HWMonitor version 1.63, served from the official CPUID website, was compromised with malware detected by Windows Defender and VirusTotal. A user discovered the malicious version while updating, verified that earlier versions remained clean, and confirmed the download originated from the legitimate cpuid.com domain. The incident suggests server compromise or network-level attack on CPUID's distribution infrastructure.
Infrastructure
CPU-Z and HWMonitor Compromised
CPUID's HWMonitor 1.63 served from the official domain was backdoored with malware—a supply chain attack exposing the precarity of system utility distribution.
Friday, April 10, 2026 12:00 PM UTC2 MIN READSOURCE: Hacker NewsBY sys://pipeline
Tags
infrastructure
/// RELATED
Products4d ago
Progressive Web Components
Elena (2.6kB) enables progressive enhancement for Web Components—baseline HTML/CSS rendering plus JavaScript interactivity—solving SSR and framework lock-in in a single library.
Products4d ago
Introducing Dynamic Workflows: durable execution that follows the tenant
Cloudflare Workers now supports durable, dynamic code execution on multi-tenant platforms — enabling AI agents and CI/CD systems to safely run versioned, isolated workloads without rebuilds.