← Back to Tech & Science

Supply Chain Attack Targets CPUID Software with Malware

Tech & ScienceAI-Generated & Algorithmically Scored··1 UPDATE

AI-generated from multiple sources. Verify before acting on this reporting.

Update

Security researchers have received additional corroborating reports regarding the supply chain attack targeting CPUID software. These new reports confirm the ongoing distribution of malware through compromised versions of system monitoring tools. The incident continues to affect users who have downloaded infected packages of CPU-Z and HWMonitor. No new details have emerged regarding the specific distribution channel or the identity of the threat actors behind the campaign. The additional reports reinforce the initial findings that malicious code is being bundled with legitimate downloads. Users are advised to exercise caution when downloading system utilities and to verify the integrity of software before installation. The attack remains active, with security teams continuing to monitor the situation for further developments. No new mitigation strategies have been announced beyond standard security practices. The incident highlights the persistent risks associated with supply chain vulnerabilities in widely used software tools.

Original Report —

A sophisticated supply chain attack targeting CPUID is currently distributing malware through compromised versions of popular system monitoring tools, security researchers confirmed Thursday.

The campaign involves malicious code bundled with legitimate downloads of CPU-Z and HWMonitor, two widely used utilities for analyzing computer hardware specifications. The infected software packages are being pushed to users through what appears to be a compromised distribution channel, bypassing standard security checks.

CPUID, a Belgian software company known for its hardware identification tools, has not yet issued a public statement regarding the incident. The company’s official website remains operational, but security advisories have not been posted. Users who downloaded the affected versions of CPU-Z or HWMonitor may have inadvertently installed the malicious payload alongside the legitimate software.

The malware’s specific capabilities remain unclear. Early analysis indicates the code is designed to establish persistence on infected systems, though the full scope of its operations has not been determined. Security experts warn that the infection could allow attackers to gather sensitive system information or maintain long-term access to compromised machines.

The attack was first detected on April 10, 2026, at approximately 13:19 UTC. The timing suggests a coordinated effort to distribute the malicious software during peak usage hours. No specific threat actor has claimed responsibility for the campaign, and the origin of the compromised distribution channel remains unknown.

System administrators and individual users are advised to verify the integrity of their CPU-Z and HWMonitor installations. Security professionals recommend scanning affected systems with updated antivirus software and checking file signatures against known legitimate versions. Those who suspect they have downloaded the compromised software should disconnect from networks and seek professional assistance.

The incident highlights the ongoing risks associated with supply chain attacks, where attackers compromise trusted software distributors to reach end users. Unlike traditional malware campaigns that rely on phishing or exploit kits, supply chain attacks leverage the credibility of established software vendors to bypass security defenses.

Questions remain regarding the scale of the infection and the number of users affected. Security firms are working to identify all compromised download links and alert users who may have been exposed. The attack also raises concerns about the security practices of software distributors and the potential for similar campaigns targeting other popular utilities.

As of Thursday afternoon, no official timeline for remediation has been announced. Users are urged to exercise caution when downloading system monitoring tools and to rely only on verified sources. The situation remains fluid as investigators work to understand the full extent of the compromise.