{"id":4032,"date":"2026-04-14T08:54:43","date_gmt":"2026-04-14T06:54:43","guid":{"rendered":"https:\/\/computershop.eu\/blog\/?p=4032"},"modified":"2026-04-14T08:54:45","modified_gmt":"2026-04-14T06:54:45","slug":"popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware","status":"publish","type":"post","link":"https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware","title":{"rendered":"Popularele aplica\u021bii HWMonitor \u0219i CPU-Z infectate cu malware"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 2<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>\n<p>Un incident recent de securitate cibernetic\u0103 a atras aten\u021bia comunit\u0103\u021bii IT: popularele aplica\u021bii&nbsp;<strong>HWMonitor<\/strong>&nbsp;\u0219i&nbsp;<strong>CPU-Z<\/strong>, dezvoltate de compania CPUID, au fost folosite pentru distribuirea de malware c\u0103tre utilizatori. Acest eveniment subliniaz\u0103 riscurile tot mai mari asociate atacurilor de tip&nbsp;<em>supply chain<\/em>&nbsp;\u0219i importan\u021ba verific\u0103rii surselor de desc\u0103rcare.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ce s-a \u00eent\u00e2mplat?<\/h2>\n\n\n\n<p>Conform celor mai recente informa\u021bii aparute pe site-uri de specialitate (Cybernews, Tom\u2019s Hardware etc.), site-ul oficial al&nbsp;<a href=\"https:\/\/www.cpuid.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">CPUID<\/a>&nbsp;a fost compromis de atacatori necunoscu\u021bi. \u00cen urma bre\u0219ei, utilizatorii care desc\u0103rcau HWMonitor sau CPU-Z primeau, \u00een locul aplica\u021biilor legitime, versiuni infectate cu malware.<\/p>\n\n\n\n<p>Atacul a durat aproximativ \u0219ase ore \u0219i a fost posibil prin compromiterea unui API secundar al site-ului. \u00cen acest interval, linkurile de download au fost redirec\u021bionate c\u0103tre domenii controlate de atacatori, care livrau fi\u0219iere mali\u021bioase \u00een locul celor originale.<\/p>\n\n\n\n<p>Important de men\u021bionat este faptul c\u0103 fi\u0219ierele originale semnate digital nu au fost compromise, ci doar infrastructura de distribu\u021bie.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cum func\u021bioneaz\u0103 acest tip de malware?<\/h2>\n\n\n\n<p>Malware-ul distribuit este complex, multi-stage, proiectat s\u0103 evite detectarea de c\u0103tre solu\u021biile antivirus. Speciali\u0219tii au observat c\u0103 acesta func\u021biona aproape complet \u00een memorie \u0219i utiliza tehnici avansate de evaziune.<\/p>\n\n\n\n<p>Acest tip de malware folose\u0219te PowerShell pentru a desc\u0103rca fi\u0219iere suplimentare de pe serverele atacatorilor \u0219i las\u0103 o adres\u0103 inclus\u0103 \u00een cod prin care prime\u0219te comenzi.<\/p>\n\n\n\n<p>Pentru a trece neobservat, fi\u0219ierul infectat a fost denumit CRYPTBASE.dll, similar bibliotecii Windows folosite de HWMonitor. Scopul principal al atacului a fost furtul de date sensibile, \u00een special creden\u021biale salvate \u00een browser, precum parolele din Google Chrome.<\/p>\n\n\n\n<p>\u00cen unele cazuri, fi\u0219ierele desc\u0103rcate aveau denumiri suspecte, precum \u201cHWiNFO_Monitor_Setup.exe\u201d, \u0219i prezentau indicii neobi\u0219nuite, cum ar fi executabile \u00een limba rus\u0103.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">De ce este acest incident important?<\/h2>\n\n\n\n<p>Acest caz reprezint\u0103 un exemplu clar de atac de tip&nbsp;<em>supply chain<\/em>, \u00een care hackerii nu compromit direct aplica\u021bia, ci canalul prin care aceasta este distribuit\u0103. Astfel de atacuri sunt extrem de periculoase deoarece vizeaz\u0103 software de \u00eencredere, utilizat de milioane de persoane.<\/p>\n\n\n\n<p>\u00cen plus, popularitatea unor aplica\u021bii precum CPU-Z (folosit pentru identificarea componentelor hardware) face ca impactul poten\u021bial s\u0103 fie foarte mare.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ce trebuie s\u0103 faci dac\u0103 ai desc\u0103rcat aplica\u021biile infectate cu malware?<\/h2>\n\n\n\n<p>Dac\u0103 ai desc\u0103rcat sau actualizat HWMonitor sau CPU-Z \u00een perioada afectat\u0103, exper\u021bii recomand\u0103:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Dezinstalarea imediat\u0103 a aplica\u021biei<\/li>\n\n\n\n<li>Scanarea complet\u0103 a sistemului cu un antivirus actualizat<\/li>\n\n\n\n<li>Schimbarea tuturor parolelor importante<\/li>\n\n\n\n<li>Activarea autentific\u0103rii \u00een doi pa\u0219i (2FA)<\/li>\n\n\n\n<li>Verificarea activit\u0103\u021bii conturilor online.<\/li>\n<\/ul>\n\n\n\n<p>\u00cen cazul \u00een care malware-ul a fost instalat, exist\u0103 riscul ca datele personale s\u0103 fi fost compromise.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cum te protejezi pe viitor?<\/h2>\n\n\n\n<p>Pentru a evita situa\u021bii similare:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Descarc\u0103 software doar din surse oficiale \u0219i verific\u0103 integritatea fi\u0219ierelor<\/li>\n\n\n\n<li>Folose\u0219te solu\u021bii antivirus actualizate<\/li>\n\n\n\n<li>Fii atent la denumiri suspecte sau comportamente neobi\u0219nuite \u00een timpul instal\u0103rii<\/li>\n\n\n\n<li>Compar\u0103 hash-urile sau semn\u0103turile digitale ale fi\u0219ierelor.<\/li>\n<\/ul>\n\n\n\n<p>Incidentul HWMonitor \u0219i CPU-Z arat\u0103 c\u00e2t de vulnerabile pot fi chiar \u0219i cele mai populare aplica\u021bii. \u00cen 2026,\u00a0<a href=\"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected\" target=\"_blank\" rel=\"noreferrer noopener\">securitatea online<\/a>\u00a0nu mai \u021bine doar de dezvoltatori, ci \u0219i de vigilen\u021ba utilizatorilor. Verificarea atent\u0103 a desc\u0103rc\u0103rilor \u0219i adoptarea unor practici de securitate solide pot face diferen\u021ba \u00eentre un sistem sigur \u0219i unul compromis.<\/p>\n\n\n\n<p>Surse:&nbsp;<a href=\"https:\/\/www.tomshardware.com\/tech-industry\/cyber-security\/hwmonitor-and-cpu-z-developer-cpuid-breached-by-unknown-attackers-cyberattack-forced-users-to-download-malware-instead-of-valid-apps-for-approximately-six-hours\" target=\"_blank\" rel=\"noreferrer noopener\">tomshardware.com<\/a>,&nbsp;<a href=\"https:\/\/cybernews.com\/security\/cpuid-hwmonitor-hwinfo-cpuz-deliver-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">cybernews.com<\/a><\/p>\n\t<div class=\"quickshare-container\">\r\n\t<ul class=\"quickshare-genericons monochrome quickshare-effect-expand\">\r\n\t\t<li class=\"quickshare-share\">Share:<\/li> \r\n\t\t<li><a href=\"https:\/\/facebook.com\/sharer.php?u=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fro%2Fpopularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware&amp;t=Popularele+aplica%C8%9Bii+HWMonitor+%C8%99i+CPU-Z+infectate+cu+malware+<+Refurbished+Computers+-+ComputerShop.EU\" target=\"_blank\" title=\"Share on Facebook\"><span class=\"quickshare-facebook\">Facebook<\/span><\/a><\/li>\t\t<li><a href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fro%2Fpopularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware&amp;text=Popularele+aplica%C8%9Bii+HWMonitor+%C8%99i+CPU-Z+infectate+cu+malware+<+Refurbished+Computers+-+ComputerShop.EU\" target=\"_blank\" title=\"Share on Twitter\"><span class=\"quickshare-twitter\">Twitter<\/span><\/a><\/li>\t\t<li><a href=\"http:\/\/pinterest.com\/pin\/create\/button\/?url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fro%2Fpopularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware&amp;media=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fwp-content%2Fuploads%2F2026%2F04%2FHWMonitor-si-CPU-Z-infectate-cu-malware-300x168.png&amp;description=Un+incident+recent+de+securitate+cibernetic%C4%83+a+atras+aten%C8%9Bia+comunit%C4%83%C8%9Bii+IT%3A+popularele+aplica%C8%9Bii%26nbsp%3BHWMonitor%26nbsp%3B%C8%99i%26nbsp%3BCPU-Z%2C+dezvoltate+de+compania+CPUID%2C+au+fost+folosite+pentru+distribuirea+de+malware+c%C4%83tre+utilizatori.+Acest+eveniment+subliniaz%C4%83+riscurile+tot+mai+mari+asociate+atacurilor+de+tip%26nbsp%3Bsupply+chain%26nbsp%3B%C8%99i+importan%C8%9Ba+verific%C4%83rii%26hellip%3B\" target=\"_blank\" title=\"Share on Pinterest\"><span class=\"quickshare-pinterest\">Pinterest<\/span><\/a><\/li>\t\t<li><a href=\"http:\/\/linkedin.com\/shareArticle?mini=true&amp;url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fro%2Fpopularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware&amp;title=Popularele+aplica%C8%9Bii+HWMonitor+%C8%99i+CPU-Z+infectate+cu+malware&amp;source=Refurbished+Computers+-+ComputerShop.EU&amp;summary=Un+incident+recent+de+securitate+cibernetic%C4%83+a+atras+aten%C8%9Bia+comunit%C4%83%C8%9Bii+IT%3A+popularele+aplica%C8%9Bii%26nbsp%3BHWMonitor%26nbsp%3B%C8%99i%26nbsp%3BCPU-Z%2C+dezvoltate+de+compania+CPUID%2C+au+fost+folosite+pentru+distribuirea+de+malware+c%C4%83tre+utilizatori.+Acest+eveniment+subliniaz%C4%83+riscurile+tot+mai+mari+asociate+atacurilor+de+tip%26nbsp%3Bsupply+chain%26nbsp%3B%C8%99i+importan%C8%9Ba+verific%C4%83rii%26hellip%3B\" title=\"Share on Linkedin\" target=\"_blank\"><span class=\"quickshare-linkedin\">Linkedin<\/span><\/a><\/li>\t\t<li><a href=\"https:\/\/plus.google.com\/share?url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fro%2Fpopularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware\" target=\"_blank\" title=\"Share on Google+\"><span class=\"quickshare-googleplus\">Google+<\/span><\/a><\/li>\t\t\t\t\t\t\t\t<li><a href=\"mailto:?subject=Refurbished+Computers+-+ComputerShop.EU:+Popularele+aplica%C8%9Bii+HWMonitor+%C8%99i+CPU-Z+infectate+cu+malware&amp;body=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fro%2Fpopularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware\" target=\"_blank\" title=\"Share via Email\"><span class=\"quickshare-email\">Email<\/span><\/a><\/li>\t<\/ul>\r\n\t<\/div>\r\n","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 2<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>Un incident recent de securitate cibernetic\u0103 a atras aten\u021bia comunit\u0103\u021bii IT: popularele aplica\u021bii&nbsp;HWMonitor&nbsp;\u0219i&nbsp;CPU-Z, dezvoltate de compania CPUID, au fost folosite pentru distribuirea de malware c\u0103tre utilizatori. Acest eveniment subliniaz\u0103 riscurile tot mai mari asociate atacurilor de tip&nbsp;supply chain&nbsp;\u0219i importan\u021ba verific\u0103rii &hellip; <a href=\"https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":4035,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[90],"tags":[15071,15065,7232,8971,2602,15068],"class_list":["post-4032","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-stiri","tag-atac-cpuid","tag-atac-malware","tag-securitate-cibernetica-ro","tag-securitate-online","tag-software-ro","tag-virus"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Popularele aplica\u021bii HWMonitor \u0219i CPU-Z infectate cu malware - Refurbished Computers - ComputerShop.EU<\/title>\n<meta name=\"description\" content=\"Popularele aplica\u021bii HWMonitor \u0219i CPU-Z, dezvoltate de compania CPUID, au fost folosite pentru distribuirea de malware c\u0103tre utilizatori.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Popularele aplica\u021bii HWMonitor \u0219i CPU-Z infectate cu malware - Refurbished Computers - ComputerShop.EU\" \/>\n<meta property=\"og:description\" content=\"Popularele aplica\u021bii HWMonitor \u0219i CPU-Z, dezvoltate de compania CPUID, au fost folosite pentru distribuirea de malware c\u0103tre utilizatori.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware\" \/>\n<meta property=\"og:site_name\" content=\"Refurbished Computers - ComputerShop.EU\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-14T06:54:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-14T06:54:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"896\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alex\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware#article\",\"isPartOf\":{\"@id\":\"https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware\"},\"author\":{\"name\":\"Alex\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a\"},\"headline\":\"Popularele aplica\u021bii HWMonitor \u0219i CPU-Z infectate cu malware\",\"datePublished\":\"2026-04-14T06:54:43+00:00\",\"dateModified\":\"2026-04-14T06:54:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware\"},\"wordCount\":587,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware#primaryimage\"},\"thumbnailUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png\",\"keywords\":[\"atac cpuid\",\"atac malware\",\"securitate cibernetic\u0103\",\"securitate online\",\"software\",\"virus\"],\"articleSection\":[\"Stiri\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware\",\"url\":\"https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware\",\"name\":\"Popularele aplica\u021bii HWMonitor \u0219i CPU-Z infectate cu malware - Refurbished Computers - ComputerShop.EU\",\"isPartOf\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware#primaryimage\"},\"image\":{\"@id\":\"https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware#primaryimage\"},\"thumbnailUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png\",\"datePublished\":\"2026-04-14T06:54:43+00:00\",\"dateModified\":\"2026-04-14T06:54:45+00:00\",\"description\":\"Popularele aplica\u021bii HWMonitor \u0219i CPU-Z, dezvoltate de compania CPUID, au fost folosite pentru distribuirea de malware c\u0103tre utilizatori.\",\"breadcrumb\":{\"@id\":\"https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware#primaryimage\",\"url\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png\",\"contentUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png\",\"width\":1600,\"height\":896,\"caption\":\"HWMonitor \u0219i CPU-Z infectate cu malware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/computershop.eu\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Popularele aplica\u021bii HWMonitor \u0219i CPU-Z infectate cu malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/computershop.eu\/blog\/#website\",\"url\":\"https:\/\/computershop.eu\/blog\/\",\"name\":\"Refurbished Computers - ComputerShop.EU\",\"description\":\"Best Refurbished Computers In The EU\",\"publisher\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/computershop.eu\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/computershop.eu\/blog\/#organization\",\"name\":\"Refurbished Computers - ComputerShop.EU\",\"url\":\"https:\/\/computershop.eu\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png\",\"contentUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png\",\"width\":300,\"height\":54,\"caption\":\"Refurbished Computers - ComputerShop.EU\"},\"image\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a\",\"name\":\"Alex\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g\",\"caption\":\"Alex\"},\"url\":\"https:\/\/computershop.eu\/blog\/author\/alex\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Popularele aplica\u021bii HWMonitor \u0219i CPU-Z infectate cu malware - Refurbished Computers - ComputerShop.EU","description":"Popularele aplica\u021bii HWMonitor \u0219i CPU-Z, dezvoltate de compania CPUID, au fost folosite pentru distribuirea de malware c\u0103tre utilizatori.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware","og_locale":"en_US","og_type":"article","og_title":"Popularele aplica\u021bii HWMonitor \u0219i CPU-Z infectate cu malware - Refurbished Computers - ComputerShop.EU","og_description":"Popularele aplica\u021bii HWMonitor \u0219i CPU-Z, dezvoltate de compania CPUID, au fost folosite pentru distribuirea de malware c\u0103tre utilizatori.","og_url":"https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware","og_site_name":"Refurbished Computers - ComputerShop.EU","article_published_time":"2026-04-14T06:54:43+00:00","article_modified_time":"2026-04-14T06:54:45+00:00","og_image":[{"width":1600,"height":896,"url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png","type":"image\/png"}],"author":"Alex","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alex","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware#article","isPartOf":{"@id":"https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware"},"author":{"name":"Alex","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a"},"headline":"Popularele aplica\u021bii HWMonitor \u0219i CPU-Z infectate cu malware","datePublished":"2026-04-14T06:54:43+00:00","dateModified":"2026-04-14T06:54:45+00:00","mainEntityOfPage":{"@id":"https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware"},"wordCount":587,"commentCount":0,"publisher":{"@id":"https:\/\/computershop.eu\/blog\/#organization"},"image":{"@id":"https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware#primaryimage"},"thumbnailUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png","keywords":["atac cpuid","atac malware","securitate cibernetic\u0103","securitate online","software","virus"],"articleSection":["Stiri"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware#respond"]}]},{"@type":"WebPage","@id":"https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware","url":"https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware","name":"Popularele aplica\u021bii HWMonitor \u0219i CPU-Z infectate cu malware - Refurbished Computers - ComputerShop.EU","isPartOf":{"@id":"https:\/\/computershop.eu\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware#primaryimage"},"image":{"@id":"https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware#primaryimage"},"thumbnailUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png","datePublished":"2026-04-14T06:54:43+00:00","dateModified":"2026-04-14T06:54:45+00:00","description":"Popularele aplica\u021bii HWMonitor \u0219i CPU-Z, dezvoltate de compania CPUID, au fost folosite pentru distribuirea de malware c\u0103tre utilizatori.","breadcrumb":{"@id":"https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware#primaryimage","url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png","contentUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png","width":1600,"height":896,"caption":"HWMonitor \u0219i CPU-Z infectate cu malware"},{"@type":"BreadcrumbList","@id":"https:\/\/computershop.eu\/blog\/ro\/popularele-aplicatii-hwmonitor-si-cpu-z-infectate-cu-malware#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/computershop.eu\/blog\/"},{"@type":"ListItem","position":2,"name":"Popularele aplica\u021bii HWMonitor \u0219i CPU-Z infectate cu malware"}]},{"@type":"WebSite","@id":"https:\/\/computershop.eu\/blog\/#website","url":"https:\/\/computershop.eu\/blog\/","name":"Refurbished Computers - ComputerShop.EU","description":"Best Refurbished Computers In The EU","publisher":{"@id":"https:\/\/computershop.eu\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/computershop.eu\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/computershop.eu\/blog\/#organization","name":"Refurbished Computers - ComputerShop.EU","url":"https:\/\/computershop.eu\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png","contentUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png","width":300,"height":54,"caption":"Refurbished Computers - ComputerShop.EU"},"image":{"@id":"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a","name":"Alex","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g","caption":"Alex"},"url":"https:\/\/computershop.eu\/blog\/author\/alex"}]}},"jetpack_featured_media_url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts\/4032","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/comments?post=4032"}],"version-history":[{"count":2,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts\/4032\/revisions"}],"predecessor-version":[{"id":4034,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts\/4032\/revisions\/4034"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/media\/4035"}],"wp:attachment":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/media?parent=4032"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/categories?post=4032"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/tags?post=4032"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}