Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Hackers hijacked CPUID downloads, served STX RAT to victims
    Cybersecurity

    Hackers hijacked CPUID downloads, served STX RAT to victims

    adminBy adminApril 13, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Hackers hijacked CPUID downloads, served STX RAT to victims
    Share
    Facebook Twitter LinkedIn Pinterest Email

    If you tried to download software from CPUID’s website late last week, you might have downloaded malware instead.

    “Investigations are still ongoing, but it appears that a secondary feature (basically a side API) was compromised for approximately six hours between April 9 and April 10, causing the main website to randomly display malicious links (our signed original files were not compromised),” Samuel Demeulemeester, a contributor to CPUID, stated on Friday, and apologized to affected users.

    “The breach was found and has since been fixed,” he added.

    A poisoned “watering hole”

    CPUID (at cpuid[.]com) is a website that hosts free software utilities, primarily for Windows and Android.

    Among its most popular utilities are HWMonitor, a hardware monitoring program that reads a PC’s main health sensors, and CPU-Z, a utility that collects detailed information about PCs’ processor, codename, process, package, and cache levels.

    Alerts that something was wrong started popping up on Reddit on Friday, April 10, and one user noted that their antivirus flagged the downloaded HWiNFO_Monitor_Setup.exe as malicious.

    Kaspersky researchers say that the CPUID website redirected to malicious download from April 9, 15:00 UTC to April 10, 10:00 UTC.

    “The trojanized software was distributed both as ZIP archives and as standalone installers for aforementioned products. These files contain a legitimate signed executable for the corresponding product and a malicious DLL which is named CRYPTBASE.dll to leverage the DLL Sideloading technique,” they explained.

    “The malicious DLL is responsible for C2 connection and further payload execution. Prior to this, it also performs a set of anti-sandbox checks and, if all the checks have passed, it connects to the C2 server.”

    Malware researcher Giuseppe Massaro also flagged the CPU-Z, HWMonitor Pro, PerfMonitor, and PowerMAX downloads as trojanized/malicious.

    “CPUID’s original signed binaries were NOT compromised — the attacker served their own trojanized packages via redirect,” Massaro found. “The compromised API caused download links to randomly redirect to malicious URLs (Cloudflare R2 buckets).”

    The command and control domain (at supp0v3[.]com) from which the malware has been downloaded has been previously used in a malware campaign targeting FileZilla users with a lookalike domain and a trojanized download.

    A subdomain (ai.supp0v3.com) esposed the backend server, Massaro also discovered during his analysis.

    “The server uses a stolen or self-signed VK.com (VKontakte) wildcard certificate with Russian locality data (Saint Petersburg). This, combined with the bulletproof hosting choice (Global Connectivity Solutions — a provider frequently used for malicious hosting), strongly suggests a Russian-nexus threat actor,” he noted.

    “The same IP was used for earlier .url shortcut exploits (CVE-2023-36025 SmartScreen bypass) targeting LibreOffice and Google Drive downloads, sharing VBS payloads via WebDAV (file://147.45.178.61@80/file/…). This connects the current DLL sideloading campaign to an earlier Windows shortcut exploit campaign by the same actor.”

    What to do?

    The malicious payload in this watering hole campaign is the STX RAT, a persistent remote access trojan with credential and data theft capabilities. According to eSentire, it’s after browser credentials/cookies, crypto-wallets, and FTP client credentials.

    Kaspersky researchers pointed out that the attackers’ mistakes – reusing a previously flagged infection chain and domain names used in previous attacks – resulted in a speedy detection of this latest watering hole attack.

    Nevertheless, based on their telemerty, they have identified more than 150 victims, most of them individuals.

    “However, several organizations from various sectors, including retail, manufacturing, consulting, telecommunications and agriculture, were also affected with most infections in Brazil, Russia and China,” they added.

    They advised organizations to check their systems for traces of the malicious archives and executable files related to this attack, and to examine DNS logs for the malicious websites from which the trojanized installers have been downloaded.

    If evidence of compromise is discovered, organizations (and individuals) should clean affected systems and change all the credentials the malware might have compromised.

    Subscribe to our breaking news e-mail alert to never miss out on the latest breaches, vulnerabilities and cybersecurity threats. Subscribe here!

    CPUID Downloads hackers Hijacked RAT served STX victims
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleSpeaking Freely: Dr. Jean Linis-Dinco
    Next Article Elon Musk’s XChat Claims to Offer ‘Private’ Messaging (but Is Reserving the Right to Collect Your Data)
    admin
    • Website

    Related Posts

    Sweden Blames Pro-Russian Group for Cyberattack Last Year on Its Energy Infrastructure

    April 15, 2026

    Microsoft, Salesforce Patch AI Agent Data Leak Flaws

    April 15, 2026

    Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover

    April 15, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Sweden Blames Pro-Russian Group for Cyberattack Last Year on Its Energy Infrastructure

    April 15, 2026

    The automation drift and how to correct course

    April 15, 2026

    Posts in your Shorts? What to expect from YouTube’s experiment

    April 15, 2026

    Microsoft, Salesforce Patch AI Agent Data Leak Flaws

    April 15, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,329)
    • Privacy & Online Earning (167)
    • SEO & Digital Marketing (814)
    • Tech Tools & Mobile / Apps (1,590)
    • WiFi / Internet & Networking (224)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Sweden Blames Pro-Russian Group for Cyberattack Last Year on Its Energy Infrastructure

    April 15, 2026

    The automation drift and how to correct course

    April 15, 2026

    Posts in your Shorts? What to expect from YouTube’s experiment

    April 15, 2026
    Most Popular
    • Sweden Blames Pro-Russian Group for Cyberattack Last Year on Its Energy Infrastructure
    • The automation drift and how to correct course
    • Posts in your Shorts? What to expect from YouTube’s experiment
    • Microsoft, Salesforce Patch AI Agent Data Leak Flaws
    • Why ChatGPT Cites One Page Over Another (Study of 1.4M Prompts)
    • I Tried Binge, the Letterboxd Alternative That I Now Like More Than Letterboxd
    • How Endpoint Network Monitoring Enables Remote Work
    • Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.