theregister.com

186 points by pashadee 8 hours ago


https://xcancel.com/vxunderground/status/2042483067655262461

https://old.reddit.com/r/pcmasterrace/comments/1sh4e5l/warni...

https://www.bleepingcomputer.com/news/security/supply-chain-...

john_strinlai - 6 hours ago

some comments purportedly (i did not verify) from one of the maintainers:

>Dear All, I'm Sam and in I'm working with Franck on CPU-Z (I'm doing the validator). Franck is unfortunately OOO for a couple weeks. I'm just out of bed after worked on Memtest86+ for most the night, so I'm doing my best to check everything. As very first checks, the file on our server looks fine (https://www.virustotal.com/gui/file/6c8faba4768754c3364e7c40...) and the server doesn't seems compromised. I'm investigating further... If anyone can tell me the exact link to the page where the malware was downloaded, that would help a lot

>Thank you. I found the biggest breach, restored the links and put everything in read-only until more investigation is done. Seems they waited Franck was off and I get to bad after working on Memtest86+ yesterday :-/

>The links have been compromised for a bit more than 6 hours between 09/04 and 10/04 GMT :-/

so, it appears that the cpuid website was compromised, with links leading to fake installers.

quantummagic - 5 hours ago

> after the download my Windows Defender instantly detecting a virus.

> (because i am often working with programms which triggering the defender i just ignored that)

This again shows the unfortunate corrosive effect of false-positives. Probably impossible to solve while aggressively detecting viruses though.

jl6 - 5 hours ago

To our new generation of human shields willing to use software releases less than a month old, we salute your sacrifice.

cachius - 6 hours ago

It's HWMonitor https://www.cpuid.com/softwares/hwmonitor.html and not HWInfo https://www.hwinfo.com/

So two programs from CPUID. I wonder if there are more affected.

Same topic on Reddit at https://news.ycombinator.com/item?id=47718830 @dang

orthogonal_cube - 6 hours ago

Seems the installers hosted by them are fine. The links on the site have been changed to direct people towards Cloudflare R2 storage with various copies of malicious executables.

Looking forward to information down the line on how this came about.

ASalazarMX - an hour ago

Just my luck that I needed and downloaded CPU-Z yesterday at work, after not needing it for years. Fortunately my download is not detected as malicious by Virustotal, but what a scare.

kyrra - 6 hours ago

For windows users, this is an advantage of using `winget` for installing things. It points to the installer hosted elsewhere, but it at least does a signature check. The config for the latest installer is listed here: https://github.com/microsoft/winget-pkgs/blob/master/manifes...

which you can install with:

   winget install --exact --id CPUID.CPU-Z
(there is a --version flag where you can specify "2.19", which the signature there is a month old, so it should be safe to install that way)
kevincloudsec - 6 hours ago

same threat group hit filezilla last month with a fake domain. this time they didn't even need a fake domain, they compromised the real one's api layer. the attack is evolving from 'trick users into visiting the wrong site' to 'make the right site serve the wrong file.'

cachius - 6 hours ago

This is bad. I like to install software with winget. Are the versions there also compromised?

v1.63 updated 6 days ago https://github.com/microsoft/winget-pkgs/tree/master/manifes... via https://winstall.app/apps/CPUID.HWMonitor

v2.19 updated 15 days ago https://github.com/microsoft/winget-pkgs/tree/master/manifes... via https://winstall.app/apps/CPUID.CPU-Z

amatecha - 6 hours ago

some good details here https://xcancel.com/vxunderground/status/2042483067655262461

kevincloudsec - 6 hours ago

same threat group hit filezilla last month. they're specifically targeting utilities that tech-savvy users trust and download from official sources. the attack surface is the the api layer that generates download links, not the binary itself

VimEscapeArtist - 29 minutes ago

Wait, people still download unsigned exes from PHP-era websites in 2026? And then act surprised when the download link starts pointing to malware?

At this point if your software isn't distributed through a repo with verifiable builds, you're basically running a malware lottery for your users. The only question is when, not if.

CPUID got lucky it was only 6 hours. Imagine if the attackers had better taste in filenames than "HWiNFO_Monitor_Setup.exe" lmao

cachius - 5 hours ago

Grok post linking further sources: https://x.com/i/grok/share/3b870ceb9b424c01bf89afbe0de3bd81

moomoo11 - 2 hours ago

One interesting thing about all this stuff is that we may see a big swing towards paid/trusted solutions for all these type of things.

Maybe the 5-10% of true nerds will go find the l33t open source solutions, but most people will just use some paid solution.

Maybe Steam could build. Or in Windows. Or some SaaS solution for registry.

In exchange you just share your HW info

BoredPositron - 5 hours ago

"Bug fixes and general improvements."

Supply chain attacks are easier because changelogs for most software are useless now if they are provided at all.

- 4 hours ago
[deleted]
unethical_ban - 5 hours ago

I've wondered about this while using CachyOS and their package installer. I don't know what repos do what, I don't really understand the security model of the AUR, and I wonder, if I download a package, how can I know it's legitimate or otherwise by some trusted user of the community vs. some random person?

wang_li - 6 hours ago

Jesus. I see that post and comment section and I immediately expect to hear Joey telling me about how this ATM is Idaho started spraying cash after his hack of the Gibson. That is a real-life reproduction of the perception of hackers in films in the '90s.

- 6 hours ago
[deleted]