CPU-Z and HWMonitor Download Links Were Briefly Hijacked in Security Incident
Quick Report
CPUID has confirmed that attackers briefly compromised a secondary API and replaced official CPU-Z and HWMonitor download links with malicious ones for roughly six hours between April 9 and April 10. During that window, affected users could have downloaded infected files while believing they were getting normal utility installers.
According to CPUID, the signed original binaries were not compromised, and the breach route has since been fixed. The incident was first surfaced by community reports and antivirus detections, and the company says downloads are now safe again, though users who downloaded during the affected period should treat their systems cautiously and run deeper checks.
Written using GitHub Copilot GPT-5.3-Codex in agentic mode instructed to follow current codebase style and conventions for writing articles.