Popular PC DIY enthusiast tools like CPU-Z and HWMonitor were briefly compromised during the night between April 9 and April 10. This left anyone who downloaded these tools from the CPUID website vulnerable to malware they thought was a normal software tool. What actually happened was that multiple users on Reddit noticed their downloads from CPUID for both CPU-Z and HWMonitor were flagged multiple times by Windows Defender for security concerns. During that night, users attempting to download these popular utilities found the website pointing to a different host where the modified .exe files were stored. After realizing what was happening, users started removing these compromised .exe files and waited for CPUID to issue a statement. One of the owners of CPUID published a statement on X, explaining that attackers had replaced the original download links with malware-infected file links, resulting in a widespread security vulnerability. Thankfully the website is now back up and safe to resume downloads.
Hi,
Investigations are still ongoing, but it appears that a secondary feature (basically a side API) was compromised for approximately six hours between April 9 and April 10, causing the main website to randomly display malicious links (our signed original files were not compromised). The breach was found and has since been fixed. Sorry for the inconvenience. I did my best to fix that mess as soon as possible :-/
Sam.
Community tools like CPU-Z are essential software for everyone’s PC. Similarly, TechPowerUp publishes GPU-Z software, and we understand the challenges faced by the owners of CPU-Z and HWMonitor. Hopefully, the spread of the malicious files was minimal, and the CPUID team can recover from the issue without any problems. For now, users can continue installing CPUID’s software without any issues.