Between the evening of April 9 and the early hours of April 10, the official website of CPUID—the developer behind the popular PC hardware monitoring tools CPU-Z and HWMonitor—fell victim to a cyberattack. During this window, users who downloaded software from the site may have inadvertently obtained installation packages laced with malware. A number of Reddit users reported that software sourced from the official website triggered warnings from Windows Defender, citing instances where download links were redirected and malicious code was inserted into the files. Affected users promptly deleted the infected files and urged fellow downloaders to take similar precautions.
Doc TB, the leader of CPUID, stated that investigations are still underway. Initial findings suggest that a secondary function on the website was compromised for approximately six hours prior to April 9. During this time, the main site intermittently displayed malicious links; however, the original signed files remained unaltered. The issue has since been pinpointed and rectified, and CPUID has issued an official apology for the inconvenience and security risk caused.
