Between April 9 and April 10, 2026, the official website of CPUID, developer of the popular CPU-Z and HWMonitor utilities, was compromised in a sophisticated supply chain attack. For a period of 6 to 19 hours, attackers manipulated a website API to redirect download links to malicious infrastructure. Users downloading the software received trojanized installers bundled with a malicious DLL. This led to the deployment of STX RAT, an information-stealing Remote Access Trojan, via a DLL side-loading technique. The campaign leveraged a watering hole attack methodology and reused command-and-control (C2) infrastructure from a previous campaign, which aided in its discovery. Security researchers at Kaspersky identified over 150 victims globally, highlighting the significant risk of supply chain attacks against trusted software vendors.
The attack was a classic watering hole incident where a trusted website, cpuid.com, was used to distribute malware. Instead of modifying the legitimate, signed executables, the attackers compromised a "secondary feature (basically a side API)" on the CPUID website. This API was responsible for providing download links to users. The attackers altered the API's response to point to attacker-controlled infrastructure, including Cloudflare R2 storage and malicious domains. Users who clicked the official download buttons were unknowingly redirected to download a malicious software package. The package appeared legitimate but contained a hidden malicious component designed to initiate an infection upon execution.
The infection chain was multi-staged and designed for stealth. The attackers used DLL side-loading, a technique where a legitimate application is tricked into loading a malicious DLL file.
cpuid.com site.CRYPTBASE.dll placed in the same directory.cpu-z_x64.exe), the Windows loader searches for CRYPTBASE.dll in the application's directory first. It finds and loads the malicious version instead of the legitimate system DLL located in System32. This is an example of T1574.002 - Hijack Execution Flow: DLL Side-Loading.CRYPTBASE.dll initiates a multi-stage, in-memory infection process to evade detection by antivirus products. This likely involves process hollowing or other in-memory injection techniques.The attackers made operational security mistakes by reusing C2 infrastructure and infection chains from a March 2026 campaign that distributed fake FileZilla installers, which allowed researchers to connect the activities and identify the threat more quickly.
T1190 - Exploit Public-Facing Application: The attackers compromised a web API on the public-facing CPUID website.T1588.002 - Obtain Capabilities: Tool: The attackers trojanized legitimate software tools (CPU-Z, HWMonitor) for distribution.T1574.002 - Hijack Execution Flow: DLL Side-Loading: The core technique used to execute the initial malicious code via CRYPTBASE.dll.T1055 - Process Injection: The in-memory infection chain likely uses a form of process injection to run the final payload.T1566.002 - Phishing: Spearphishing Link: While not spearphishing, the compromised links on a trusted site serve a similar function.T1105 - Ingress Tool Transfer: The trojanized installer is downloaded to the victim's machine.T1543.003 - Create or Modify System Process: Windows Service: RATs like STX often establish persistence by creating a malicious service.The attack had a global reach, with Kaspersky identifying over 150 victims. The majority of infections were located in Brazil, Russia, and China. While most victims were individuals, the attack also impacted organizations across various sectors, including retail, manufacturing, consulting, telecommunications, and agriculture. The primary impact is data theft, which can lead to financial loss, account takeovers, and further intrusions into personal or corporate networks. The compromise of a trusted software vendor like CPUID erodes user trust and demonstrates the systemic risk posed by supply chain vulnerabilities.
| Type | Value | Description |
|---|---|---|
| Domain | cahayailmukreatif.web[.]id |
Malicious domain hosting malware. |
| Domain | pub-45c2577dbd174292a02137c18e7b1b5a.r2[.]dev |
Attacker-controlled Cloudflare R2 storage. |
| Domain | transitopalermo[.]com |
Malicious domain hosting malware. |
| Domain | vatrobran[.]hr |
Malicious domain hosting malware. |
| Domain | welcome[.]supp0v3[.]com |
C2 domain. |
| File Name | CRYPTBASE.dll |
Malicious DLL used for side-loading. |
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
| file_name | CRYPTBASE.dll |
Malicious DLL found in the same directory as a legitimate executable like cpu-z_x64.exe. |
File integrity monitoring on endpoints, EDR alerts. | high |
| process_name | cpu-z_x64.exe |
Legitimate process that may exhibit suspicious behavior, such as making outbound network connections to unusual domains. | EDR, Process monitoring logs (Sysmon Event ID 1). | medium |
| process_name | hwmonitor_x64.exe |
Legitimate process that may exhibit suspicious behavior, such as spawning child processes like cmd.exe or powershell.exe. |
EDR, Process monitoring logs (Sysmon Event ID 1). | medium |
| network_traffic_pattern | *.r2.dev |
Outbound connections to Cloudflare R2 storage from unexpected applications. | Firewall logs, Web proxy logs, Netflow. | medium |
| command_line_pattern | *cpu-z_x64.exe* |
Monitor command line arguments for legitimate tools being launched from unusual locations (e.g., %TEMP%, Downloads). |
EDR, Windows Event ID 4688. | medium |
Security teams should proactively hunt for signs of this compromise.
CRYPTBASE.dll located outside of the legitimate C:\Windows\System32 directory. Specifically, look for this DLL in folders containing cpu-z.exe or hwmonitor.exe.cpu-z_x64.exe or hwmonitor_x64.exe that spawn suspicious child processes or make network connections to non-CPUID domains. This can be achieved using D3-PA: Process Analysis.Organizations and individuals should take the following steps to mitigate this and similar threats:
Use application control policies to prevent the loading of unauthorized or unsigned DLLs from non-standard directories.
Mapped D3FEND Techniques:
Employ endpoint protection with up-to-date signatures and behavioral detection to identify and block known malware like STX RAT and suspicious side-loading activities.
Implement strict egress filtering to block outbound connections to known malicious domains and C2 infrastructure.
Mapped D3FEND Techniques:
Verify the digital signatures of all downloaded executables and associated files before installation. The presence of unsigned files alongside signed ones is a strong indicator of tampering.
Implement Network Traffic Analysis to monitor for suspicious outbound connections from endpoints, especially from processes that should not be initiating them, like cpu-z.exe. In the context of the CPUID breach, this involves setting up alerts for connections to the IOC domains (cahayailmukreatif.web[.]id, *.r2.dev, etc.) and any other newly registered or low-reputation domains. Baselining normal network behavior for common utilities can help quickly spot anomalies. For example, CPU-Z should not be communicating with random domains in Croatia (.hr) or Indonesia (.id). This technique is critical for detecting C2 communication and data exfiltration attempts by payloads like STX RAT after the initial infection, serving as a vital secondary line of defense when endpoint measures are bypassed.
Utilize an EDR or advanced host monitoring solution to perform deep Process Analysis. For this specific attack, security teams should configure rules to detect the DLL side-loading pattern. This involves monitoring for legitimate, signed processes like cpu-z_x64.exe loading DLLs (specifically CRYPTBASE.dll) from their own application directory instead of the trusted System32 path. Further analysis should trace the process chain: look for cpu-z_x64.exe spawning unexpected child processes such as cmd.exe, powershell.exe, or making network connections. Establishing a baseline of normal process behavior for common system utilities is key. Any deviation, such as the injection of code into another process or the creation of new services for persistence, should trigger a high-priority alert. This directly counters the core execution and defense evasion mechanism used by the attackers.
Implement Executable Allowlisting, specifically focusing on DLLs, to prevent the hijack execution flow seen in this attack. Configure application control policies (like AppLocker or WDAC) to enforce that applications can only load DLLs that are signed by trusted publishers and reside in protected system directories (e.g., C:\Windows\System32). This would have blocked the legitimate cpu-z_x64.exe from loading the malicious, unsigned CRYPTBASE.dll from its local directory. While a full application allowlisting deployment can be complex, starting with a focus on preventing unauthorized DLL loading in common user directories like Downloads and AppData can provide significant protection against this type of side-loading attack with minimal operational overhead.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats