Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

662+ Articles
118+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads
CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads
NEWS

CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads

Unknown threat actors compromised cpuid.com for less than 24 hours, serving malicious versions of CPU-Z, HWMonitor, and other popular hardware monitoring tools bundled with the STX remote access trojan.

Dylan H.

News Desk

April 12, 2026
4 min read

CPUID Website Compromised to Serve STX RAT

Unknown threat actors successfully compromised cpuid.com, the official website of CPUID — a company best known for its popular hardware monitoring utilities CPU-Z and HWMonitor — for a period of less than 24 hours. During the window of compromise, visitors downloading software from the site received trojanized executables bundled with a remote access trojan dubbed STX RAT.

The incident represents another in a growing series of software supply chain attacks targeting trusted developer and system administrator tooling to maximize the reach and credibility of malware distribution.

About CPUID and Its Tools

CPUID develops widely-used system information and hardware monitoring utilities trusted by PC enthusiasts, overclockers, IT professionals, and system builders worldwide:

ToolPurposeEstimated Users
CPU-ZCPU, motherboard, memory, and GPU informationTens of millions
HWMonitorHardware sensor monitoring (temps, voltages, fan speeds)Several million
HWMonitor ProExtended monitoring with remote access featuresEnterprise/Pro users
PerfMonitorCPU performance monitoringEnthusiast users

The high trust associated with these utilities — commonly recommended by tech forums and used in PC build validation — makes them an attractive vehicle for malware distribution.

The Compromise

Timeline

  • Discovery: Security researchers identified anomalous downloads from cpuid.com
  • Window: The malicious files were served for less than 24 hours before the compromise was detected and remediated
  • Recovery: CPUID restored legitimate downloads following the incident

Malicious Payload: STX RAT

The trojanized executables delivered STX RAT, a remote access trojan with capabilities including:

  • Remote shell access — full command execution on compromised systems
  • File system access — read, write, and exfiltrate files
  • Keylogging — capture credentials and sensitive input
  • Screen capture — monitor user activity
  • Persistence — survives reboots via registry modifications or scheduled tasks
  • C2 communication — encrypted communications to attacker-controlled infrastructure

The malicious executables were designed to appear functionally identical to the legitimate tools, executing the expected hardware monitoring functions while silently installing the RAT in the background.

Who Is at Risk

Users who downloaded any CPUID software directly from cpuid.com during the compromise window should assume their systems may be compromised. High-risk profiles include:

  • IT professionals and sysadmins who regularly use hardware diagnostics
  • PC overclockers and enthusiasts who routinely run CPU-Z during hardware testing
  • Enterprise IT staff who may have downloaded HWMonitor Pro for fleet management
  • Users who auto-update or downloaded fresh copies during the affected period

Detection and Response

Indicators of Compromise

Security vendors have begun releasing indicators of compromise (IoCs) for STX RAT. Check your endpoint detection and response (EDR) tools for:

  • Suspicious child processes spawned by CPUID utilities
  • Network connections from hardware monitoring tools to unexpected external IPs
  • Persistence entries (registry run keys, scheduled tasks) created by CPUID executables
  • Presence of STX RAT signatures in endpoint security scans

Recommended Actions

If you downloaded CPUID software during the affected period:

  1. Isolate the affected system from the network immediately
  2. Run a full malware scan with an updated AV/EDR solution
  3. Check for persistence mechanisms — review scheduled tasks, startup entries, and registry run keys
  4. Audit network connections for outbound traffic from the CPUID tool executables
  5. Rotate all credentials accessible from the affected machine — passwords, SSH keys, API tokens
  6. Re-download software only from CPUID's official site and verify file hashes against published checksums

Supply Chain Attack Context

This incident follows a well-established attacker playbook: compromise a trusted software distribution site to weaponize legitimate tool downloads. Notable precedents include:

  • The SolarWinds supply chain attack (2020) via build system compromise
  • CCleaner poisoning (2017) that delivered a backdoor to millions of users
  • The 3CX Desktop App trojanization (2023) by the Lazarus Group
  • Recent CPUID-adjacent attacks targeting developer tooling and hardware utilities

The brief 24-hour window suggests either rapid detection by CPUID or a targeted, time-limited operation designed to minimize exposure while still achieving meaningful distribution.

Verification

To verify the integrity of CPUID downloads:

# Compare the SHA-256 hash of your downloaded file against CPUID's official checksums
certutil -hashfile cpuz.exe SHA256   # Windows
sha256sum cpuz.exe                   # Linux/macOS

CPUID publishes file hashes on their website for verification. Always validate checksums before running downloaded executables, particularly after any reported compromise of a software vendor.

References

  • The Hacker News — CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads
  • CPUID Official Website
#Data Breach#Supply Chain#Malware#RAT#CPU-Z#HWMonitor

Related Articles

Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

Two newly published versions of the widely used Axios HTTP client library — v1.14.1 and v0.30.4 — were found to contain a malicious fake dependency that...

6 min read

Trivy Vulnerability Scanner Breached to Push Infostealer via GitHub Actions

The Trivy open-source vulnerability scanner was compromised in a supply chain attack by the threat group TeamPCP, which hijacked 75 release tags and...

6 min read

Trivy Security Scanner GitHub Actions Breached — 75 Tags Hijacked to Steal CI/CD Secrets

Trivy, Aqua Security's widely used open-source vulnerability scanner, was compromised a second time in a month. Attackers hijacked 75 GitHub Actions tags...

6 min read
Back to all News