Danny Weber
13:54 11-04-2026
© E. Vartanyan
Popular system monitoring tools CPU-Z and HWMonitor were compromised, delivering malware via downloads. Learn about the security incident and safety tips.
Popular system monitoring utilities CPU-Z and HWMonitor have found themselves at the center of a serious security incident. Users have begun reporting en masse that when attempting to download or update the programs, they receive suspicious installer files that antivirus software flags as malware.
The first reports surfaced on Reddit, where users noticed the official website was delivering files with different names instead of the usual installers. For instance, instead of the standard HWMonitor package, a file with a name not matching the product was being downloaded, and Windows Security immediately flagged it as a virus.
Analysis confirmed the downloaded files did indeed contain malicious code. According to VirusTotal, dozens of antivirus solutions classified them as trojans and potentially unwanted programs. Independent cybersecurity specialists verified this was not a false positive but a real attack carried out through compromised download channels.
The programs' developer, Samuel Demeulemeester, stated that the core application files themselves were not altered. Preliminary information suggests the issue stemmed from a hack of the website's auxiliary infrastructure or the API used to distribute the installers. The incident lasted approximately six hours, during which time thousands of users may have downloaded the malicious files.
Experts warn that such attacks are particularly dangerous because they target popular tools used by millions. Through these programs, malicious actors could gain access to user data or install additional malware. Users are strongly advised to temporarily avoid downloading or updating CPU-Z and HWMonitor until the issue is fully resolved. Those who have already downloaded suspicious files are urged to scan their systems with antivirus software and remove any potentially dangerous components.