CPUID Website Hijacked in Supply Chain Attack to Distribute STX RAT Infostealer

CPUID Supply Chain Attack: Trojanized CPU-Z and HWMonitor Installers Deploy STX RAT Malware

HIGH
April 10, 2026
6m read
Supply Chain AttackMalwareCyberattack

Related Entities

Products & Tech

CPU-ZHWMonitor

Other

STX RAT RedditSamuel Demeulemeester

Full Report

Executive Summary

Between April 9 and April 10, 2026, the official website of CPUID, developer of the popular CPU-Z and HWMonitor utilities, was compromised in a sophisticated supply chain attack. For a period of 6 to 19 hours, attackers manipulated a website API to redirect download links to malicious infrastructure. Users downloading the software received trojanized installers bundled with a malicious DLL. This led to the deployment of STX RAT, an information-stealing Remote Access Trojan, via a DLL side-loading technique. The campaign leveraged a watering hole attack methodology and reused command-and-control (C2) infrastructure from a previous campaign, which aided in its discovery. Security researchers at Kaspersky identified over 150 victims globally, highlighting the significant risk of supply chain attacks against trusted software vendors.

Threat Overview

The attack was a classic watering hole incident where a trusted website, cpuid.com, was used to distribute malware. Instead of modifying the legitimate, signed executables, the attackers compromised a "secondary feature (basically a side API)" on the CPUID website. This API was responsible for providing download links to users. The attackers altered the API's response to point to attacker-controlled infrastructure, including Cloudflare R2 storage and malicious domains. Users who clicked the official download buttons were unknowingly redirected to download a malicious software package. The package appeared legitimate but contained a hidden malicious component designed to initiate an infection upon execution.

Technical Analysis

The infection chain was multi-staged and designed for stealth. The attackers used DLL side-loading, a technique where a legitimate application is tricked into loading a malicious DLL file.

  1. Initial Vector: The user downloads a trojanized installer for CPU-Z or HWMonitor from the compromised cpuid.com site.
  2. Execution: The installer package contains the legitimate, signed 64-bit executable for the utility and a malicious DLL named CRYPTBASE.dll placed in the same directory.
  3. Side-Loading: When the user runs the legitimate executable (e.g., cpu-z_x64.exe), the Windows loader searches for CRYPTBASE.dll in the application's directory first. It finds and loads the malicious version instead of the legitimate system DLL located in System32. This is an example of T1574.002 - Hijack Execution Flow: DLL Side-Loading.
  4. Infection Chain: The malicious CRYPTBASE.dll initiates a multi-stage, in-memory infection process to evade detection by antivirus products. This likely involves process hollowing or other in-memory injection techniques.
  5. Payload Deployment: The final payload, STX RAT, is loaded into memory. STX RAT is an infostealer with capabilities to harvest sensitive data, including:
    • Browser credentials and cookies
    • Cryptocurrency wallets
    • FTP client credentials (e.g., FileZilla)

The attackers made operational security mistakes by reusing C2 infrastructure and infection chains from a March 2026 campaign that distributed fake FileZilla installers, which allowed researchers to connect the activities and identify the threat more quickly.

MITRE ATT&CK Mapping

Impact Assessment

The attack had a global reach, with Kaspersky identifying over 150 victims. The majority of infections were located in Brazil, Russia, and China. While most victims were individuals, the attack also impacted organizations across various sectors, including retail, manufacturing, consulting, telecommunications, and agriculture. The primary impact is data theft, which can lead to financial loss, account takeovers, and further intrusions into personal or corporate networks. The compromise of a trusted software vendor like CPUID erodes user trust and demonstrates the systemic risk posed by supply chain vulnerabilities.

IOCs

Type Value Description
Domain cahayailmukreatif.web[.]id Malicious domain hosting malware.
Domain pub-45c2577dbd174292a02137c18e7b1b5a.r2[.]dev Attacker-controlled Cloudflare R2 storage.
Domain transitopalermo[.]com Malicious domain hosting malware.
Domain vatrobran[.]hr Malicious domain hosting malware.
Domain welcome[.]supp0v3[.]com C2 domain.
File Name CRYPTBASE.dll Malicious DLL used for side-loading.

Cyber Observables for Detection

Type Value Description Context Confidence
file_name CRYPTBASE.dll Malicious DLL found in the same directory as a legitimate executable like cpu-z_x64.exe. File integrity monitoring on endpoints, EDR alerts. high
process_name cpu-z_x64.exe Legitimate process that may exhibit suspicious behavior, such as making outbound network connections to unusual domains. EDR, Process monitoring logs (Sysmon Event ID 1). medium
process_name hwmonitor_x64.exe Legitimate process that may exhibit suspicious behavior, such as spawning child processes like cmd.exe or powershell.exe. EDR, Process monitoring logs (Sysmon Event ID 1). medium
network_traffic_pattern *.r2.dev Outbound connections to Cloudflare R2 storage from unexpected applications. Firewall logs, Web proxy logs, Netflow. medium
command_line_pattern *cpu-z_x64.exe* Monitor command line arguments for legitimate tools being launched from unusual locations (e.g., %TEMP%, Downloads). EDR, Windows Event ID 4688. medium

Detection & Response

Security teams should proactively hunt for signs of this compromise.

  1. Network Log Analysis: Review firewall, DNS, and web proxy logs for any connections to the IOC domains listed above, particularly between April 9 and April 10, 2026.
  2. Endpoint Detection: Use EDR solutions to search for instances of CRYPTBASE.dll located outside of the legitimate C:\Windows\System32 directory. Specifically, look for this DLL in folders containing cpu-z.exe or hwmonitor.exe.
  3. Process Monitoring: Hunt for executions of cpu-z_x64.exe or hwmonitor_x64.exe that spawn suspicious child processes or make network connections to non-CPUID domains. This can be achieved using D3-PA: Process Analysis.
  4. File Hashing: If you have downloaded CPU-Z or HWMonitor during the incident window, compare the file hashes of the installers and executables against known good versions from a trusted repository. This aligns with D3-FH: File Hashing.

Mitigation

Organizations and individuals should take the following steps to mitigate this and similar threats:

  1. Verify Software Integrity: Whenever possible, verify the digital signature of downloaded software before execution. Although the legitimate executables in this attack were signed, the presence of an unsigned malicious DLL in the package is a major red flag.
  2. Use Application Control: Implement application control solutions, such as Windows Defender Application Control, to restrict the execution of unauthorized or unsigned DLLs. This corresponds to D3-EAL: Executable Allowlisting.
  3. Network Egress Filtering: Block outbound traffic to known malicious domains and consider restricting connections to unusual TLDs or newly registered domains from non-browser processes. This is a form of D3-OTF: Outbound Traffic Filtering.
  4. Remove and Reinstall: If you downloaded CPU-Z or HWMonitor between April 9 and April 10, 2026, assume compromise. Remove the software, run a full antivirus scan, and then reinstall a fresh version downloaded after the incident was resolved.

Timeline of Events

1
April 9, 2026
Attackers compromise a secondary API on the CPUID website and begin redirecting download links to malicious infrastructure.
2
April 10, 2026
This article was published
3
April 10, 2026
CPUID confirms the breach has been fixed and the website's download functionality has been restored.

MITRE ATT&CK Mitigations

Use application control policies to prevent the loading of unauthorized or unsigned DLLs from non-standard directories.

Mapped D3FEND Techniques:

Employ endpoint protection with up-to-date signatures and behavioral detection to identify and block known malware like STX RAT and suspicious side-loading activities.

Mapped D3FEND Techniques:

Implement strict egress filtering to block outbound connections to known malicious domains and C2 infrastructure.

Mapped D3FEND Techniques:

Verify the digital signatures of all downloaded executables and associated files before installation. The presence of unsigned files alongside signed ones is a strong indicator of tampering.

D3FEND Defensive Countermeasures

Implement Network Traffic Analysis to monitor for suspicious outbound connections from endpoints, especially from processes that should not be initiating them, like cpu-z.exe. In the context of the CPUID breach, this involves setting up alerts for connections to the IOC domains (cahayailmukreatif.web[.]id, *.r2.dev, etc.) and any other newly registered or low-reputation domains. Baselining normal network behavior for common utilities can help quickly spot anomalies. For example, CPU-Z should not be communicating with random domains in Croatia (.hr) or Indonesia (.id). This technique is critical for detecting C2 communication and data exfiltration attempts by payloads like STX RAT after the initial infection, serving as a vital secondary line of defense when endpoint measures are bypassed.

Utilize an EDR or advanced host monitoring solution to perform deep Process Analysis. For this specific attack, security teams should configure rules to detect the DLL side-loading pattern. This involves monitoring for legitimate, signed processes like cpu-z_x64.exe loading DLLs (specifically CRYPTBASE.dll) from their own application directory instead of the trusted System32 path. Further analysis should trace the process chain: look for cpu-z_x64.exe spawning unexpected child processes such as cmd.exe, powershell.exe, or making network connections. Establishing a baseline of normal process behavior for common system utilities is key. Any deviation, such as the injection of code into another process or the creation of new services for persistence, should trigger a high-priority alert. This directly counters the core execution and defense evasion mechanism used by the attackers.

Implement Executable Allowlisting, specifically focusing on DLLs, to prevent the hijack execution flow seen in this attack. Configure application control policies (like AppLocker or WDAC) to enforce that applications can only load DLLs that are signed by trusted publishers and reside in protected system directories (e.g., C:\Windows\System32). This would have blocked the legitimate cpu-z_x64.exe from loading the malicious, unsigned CRYPTBASE.dll from its local directory. While a full application allowlisting deployment can be complex, starting with a focus on preventing unauthorized DLL loading in common user directories like Downloads and AppData can provide significant protection against this type of side-loading attack with minimal operational overhead.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

supply chain attackwatering holeSTX RATDLL side-loadinginfostealerCPUID

📢 Share This Article

Help others stay informed about cybersecurity threats