Back to graph

Topic analysis

CPU-Z and HWMonitor compromised

Between April 9 and 10, 2026, attackers compromised a backend API on CPUID's website, leading to trusted download links for tools like CPU-Z and HWMonitor being replaced with malicious ones over a six-hour window. The delivered malware targeted 64-bit HWMonitor users, using a fake CRYPTBASE.dll to connect to a command-and-control server, access browser credentials, and run in-memory payloads; analysis links the attack to prior campaigns targeting FileZilla users, and CPUID has since fixed the breach while investigations into the API compromise and affected user count continue.

Heat score

1

Sources

1

Platforms

1

Relations

0
First seen
Apr 10, 2026, 9:29 PM
Last updated
Apr 11, 2026, 4:43 AM

Why this topic matters

CPU-Z and HWMonitor compromised is currently shaped by signals from 1 source platforms. This page organizes AI analysis summaries, 1 timeline events, and 0 relationship edges so search engines and AI systems can understand the topic's factual basis and propagation arc.

News

Keywords

6 tags
cybersecurity breachmalicious download linksbackend API compromisein-memory malwarebrowser credential thefttrusted software tampering

Source evidence

1 evidence items

Timeline

CPU-Z and HWMonitor compromised

Apr 10, 2026, 9:29 PM

Related topics

No related topics have been aggregated yet, but this page still preserves the AI summary, source links, and timeline.