CPUID Breach Distributes STX RAT Through Trojanized CPU-Z and HWMonitor Downloads

A recent cybersecurity incident has revealed that unknown threat actors compromised CPUID, the developer behind widely used system tools like CPU-Z and HWMonitor, to distribute malware through trojanized software downloads. The breach allowed attackers to replace legitimate download links on the official website with malicious versions for a limited time window.

The attack occurred between April 9 and April 10, during which users attempting to download the tools were unknowingly served infected installers hosted on rogue domains. Despite the breach, CPUID confirmed that its original signed files remained secure, and the issue stemmed from a compromised secondary API that redirected users to malicious sources.

The infected packages were designed to deploy a remote access trojan known as STX RAT. These trojanized files included both legitimate executables and a malicious DLL file named “CRYPTBASE.dll,” which leveraged DLL side-loading techniques to execute harmful payloads without raising immediate suspicion.

Once activated, the malware connected to external servers to download additional payloads while performing anti-sandbox checks to evade detection. The STX RAT provides attackers with extensive control over compromised systems, enabling remote command execution, in-memory payload deployment, reverse proxy tunneling, and even direct desktop interaction.

Security researchers noted that the command-and-control infrastructure used in this campaign overlaps with earlier attacks that distributed similar malware through trojanized installers of other software, indicating a broader, ongoing threat campaign.

The incident highlights the growing risk of software supply chain attacks, where trusted platforms are exploited to distribute malware at scale. Experts advise users who downloaded affected files during the breach window to immediately scan their systems and rotate all sensitive credentials to mitigate potential compromise.

- Advertisement -

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

error: Content is protected !!

Share your details to download the report 2026

Share your details to download the Cybersecurity Report 2025

Share your details to download the CISO Handbook 2025

Sign Up for CXO Digital Pulse Newsletters

Share your details to download the Research Report

Share your details to download the Coffee Table Book

Share your details to download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024

Fill your details to Watch