Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

$13.74 million hack shuts down authorized Grinex exchange after tip-off

Mirai Variant Nexcorium exploits CVE-2024-3721 to hijack TBK DVR and attack DDoS botnet

Stripe and Airwallex came close enough to an acquisition, but now they’re chasing each other

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » CPUID Compromise Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads
Identity

CPUID Compromise Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads

By April 12, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Rabi LakshmananApril 12, 2026Malware/Threat Intelligence

An unknown attacker has compromised CPUID (‘cpuid[.]com”), a website that hosts popular hardware monitoring tools such as CPU-Z, HWMonitor, HWMonitor Pro, and PerfMonitor, served a malicious executable of software and deployed a remote access Trojan called STX RAT within 24 hours.

The incident lasted from approximately 15:00 UTC on April 9th ​​to approximately 10:00 UTC on April 10th, where the CPU-Z and HWMonitor installer download URLs were replaced with links to malicious websites.

In a post shared on X, CPUID acknowledged the breach and said it was caused by a breach of a “secondary function (basically a side API)” that causes malicious links to appear randomly on the main site. It is noteworthy that this attack did not affect the original signed file.

According to Kaspersky, the names of the fraudulent websites are:

cahayailmukreatif.web[.]id pub-45c2577dbd174292a02137c18e7b1b5a.r2[.]development transit palermo[.]com batroburan[.]time

“The Trojanized software was distributed as a ZIP archive and as a standalone installer for the aforementioned products,” the Russian cybersecurity company said. “These files contain legitimate signed executables from the corresponding products and a malicious DLL named ‘CRYPTBASE.dll’ to utilize DLL sideloading techniques. ”

The malicious DLL connects to an external server and executes an additional payload, but before doing so it performs anti-sandbox checks to evade detection. The ultimate goal of the campaign is to deploy the STX RAT, a RAT with HVNC and extensive information theft capabilities.

The STX RAT “exposes an extensive set of commands for remote control, subsequent payload execution, and post-exploitation actions (EXE/DLL/PowerShell/shellcode in-memory execution, reverse proxy/tunneling, desktop interaction, etc.),” ​​eSentire said in an analysis of the malware last week.

Command and control (C2) server addresses and connection configurations have been reused from previous campaigns that leveraged Trojanized FileZilla installers hosted on fake sites to deploy the same RAT malware. This activity was documented by Malwarebytes early last month.

Kaspersky said it has identified more than 150 victims, most of whom are individuals affected by this incident. However, organizations in retail, manufacturing, consulting, telecommunications, and agriculture have also been affected. Most of the infections have occurred in Brazil, Russia, and China.

“The most significant mistake made by the attackers was reusing the same infection chain, including the STX RAT, and the same domain name for C2 communication from the previous attack related to the fake FileZilla installer,” Kaspersky said. “The overall malware development/deployment and operational security capabilities of the attackers behind this attack were so low that they were able to detect the watering hole breach as soon as it began.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAdobe patches actively exploited Acrobat Reader flaw CVE-2026-34621
Next Article Does the moon look the same no matter where you are on Earth?

Related Posts

$13.74 million hack shuts down authorized Grinex exchange after tip-off

April 18, 2026

Mirai Variant Nexcorium exploits CVE-2024-3721 to hijack TBK DVR and attack DDoS botnet

April 18, 2026

Three Microsoft Defender zero-days were actively exploited. 2 are not yet patched

April 17, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

$13.74 million hack shuts down authorized Grinex exchange after tip-off

Mirai Variant Nexcorium exploits CVE-2024-3721 to hijack TBK DVR and attack DDoS botnet

Stripe and Airwallex came close enough to an acquisition, but now they’re chasing each other

Sam Altman’s Project World aims to expand his human verification empire. First stop is Tinder.

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.