Hackers Abuse Legitimate HWMonitor Binary in Sophisticated Supply Chain Attack
When Trusted Hardware Tools Become Malware Delivery Systems As an independent cybersecurity blogger and part time penetration tester, one of the most dangerous cybersecurity trends today is the weaponization of trusted software. The latest example involves attackers abusing legitimate HWMonitor and CPU-Z binaries distributed through the official CPUID website in a sophisticated supply chain compromise. Researchers confirmed that attackers replaced legitimate downloads with trojanized packages capable of deploying: STX RAT malware Credential theft payloads Hidden remote access tooling In memory persistence mechanisms The campaign specifically targeted users who believed they were downloading software directly from the trusted vendor. That makes this attack especially dangerous. What Happened: CPUID Website Was Compromised Researchers discovered that the official CPUID website was compromised between April 9 and April 10, 2026. During the compromise window, attacker...