Anyone who downloaded CPU-Z or HWMonitor from the official CPUID website in recent days may have received malware instead of the real software. Hackers breached CPUID’s site and swapped out legitimate installers for both tools with trojanized versions, according to multiple security outlets that reported the incident in April 2026. CPUID has confirmed the compromise and says it has been fixed, but the company has shared almost no detail about what happened, leaving users to figure out on their own whether their systems are clean.
What happened
Attackers gained access to CPUID’s website infrastructure and replaced the genuine installer files for CPU-Z and HWMonitor with packages containing malware. CPU-Z is a free processor identification and monitoring utility; HWMonitor reads hardware sensor data such as temperatures, voltages, and fan speeds. Both have been staples of the PC enthusiast and IT professional toolkit for well over a decade.
The malicious files were served directly from CPUID’s own domain, not from a lookalike phishing page. Security researchers at BleepingComputer documented the supply-chain breach and confirmed that visitors to the legitimate site were the ones at risk. A separate write-up on Cyber Kendra corroborated those findings, noting that the attackers pushed malicious installers through CPUID’s own distribution channels.
Antivirus engines began flagging the downloads, which triggered public reports and forced CPUID to respond. In a statement relayed through PC Guide, the company said the breach had “been fixed.” That single sentence is the only public comment CPUID has made so far. It did not specify when the compromise started, what type of malware was distributed, or how many users downloaded the tainted files.
Why this breach matters
This is a textbook supply-chain attack: rather than targeting individual users with phishing emails or fake websites, the attackers poisoned software at its source. That approach exploits the trust people place in official download pages. A PC builder grabbing CPU-Z before an overclock, or an IT technician pulling HWMonitor to audit workstation temperatures, would have had no obvious reason to question files served from the real CPUID domain over HTTPS.
The depth of access is also concerning. According to BleepingComputer’s reporting, the attackers were able to replace files served through CPUID’s distribution channels, though exactly how far the intrusion extended into the company’s infrastructure has not been publicly detailed. Whether the compromise involved deeper backend systems or was limited to the file-serving layer remains unclear, and that ambiguity itself raises questions about whether other parts of CPUID’s infrastructure were also exposed.
Code signing and detection
One factor directly relevant to detection is whether CPUID’s tools carry valid digital signatures. None of the sources reviewed for this article confirm whether the legitimate CPU-Z and HWMonitor installers are routinely code-signed by CPUID, or whether the trojanized replacements lacked or carried forged signatures. If the genuine installers are normally signed, users and security tools could compare signatures to identify tampered files. If they are not, distinguishing a clean installer from a malicious one becomes harder without checking file hashes against a known-good reference. CPUID has not addressed this point in its public statement, and the gap makes it more difficult for affected users to verify their downloads after the fact.
What we still don’t know
Key details remain missing. No malware sample hashes, command-and-control server addresses, or technical teardowns have been published in the sources reviewed for this article. Without indicators of compromise, affected users cannot run targeted scans for the specific threat. They are limited to broad antivirus sweeps.
The timeline is also fuzzy. Reports place the exposure window within the past week, but no source has pinpointed an exact start date. Whether the malicious files were live for hours or days makes a significant difference: CPU-Z is one of the most downloaded free utilities in the hardware monitoring category, so even a short window could mean a large number of compromised machines.
No confirmed infection counts or geographic breakdowns have been published. The identity and motive of the attackers are unknown. Supply-chain compromises can serve different purposes, from distributing information-stealing trojans for financial gain to planting backdoors for espionage. Without a forensic analysis tying the payload to a known threat group, attribution remains speculative.
What to do if you downloaded recently
Users who grabbed CPU-Z or HWMonitor from the CPUID website during the affected period should take three steps immediately:
- Run a full system scan using an updated antivirus engine. Because the specific malware strain has not been publicly identified, a comprehensive scan is the best available option.
- Check file hashes. Compare the SHA-256 hash of any recently downloaded CPUID installer against known-good values. Trusted third-party repositories such as major download aggregators that independently verify files can serve as a reference point.
- Re-download from a verified source. CPUID says the breach is resolved, which suggests current downloads should be clean. Still, verifying the digital signature on any new installer before running it adds a necessary layer of assurance.
For organizations, the episode is a reminder to treat small free utilities with the same caution as any other executable. Security teams should maintain internal repositories of vetted tools, verify digital signatures where available, and restrict ad hoc downloads from the open web onto production systems. Network controls that flag unusual outbound connections from newly installed software can also limit damage if a trojanized installer slips through.
The bigger picture
Unlike applications delivered through managed app stores with built-in code-signing verification, standalone utilities like CPU-Z are typically downloaded straight from a project’s website with minimal automated security checks on the user’s end. A familiar logo and an HTTPS padlock are not enough. This breach demonstrates that even an authentic domain can deliver compromised code when attackers reach the site’s infrastructure.
CPUID now faces pressure to publish a transparent post-incident report: a clear timeline, indicators of compromise, and a description of the steps taken to prevent a repeat. That kind of disclosure helps affected users respond proportionately and is standard practice after supply-chain incidents of this nature. Until that report appears, the prudent approach is cautious skepticism. Assume a non-zero risk if you downloaded either tool recently, take the defensive steps outlined above, and watch CPUID’s official channels for updates.
More from Morning Overview
*This article was researched with the help of AI, with human editors creating the final content.