{"id":13716,"date":"2026-04-13T05:29:41","date_gmt":"2026-04-13T05:29:41","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=13716"},"modified":"2026-04-13T05:29:41","modified_gmt":"2026-04-13T05:29:41","slug":"cpuid-breach-distributes-stx-rat-by-way-of-trojanized-cpu-z-and-hwmonitor-downloads","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=13716","title":{"rendered":"CPUID Breach Distributes STX RAT by way of Trojanized CPU-Z and HWMonitor Downloads"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Apr 12, 2026<\/span><\/span><span class=\"p-tags\">Malware \/ Menace Intelligence<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhCPq2en6ihCNpYdSr5mWkN43O4Rl3tXYz77I2achAfYSy7Emoaj8fNqmFHLOydg6Ai6DwDKBEKD91ywcO9eT2t-rrFxEiThe79Rsa4dap_UcNZSEdWl9NRGeaMqP_vsbWnKf2mMNHQ86cabK4wlspLPWRHMJ7Gj5guX6ynx57RhsDLbJeSDAdPR_BjGFNU\/s1600\/downloads.jpg\" style=\"display: block; padding: 1em 0; text-align: center; clear: left; float: left;\"><img decoding=\"async\" alt=\"\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhCPq2en6ihCNpYdSr5mWkN43O4Rl3tXYz77I2achAfYSy7Emoaj8fNqmFHLOydg6Ai6DwDKBEKD91ywcO9eT2t-rrFxEiThe79Rsa4dap_UcNZSEdWl9NRGeaMqP_vsbWnKf2mMNHQ86cabK4wlspLPWRHMJ7Gj5guX6ynx57RhsDLbJeSDAdPR_BjGFNU\/s1600\/downloads.jpg\"\/><\/a><\/div>\n<p>Unknown risk actors compromised CPUID (&#8220;cpuid[.]com&#8221;), an internet site\u00a0that hosts fashionable {hardware} monitoring instruments like CPU-Z, HWMonitor, HWMonitor Professional, and PerfMonitor, for lower than 24 hours to serve malicious executables for the software program and deploy a distant entry trojan known as STX\u00a0RAT.<\/p>\n<p>The incident lasted from roughly April 9, 15:00 UTC, to about April 10, 10:00\u00a0UTC, with the obtain URLs for CPU-Z and HWMonitor installers changed with hyperlinks to malicious\u00a0web sites.<\/p>\n<p>In\u00a0a <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/d0cTB\/status\/2042520961824559150\">put up<\/a> shared on X, CPUID confirmed the breach, attributing it to a compromise of a &#8220;secondary characteristic (mainly a facet API)&#8221; that brought about the principle\u00a0website to randomly show malicious\u00a0hyperlinks. It is price noting that the assault didn&#8217;t influence its signed authentic\u00a0information.<\/p>\n<p><\/p>\n<p>In accordance\u00a0to <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/securelist.com\/tr\/cpu-z\/119365\/\">Kaspersky<\/a>, the names of the rogue web sites are as follows\u00a0&#8211;<\/p>\n<ul>\n<li>cahayailmukreatif.net[.]id<\/li>\n<li>pub-45c2577dbd174292a02137c18e7b1b5a.r2[.]dev<\/li>\n<li>transitopalermo[.]com<\/li>\n<li>vatrobran[.]hr<\/li>\n<\/ul>\n<p>&#8220;The trojanized software program was distributed each as ZIP archives and as standalone installers for the aforementioned merchandise,&#8221; the Russian cybersecurity firm stated. &#8220;These information include a legit signed executable for the corresponding product and a malicious DLL, which is called &#8216;CRYPTBASE.dll&#8217; to leverage the DLL side-loading method.&#8221;<\/p>\n<p>The malicious DLL, for its half, contacts an exterior server and executes further payloads, however not earlier than performing anti-sandbox checks to sidestep detection. The\u00a0finish purpose of the marketing campaign is to\u00a0deploy <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.esentire.com\/blog\/stx-rat-a-new-rat-in-2026-with-infostealer-capabilities\">STX\u00a0RAT<\/a>, a RAT with HVNC and broad infostealer capabilities.<\/p>\n<p>STX RAT &#8220;exposes a broad command set for distant management, follow-on payload execution, and post-exploitation actions (e.g., in-memory execution of EXE\/DLL\/PowerShell\/shellcode, reverse proxy\/tunneling, desktop interplay),&#8221; eSentire stated in an evaluation of the malware final\u00a0week.<\/p>\n<p><\/p>\n<p>The command-and-control (C2) server handle and the connection configuration\u00a0have been\u00a0reused from\u00a0a <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intel\/2026\/03\/a-fake-filezilla-site-hosts-a-malicious-download\">prior\u00a0marketing campaign<\/a> that leveraged trojanized <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intel\/2026\/02\/fake-7-zip-downloads-are-turning-home-pcs-into-proxy-nodes\">FileZilla installers<\/a> hosted on bogus websites to deploy the identical RAT malware. The\u00a0exercise was documented by Malwarebytes early final\u00a0month.<\/p>\n<p>Kaspersky stated it has recognized greater than 150 victims, principally people who had been affected by the incident. Nevertheless, organizations in retail, manufacturing, consulting, telecommunications, and agriculture have\u00a0additionally been\u00a0impacted. Most\u00a0of the infections are\u00a0positioned in Brazil, Russia, and\u00a0China.<\/p>\n<p>&#8220;The gravest mistake attackers made was to reuse the identical an infection chain involving STX RAT, and the identical domains for C2 communication, from the earlier assault associated to faux FileZilla installers,&#8221; Kaspersky stated. &#8220;The general malware growth\/deployment and operational safety capabilities of the risk actor behind this assault are fairly low, which, in flip, made it potential to detect the watering gap compromise as quickly because it\u00a0began.&#8221;<\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802Apr 12, 2026Malware \/ Menace Intelligence Unknown risk actors compromised CPUID (&#8220;cpuid[.]com&#8221;), an internet site\u00a0that hosts fashionable {hardware} monitoring instruments like CPU-Z, HWMonitor, HWMonitor Professional, and PerfMonitor, for lower than 24 hours to serve malicious executables for the software program and deploy a distant entry trojan known as STX\u00a0RAT. The incident lasted from roughly [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":13718,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[641,8653,8657,8654,2916,8658,1538,8655,8656],"class_list":["post-13716","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-breach","tag-cpuid","tag-cpuz","tag-distributes","tag-downloads","tag-hwmonitor","tag-rat","tag-stx","tag-trojanized"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13716","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13716"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13716\/revisions"}],"predecessor-version":[{"id":13717,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13716\/revisions\/13717"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/13718"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13716"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13716"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13716"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-04-13 12:03:27 UTC -->