CPU-Z and HWMonitor compromised
Scope and Nature of the Compromise
- Attack targeted CPUID’s website, not the core binaries on their own server.
- Download links were altered to point to malicious executables hosted on Cloudflare R2.
- A maintainer reported finding and fixing the “biggest breach,” restoring correct links and making things read-only while investigating.
- Reported compromise window was a bit over six hours (between April 9–10, GMT).
- Characterized by some as a watering-hole attack rather than a classic supply-chain compromise, though others argue it’s a “short supply chain” compromise of the website layer.
Affected Software and Confusion
- Confirmed affected: CPU-Z and HWMonitor from CPUID.
- Explicit clarification that HWMonitor is not the same as HWInfo, which is a different product/site.
- Some concern about whether additional CPUID tools might also be affected; no clear answer in the thread.
Relation to Other Incidents
- Same threat group is said to have hit FileZilla recently, initially via a fake domain; now they’ve escalated to compromising the real site’s API/download layer.
- Commenters note a broader pattern of attackers timing intrusions around developers’ known absences, possibly leveraging availability info from chat/Discord.
Package Managers, Signing, and Repos
- Many recommend using package managers (winget, Chocolatey, Linux repos) instead of direct downloads to reduce risk.
- winget is praised for hash checks, Defender integration, GitHub-based manifests, and manual PR review, and credited with mitigating other hijacks (e.g., Notepad++).
- Others are skeptical: winget is described by some as “just running setup.exe,” with limited protection if upstream sources are compromised or malicious updates pass shallow checks.
- Discussion of Linux models: trusted distro repos vs. the “wild west” AUR, emphasizing reading build scripts.
- Debate over Windows code-signing and GPG: some see central PKI as a strong defense; others argue it’s only marginally better than self-signing if keys and downloads live on the same compromised infrastructure.
Defensive Practices and Tools
- File integrity monitoring tools (tripwire, OSSEC, aide, OpenBSD’s security(8)) and simple hash-check cron jobs are highlighted as effective.
- Forensics hardware write-blockers and read-only media are cited as strong but niche mitigations.
User Behavior, AV, and Trust
- Multiple stories of users ignoring Windows Defender warnings due to frequent false positives, especially with niche tools or “hack” software.
- VirusTotal is commonly used to check downloads and even developers’ own releases.
- Some foresee a shift toward paid or platform-integrated “trusted” tools; others fear this trend toward tighter “trusted computing” ecosystems.