CPU-Z 和 HWMonitor 被攻破
CPU-Z and HWMonitor compromised

原始链接: https://www.theregister.com/2026/04/10/cpuid_site_hijacked/

CPUID,生产HWMonitor和CPU-Z等常用系统信息工具的公司,本周早些时候遭遇了安全漏洞。攻击者入侵了CPUID网站的后端组件,将下载链接重定向到恶意软件,而不是合法的软件安装程序。 虽然软件构建本身没有被篡改且签名完好,但被入侵的“侧面API”交换了链接大约六个小时。恶意安装程序针对64位HWMonitor用户,伪装成一个假的DLL,并连接到一个命令和控制服务器以获取进一步的恶意载荷。 分析显示,该恶意软件主要在内存中运行,在受害者的机器上编译.NET代码,并试图窃取浏览器数据,包括可能解密的Google Chrome凭据。证据表明,这次攻击与之前的活动有关,表明这是一项范围更广、持续进行中的行动。CPUID已经修复了漏洞,但受影响的用户数量尚不清楚。此事件表明,攻击者即使不直接修改软件代码,也可以分发恶意软件。

## CPU-Z & HWMonitor 被攻破 - 摘要 流行的系统监控工具 CPU-Z 和 HWMonitor 近期通过供应链攻击被攻破。黑客入侵了 CPUID 官方网站,并更改了下载链接,传播了恶意安装程序数天(9月4日至10日 GMT)。攻击者针对生成下载链接的 API 层,而非二进制文件本身,标志着攻击策略的演变。 此事件凸显了即使是受信任的软件源也可能存在漏洞的风险。建议用户在下载软件时谨慎,并考虑使用诸如 `winget`(执行签名检查,但并非万无一失)或 Chocolatey 等软件包管理器。 讨论围绕这些攻击日益频繁、验证软件安全性困难以及需要更好的安全实践,例如可重现构建和强大的软件包管理。 许多用户建议在安装前查看软件包清单,一些人指出 VirusTotal 等工具在初步扫描方面的有效性。 怀疑与最近 FileZilla 被攻破的威胁组织是同一组织。
相关文章

原文

Visitors to the CPUID website were briefly exposed to malware this week after attackers hijacked part of its backend, turning trusted download links into a delivery mechanism for something far less welcome.

The issue hit tools like HWMonitor and CPU-Z, with users on Reddit and elsewhere starting to notice something wasn't right when installers tripped antivirus alerts or showed up under odd names. One example that did the rounds had the HWMonitor 1.63 update pointing to a file called "HWiNFO_Monitor_Setup.exe," which is not what anyone went there to download, and a pretty clear sign that something upstream had been tampered with.

CPUID has since confirmed the breach, pinning it on a compromised backend component rather than tampering with its software builds.

"Investigations are still ongoing, but it appears that a secondary feature (basically a side API) was compromised for approximately six hours between April 9 and April 10, causing the main website to randomly display malicious links (our signed original files were not compromised)," one of the site's owners said in a post on X. "The breach was found and has since been fixed."

The files themselves appear to have been left alone and remain properly signed, so it doesn't seem like anyone got into the build process. Instead, the problem sat in front of that, in how downloads were being served. For anyone who hit the site during that stretch, though, that distinction offers little comfort. If the link you clicked had been swapped out, you were pulling whatever it pointed to, whether you realized it or not.

Analysis shared by vx-underground says the malicious installer appears to have targeted 64-bit HWMonitor users and included a fake CRYPTBASE.dll designed to blend in with legitimate Windows components. That DLL then reached out to a command-and-control server to pull down additional payloads.

From there, things escalate. Analysis suggests the malware tries to stay off disk as much as possible, leaning on PowerShell and running largely in memory. It also pulls down additional code and compiles a .NET payload on the victim machine before injecting it into other processes. There are also signs it's going after browser data. In testing, it was seen interacting with Google Chrome's IElevation COM interface, which can be used to access and decrypt stored credentials.

The same analysis suggests links to infrastructure used in earlier campaigns, including one targeting FileZilla users, hinting that this wasn't a one-off experiment but part of a broader playbook.

CPUID says the issue is now fixed, but there's still no detail on how that API was accessed or how many people actually pulled the bad downloads. Even so, it's another reminder that attackers don't need to touch the code itself to cause harm. ®

联系我们 contact @ memedata.com