If you usually download tools like CPU-Z or HWMonitor to monitor your computer performance, you may be concerned to know that the official CPUID site ( cpuid.com) was manipulated by attackers for less than 24 hours to serve malicious installers. The intrusion, according to the company itself, took advantage of a secondary functionality of the site and caused legitimate links to be replaced by readdresses to false sites hosting committed files.
The incident took place between 9 and 10 April and, although the original installers signed remained intact, some download points showed links to pages controlled by the attackers. Cybersecurity researchers like Kaspersky and response teams have tracked the addresses involved and the infection chain, and have confirmed that attackers were distributing executables accompanied by a malicious DLL named as CRYPTBASE.dll to exploit a technique known as DLL side-loading.

In simple terms, the mechanism operated like this: next to the legitimate executable of the compromised software, a malicious DLL with a name that the program would unnoticed. That DLL was communicating with external servers, doing checks to avoid sandboxes and, if it found favourable conditions, deploying additional charges. The ultimate goal of the campaign was to install a remote access Trojan called STX RAT, a malware family with information theft, remote control and payload execution capabilities in memory.
STX RAT is not a toy: it includes functions to create a virtual remote desktop (HVNC), run binaries or code in memory, establish reverse tunnels or proxies and perform direct interactions with the user screen. This flexibility makes it a powerful tool to extract credentials, move laterally into networks and control compromised equipment. Security analysts like eSentire have documented the capabilities and commands this malicious family offers to the attackers.
The striking thing about this campaign, according to reports, is that the operators reused infrastructure and configurations from a previous operation in which the FileZilla stranded installers were distributed to deploy the same RAT. This operational error made it easier for detection teams to identify and attribute the new intrusion more quickly. Signatures and domains used previously reappeared in communication with command and control servers, which made it possible to draw links between the incidents.
The cyber security companies that have analysed the case have identified more than 150 victims, mostly private users, although there are also affected organizations in sectors such as retail, manufacturing, consulting, telecommunications and agriculture. Geographically, most infections were concentrated in Brazil, Russia and China. The fact that the assault has been directed at hardware tool installers - software of common use between technicians and enthusiasts - underlines the risk of centralized supply chains and download resources.
What can users and administrators do about such threats? First, check the source of the installers: always download from official sites and, where possible, check fingerprints or software signatures. Although in this case the original signatures were not altered, the presence of additional files next to the legitimate executable is an alarm signal. Security solutions with network telemetry and behavior detection capabilities also help to identify suspicious communications to command and control domains.

Organizational defence practices should include binary integrity control, restricted execution policies, network segmentation and monitoring of outgoing connections to detect attempts to communicate with malicious servers. For those who manage download portals, the lesson is clear: the "secondary" or auxiliary APIs functions require the same security scrutiny as the core of the service, because a failure in them can serve as a vector for water-hole attacks that affect thousands of users.
If you want to read the technical analyses and official releases, you will find information on the pages of the main actors who investigated the case: the CPUID site itself ( reported in X and your website), the Kaspersky reports ( kaspersky.com), the follow-up of Malharebytes ( malwarebytes.com) and response analyses by specialized companies such as eSentire and technological means that covered history ( BleepingComputer). Consulting these sources will give you a deeper and more technical vision if you need it.
In short, this case recalls that even well-known portals can become vectors of infection if all its layers are not protected. The good news is that the reuse of infrastructure by the attackers facilitated their detection; the bad, that side-rolling technique and the use of RATs like STX remain real and effective threats. Maintaining updated software, validating downloads and combining perimeter defences with integrity controls remains the best strategy to reduce risk.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...