HWMonitor and CPU-Z download links were infected with malware for 6 hours before devs caught it

The devs were quick to remove the malware, as millions of users rely on these to track temperatures, voltages, fan speeds, and other system parameters.

HWMonitor and CPU-Z download links were infected with malware for 6 hours before devs caught it
Comment IconFacebook IconX IconReddit Icon
Tech Reporter
Published
1 minute & 45 seconds read time
TL;DR: HWMonitor 1.63 and CPU-Z official websites were hacked, distributing malware-infected installers for about six hours. The developers removed the threat after investigation. Users who downloaded during this period should secure accounts, check wallets, enable multi-factor authentication, and run malware scans or reinstall their OS.

Two of the most popular hardware monitoring utilities, HWMonitor 1.63 and CPU-Z, were recently found to be infected with malware. The official websites were hacked, and users trying to download the latest version were getting flagged by antivirus software. After roughly six hours of investigation, the developers identified the breach and removed the malware. Both of the monitoring utilities are now safe to download.

The issue first surfaced on Reddit, where users reported that the official download links had been replaced with malware-infected executable files instead of the legitimate installers. User u/DMkiller shared that while updating HWMonitor from version 1.42 to 1.63, the downloaded file was named "HWiNFO_Monitor_Setup.exe" rather than the expected "hwmonitor_1.62."

When he ran the file, Windows Defender flagged it as a virus, and a quick check on VirusTotal returned 32 security flags. Further analysis by u/Hattix under the same post revealed that the official download links on CPUID's website pointed to a Russian domain with the page header "Установка - HWiNFO Monitor, версия 1.63".

Malware analysts at vx-underground confirmed the compromise, describing the threat as multi-staged, deeply trojanized, and operating almost entirely in memory. It was distributed from the compromised cpuid.com domain and uses techniques specifically designed to evade detection, with the command-and-control server domain hardcoded into one of the binaries.

The breach was later confirmed by CPU-Z and HWMonitor developer Samuel Demeulemeester, who clarified that the core binaries themselves were not altered. The compromise affected a secondary feature or API on the website, and the exposure window lasted approximately 6 hours.

If you downloaded or updated either of the two tools during that window, chances are your data is likely compromised. In that case, change your passwords quickly, check your cryptocurrency wallets, review recent account activity, and ensure multi-factor authentication is enabled across important accounts. Run a full system malware scan or, for maximum security, perform a clean operating system install.

Photo of the GIGABYTE GeForce RTX 5080 Gaming OC 16G
Best Deals: GIGABYTE GeForce RTX 5080 Gaming OC 16G
Today7 days ago30 days ago
$1499.99 USD-
$2099.99 CAD-
$1499.99 USD-
$1499.99 USD-
Check PriceCheck Price
* Prices last scanned 4/10/2026 at 4:16 pm CDT - prices may be inaccurate. As an Amazon Associate, we earn from qualifying purchases. We earn affiliate commission from any Newegg or PCCG sales.
News Source:x.com

Tech Reporter

Email IconX IconLinkedIn Icon

Hassam is a veteran tech journalist and editor with over eight years of experience embedded in the consumer electronics industry. His obsession with hardware began with childhood experiments involving semiconductors, a curiosity that evolved into a career dedicated to deconstructing the complex silicon that powers our world. From benchmarking PC internals to stress-testing flagship CPUs and GPUs, Hassam specializes in translating high-level engineering into deep, unbiased insights for the enthusiast community.

Follow TweakTown on Google News
Newsletter Subscription