Analysis shared by vx-underground says the malicious installer appears to have targeted 64-bit HWMonitor users and included a fake CRYPTBASE.dll designed to blend in with legitimate Windows components ...
With the links giving you a malware-infected file instead ...
Download links were replaced by a Russian-speaking threat actor to distribute a recently emerged malware named STX RAT.
Hackers gained access to an API for the CPUID project and changed the download links on the official website to serve malicious executables for the popular CPU-Z and HWMonitor tools. The two utilities ...
The CPU-Z and HWMonitor download pages have recently been compromised, with download links replaced with ones pointing to files infected by malware. If you've recently downloaded either of these apps ...
A potential software supply-chain incident is unfolding around CPUID, the developer behind CPU-Z and HWMonitor, after multiple reports claimed that official download links were serving malware rather ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results