CPUID confirmed yesterday that a supply chain attack compromised its website for six hours on April 9-10, 2026, delivering trojanized malware to users downloading CPU-Z and HWMonitor. Users visiting the official cpuid.com site during the breach window received malicious installers instead of legitimate software – what The Register described as “a coin toss between trusted utilities and credential-stealing malware.” The attack targeted the download delivery API, not the software itself, redirecting users to infrastructure hosting at supp0v3.com – the same command-and-control server behind March’s FileZilla compromise. This isn’t an isolated incident. It’s a systematic campaign weaponizing trusted developer tools.
CRYPTBASE.dll Masquerade: Sophisticated Credential Theft
The malware disguised itself as CRYPTBASE.dll, a legitimate Windows system component, to evade detection. This wasn’t amateur work – security researcher N3mes1s’s technical analysis documented a multi-stage attack chain that suspends the application thread, decodes 349KB shellcode, reflective-loads encrypted payloads via DNS-over-HTTPS, spawns PowerShell via stdin pipe to compile C# code on the victim machine, then injects .NET payloads into other processes. The entire operation runs primarily in-memory to avoid antivirus detection.
vx-underground, a security research collective, called it “deeply trojanized… operates almost entirely in-memory, and uses interesting methods to evade EDRs and antivirus software such as proxying NTDLL functionality from a .NET assembly.” The malware’s primary goal: steal browser credentials. Anyone who downloaded CPU-Z or HWMonitor during the six-hour window faces credential theft risk requiring password changes across all browser-saved accounts.
The technical sophistication matters because the targets aren’t random home users – they’re developers, overclockers, IT professionals, and system builders who rely on CPU-Z and HWMonitor for hardware monitoring. Credential theft from these machines grants access to corporate networks, code repositories, and cloud infrastructure. That’s the endgame.
FileZilla, Trivy, Axios, Now CPUID: Systematic Campaign
The same supp0v3.com infrastructure was used to compromise FileZilla downloads in early March 2026, one month before the CPUID attack. This proves the breach wasn’t opportunistic or CPUID-specific – it’s part of a broader pattern targeting developer tools.
March 2026 saw a surge in supply chain attacks according to Zscaler ThreatLabz. Aqua Security’s Trivy, one of the most widely used open-source vulnerability scanners, was compromised March 19 with tag poisoning, binary tampering, and a self-propagating worm – what Palo Alto Networks called “the most sophisticated supply chain attack on a security tool to date.” The Axios NPM package was compromised March 30 via account takeover, injecting a cross-platform RAT dropper targeting macOS, Windows, and Linux systems.
The pattern is clear: FileZilla (early March), Trivy (March 19), Axios (March 30), CPUID (April 9-10). All within six weeks. All targeting tools developers trust. The threat actors aren’t slowing down.
How Users Caught the Breach Before Official Confirmation
Community detection preceded CPUID’s official disclosure. Users on Reddit and forums noticed Windows Defender flagging malicious installers. Downloads arrived with suspicious filenames – “HWiNFO_Monitor_Setup.exe” instead of the expected “hwmonitor_1.63.exe” – and some installers displayed Russian-language setup prompts, unusual for a French software company. VirusTotal submissions confirmed malware detections before CPUID publicly acknowledged the compromise.
The red flags were there: filename mismatches, antivirus warnings, modified Inno Setup packages instead of standard installers, unexpected redirects to different hosting endpoints. Users who ignored these warnings became infected. Those who stopped and verified avoided compromise. This demonstrates why ignoring security warnings – even from familiar software – is dangerous.
What Developers Should Do Now
First, verify hashes. Always. The fundamental assumption that “official vendor sites are safe” is dead. CPUID proved even trusted sources can deliver malware. SHA256 hash verification isn’t optional anymore – it’s critical. The problem is CPUID, like most vendors, doesn’t prominently publish hashes for downloads, and 99% of users skip verification because it’s too inconvenient. The ecosystem needs better tooling – browser plugins for automatic hash verification, OS-level download attestation, something to close this gap.
Second, audit your system if you downloaded CPU-Z or HWMonitor on April 9-10. Check for CRYPTBASE.dll files, monitor for unusual PowerShell activity, scan with updated antivirus. Change all browser-saved passwords – the malware specifically targeted credentials via Google Chrome’s IElevation COM interface. Enable MFA on all accounts to mitigate credential theft damage.
Third, consider package managers when available. Chocolatey, Winget, and other package managers offer hash-verified, audited downloads as an alternative to direct vendor sites. They may lag behind official releases, but they add a verification layer that direct downloads lack.
CPUID fixed the breach within hours of discovery and disclosed transparently, confirming “a secondary feature (basically a side API) was compromised for approximately six hours between April 9th and April 10th” and clarifying “our signed original files were not compromised.” Current downloads as of April 10 are clean. The company’s rapid response and clear communication set a good example for vendor transparency, allowing users to make informed risk assessments.
The broader lesson stands: supply chain attacks targeting developer tools are accelerating. Official sites can be compromised. Hash verification must become standard practice. The FileZilla-Trivy-Axios-CPUID pattern suggests more tools will be hit. Developers who verify everything will navigate this safely. Those who trust blindly won’t.

