{"id":4036,"date":"2026-04-14T08:54:43","date_gmt":"2026-04-14T06:54:43","guid":{"rendered":"https:\/\/computershop.eu\/blog\/?p=4032"},"modified":"2026-04-14T09:09:13","modified_gmt":"2026-04-14T07:09:13","slug":"the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware","status":"publish","type":"post","link":"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware","title":{"rendered":"The popular applications HWMonitor and CPU-Z infected with malware"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 2<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>\n<p>A recent cybersecurity incident has caught the attention of the IT community: the popular applications&nbsp;<strong>HWMonitor<\/strong>&nbsp;and&nbsp;<strong>CPU-Z<\/strong>, developed by CPUID, were used to distribute malware to users. This event highlights the increasing risks associated with&nbsp;<em>supply chain<\/em>&nbsp;attacks and the importance of verifying download sources.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What happened?<\/h2>\n\n\n\n<p>According to the latest information appearing on specialized sites (Cybernews, Tom\u2019s Hardware, etc.), the official site of&nbsp;<a href=\"https:\/\/www.cpuid.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">CPUID<\/a>&nbsp;was compromised by unknown attackers. Following the breach, users downloading HWMonitor or CPU-Z received, instead of the legitimate applications, versions infected with malware.<\/p>\n\n\n\n<p>The attack lasted approximately six hours and was made possible by compromising a secondary API of the site. During this time, the download links were redirected to domains controlled by the attackers, which delivered malicious files instead of the original ones.<\/p>\n\n\n\n<p>It is important to note that the original files signed digitally were not compromised, only the distribution infrastructure.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How does this type of malware work?<\/h2>\n\n\n\n<p>The distributed malware is complex, multi-stage, designed to evade detection by antivirus solutions. Experts have observed that it operated almost entirely in memory and used advanced evasion techniques.<\/p>\n\n\n\n<p>This type of malware uses PowerShell to download additional files from the attackers&#8217; servers and leaves an address included in the code through which it receives commands.<\/p>\n\n\n\n<p>To remain undetected, the infected file was named CRYPTBASE.dll, similar to the Windows library used by HWMonitor. The main goal of the attack was to steal sensitive data, especially credentials saved in the browser, such as passwords from Google Chrome.<\/p>\n\n\n\n<p>In some cases, the downloaded files had suspicious names, such as \u201cHWiNFO_Monitor_Setup.exe\u201d, and showed unusual hints, such as executables in Russian.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why is this incident important?<\/h2>\n\n\n\n<p>This case represents a clear example of a&nbsp;<em>supply chain<\/em>&nbsp;attack, where hackers do not directly compromise the application but the channel through which it is distributed. Such attacks are extremely dangerous because they target trusted software used by millions of people.<\/p>\n\n\n\n<p>Additionally, the popularity of applications like CPU-Z (used for identifying hardware components) makes the potential impact very significant.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What should you do if you downloaded the infected applications?<\/h2>\n\n\n\n<p>If you downloaded or updated HWMonitor or CPU-Z during the affected period, experts recommend:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Immediate uninstallation of the application<\/li>\n\n\n\n<li>Complete system scan with updated antivirus<\/li>\n\n\n\n<li>Changing all important passwords<\/li>\n\n\n\n<li>Enabling two-factor authentication (2FA)<\/li>\n\n\n\n<li>Checking the activity of online accounts.<\/li>\n<\/ul>\n\n\n\n<p>If the malware was installed, there is a risk that personal data may have been compromised.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to protect yourself in the future?<\/h2>\n\n\n\n<p>To avoid similar situations:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Download software only from official sources and verify the integrity of the files<\/li>\n\n\n\n<li>Use updated antivirus solutions<\/li>\n\n\n\n<li>Be cautious of suspicious names or unusual behaviors during installation<\/li>\n\n\n\n<li>Compare hashes or digital signatures of files.<\/li>\n<\/ul>\n\n\n\n<p>The HWMonitor and CPU-Z incident shows how vulnerable even the most popular applications can be. In 2026, <a href=\"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected\" target=\"_blank\" rel=\"noreferrer noopener\">online security<\/a> is no longer just the developers&#8217; responsibility but also the vigilance of users. Careful verification of downloads and adopting solid security practices can make the difference between a secure system and a compromised one.<\/p>\n\n\n\n<p>Sources:&nbsp;<a href=\"https:\/\/www.tomshardware.com\/tech-industry\/cyber-security\/hwmonitor-and-cpu-z-developer-cpuid-breached-by-unknown-attackers-cyberattack-forced-users-to-download-malware-instead-of-valid-apps-for-approximately-six-hours\" target=\"_blank\" rel=\"noreferrer noopener\">tomshardware.com<\/a>,&nbsp;<a href=\"https:\/\/cybernews.com\/security\/cpuid-hwmonitor-hwinfo-cpuz-deliver-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">cybernews.com<\/a><\/p>\n\t<div class=\"quickshare-container\">\r\n\t<ul class=\"quickshare-genericons monochrome quickshare-effect-expand\">\r\n\t\t<li class=\"quickshare-share\">Share:<\/li> \r\n\t\t<li><a href=\"https:\/\/facebook.com\/sharer.php?u=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fthe-popular-applications-hwmonitor-and-cpu-z-infected-with-malware&amp;t=The+popular+applications+HWMonitor+and+CPU-Z+infected+with+malware+<+Refurbished+Computers+-+ComputerShop.EU\" target=\"_blank\" title=\"Share on Facebook\"><span class=\"quickshare-facebook\">Facebook<\/span><\/a><\/li>\t\t<li><a href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fthe-popular-applications-hwmonitor-and-cpu-z-infected-with-malware&amp;text=The+popular+applications+HWMonitor+and+CPU-Z+infected+with+malware+<+Refurbished+Computers+-+ComputerShop.EU\" target=\"_blank\" title=\"Share on Twitter\"><span class=\"quickshare-twitter\">Twitter<\/span><\/a><\/li>\t\t<li><a href=\"http:\/\/pinterest.com\/pin\/create\/button\/?url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fthe-popular-applications-hwmonitor-and-cpu-z-infected-with-malware&amp;media=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fwp-content%2Fuploads%2F2026%2F04%2FHWMonitor-si-CPU-Z-infectate-cu-malware-300x168.png&amp;description=A+recent+cybersecurity+incident+has+caught+the+attention+of+the+IT+community%3A+the+popular+applications%26nbsp%3BHWMonitor%26nbsp%3Band%26nbsp%3BCPU-Z%2C+developed+by+CPUID%2C+were+used+to+distribute+malware+to+users.+This+event+highlights+the+increasing+risks+associated+with%26nbsp%3Bsupply+chain%26nbsp%3Battacks+and+the+importance+of+verifying+download%26hellip%3B\" target=\"_blank\" title=\"Share on Pinterest\"><span class=\"quickshare-pinterest\">Pinterest<\/span><\/a><\/li>\t\t<li><a href=\"http:\/\/linkedin.com\/shareArticle?mini=true&amp;url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fthe-popular-applications-hwmonitor-and-cpu-z-infected-with-malware&amp;title=The+popular+applications+HWMonitor+and+CPU-Z+infected+with+malware&amp;source=Refurbished+Computers+-+ComputerShop.EU&amp;summary=A+recent+cybersecurity+incident+has+caught+the+attention+of+the+IT+community%3A+the+popular+applications%26nbsp%3BHWMonitor%26nbsp%3Band%26nbsp%3BCPU-Z%2C+developed+by+CPUID%2C+were+used+to+distribute+malware+to+users.+This+event+highlights+the+increasing+risks+associated+with%26nbsp%3Bsupply+chain%26nbsp%3Battacks+and+the+importance+of+verifying+download%26hellip%3B\" title=\"Share on Linkedin\" target=\"_blank\"><span class=\"quickshare-linkedin\">Linkedin<\/span><\/a><\/li>\t\t<li><a href=\"https:\/\/plus.google.com\/share?url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fthe-popular-applications-hwmonitor-and-cpu-z-infected-with-malware\" target=\"_blank\" title=\"Share on Google+\"><span class=\"quickshare-googleplus\">Google+<\/span><\/a><\/li>\t\t\t\t\t\t\t\t<li><a href=\"mailto:?subject=Refurbished+Computers+-+ComputerShop.EU:+The+popular+applications+HWMonitor+and+CPU-Z+infected+with+malware&amp;body=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fthe-popular-applications-hwmonitor-and-cpu-z-infected-with-malware\" target=\"_blank\" title=\"Share via Email\"><span class=\"quickshare-email\">Email<\/span><\/a><\/li>\t<\/ul>\r\n\t<\/div>\r\n","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 2<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>A recent cybersecurity incident has caught the attention of the IT community: the popular applications&nbsp;HWMonitor&nbsp;and&nbsp;CPU-Z, developed by CPUID, were used to distribute malware to users. This event highlights the increasing risks associated with&nbsp;supply chain&nbsp;attacks and the importance of verifying download &hellip; <a href=\"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":4035,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[101],"tags":[15085,15087,9895,7071,2584,15099],"class_list":["post-4036","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-cpuid-attack","tag-malware-attack","tag-online-safety","tag-securitate-cibernetica","tag-software-en","tag-virus-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The popular applications HWMonitor and CPU-Z infected with malware - Refurbished Computers - ComputerShop.EU<\/title>\n<meta name=\"description\" content=\"The popular applications HWMonitor and CPU-Z, developed by CPUID, were used to distribute malware to users.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The popular applications HWMonitor and CPU-Z infected with malware - Refurbished Computers - ComputerShop.EU\" \/>\n<meta property=\"og:description\" content=\"The popular applications HWMonitor and CPU-Z, developed by CPUID, were used to distribute malware to users.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware\" \/>\n<meta property=\"og:site_name\" content=\"Refurbished Computers - ComputerShop.EU\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-14T06:54:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-14T07:09:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"896\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alex\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware#article\",\"isPartOf\":{\"@id\":\"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware\"},\"author\":{\"name\":\"Alex\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a\"},\"headline\":\"The popular applications HWMonitor and CPU-Z infected with malware\",\"datePublished\":\"2026-04-14T06:54:43+00:00\",\"dateModified\":\"2026-04-14T07:09:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware\"},\"wordCount\":528,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware#primaryimage\"},\"thumbnailUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png\",\"keywords\":[\"cpuid attack\",\"malware attack\",\"online safety\",\"securitate cibernetic\u0103\",\"software\",\"virus\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware\",\"url\":\"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware\",\"name\":\"The popular applications HWMonitor and CPU-Z infected with malware - Refurbished Computers - ComputerShop.EU\",\"isPartOf\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware#primaryimage\"},\"image\":{\"@id\":\"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware#primaryimage\"},\"thumbnailUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png\",\"datePublished\":\"2026-04-14T06:54:43+00:00\",\"dateModified\":\"2026-04-14T07:09:13+00:00\",\"description\":\"The popular applications HWMonitor and CPU-Z, developed by CPUID, were used to distribute malware to users.\",\"breadcrumb\":{\"@id\":\"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware#primaryimage\",\"url\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png\",\"contentUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png\",\"width\":1600,\"height\":896,\"caption\":\"HWMonitor \u0219i CPU-Z infectate cu malware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/computershop.eu\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The popular applications HWMonitor and CPU-Z infected with malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/computershop.eu\/blog\/#website\",\"url\":\"https:\/\/computershop.eu\/blog\/\",\"name\":\"Refurbished Computers - ComputerShop.EU\",\"description\":\"Best Refurbished Computers In The EU\",\"publisher\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/computershop.eu\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/computershop.eu\/blog\/#organization\",\"name\":\"Refurbished Computers - ComputerShop.EU\",\"url\":\"https:\/\/computershop.eu\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png\",\"contentUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png\",\"width\":300,\"height\":54,\"caption\":\"Refurbished Computers - ComputerShop.EU\"},\"image\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a\",\"name\":\"Alex\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g\",\"caption\":\"Alex\"},\"url\":\"https:\/\/computershop.eu\/blog\/author\/alex\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The popular applications HWMonitor and CPU-Z infected with malware - Refurbished Computers - ComputerShop.EU","description":"The popular applications HWMonitor and CPU-Z, developed by CPUID, were used to distribute malware to users.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware","og_locale":"en_US","og_type":"article","og_title":"The popular applications HWMonitor and CPU-Z infected with malware - Refurbished Computers - ComputerShop.EU","og_description":"The popular applications HWMonitor and CPU-Z, developed by CPUID, were used to distribute malware to users.","og_url":"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware","og_site_name":"Refurbished Computers - ComputerShop.EU","article_published_time":"2026-04-14T06:54:43+00:00","article_modified_time":"2026-04-14T07:09:13+00:00","og_image":[{"width":1600,"height":896,"url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png","type":"image\/png"}],"author":"Alex","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alex","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware#article","isPartOf":{"@id":"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware"},"author":{"name":"Alex","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a"},"headline":"The popular applications HWMonitor and CPU-Z infected with malware","datePublished":"2026-04-14T06:54:43+00:00","dateModified":"2026-04-14T07:09:13+00:00","mainEntityOfPage":{"@id":"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware"},"wordCount":528,"commentCount":0,"publisher":{"@id":"https:\/\/computershop.eu\/blog\/#organization"},"image":{"@id":"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware#primaryimage"},"thumbnailUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png","keywords":["cpuid attack","malware attack","online safety","securitate cibernetic\u0103","software","virus"],"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware#respond"]}]},{"@type":"WebPage","@id":"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware","url":"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware","name":"The popular applications HWMonitor and CPU-Z infected with malware - Refurbished Computers - ComputerShop.EU","isPartOf":{"@id":"https:\/\/computershop.eu\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware#primaryimage"},"image":{"@id":"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware#primaryimage"},"thumbnailUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png","datePublished":"2026-04-14T06:54:43+00:00","dateModified":"2026-04-14T07:09:13+00:00","description":"The popular applications HWMonitor and CPU-Z, developed by CPUID, were used to distribute malware to users.","breadcrumb":{"@id":"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware#primaryimage","url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png","contentUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png","width":1600,"height":896,"caption":"HWMonitor \u0219i CPU-Z infectate cu malware"},{"@type":"BreadcrumbList","@id":"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/computershop.eu\/blog\/"},{"@type":"ListItem","position":2,"name":"The popular applications HWMonitor and CPU-Z infected with malware"}]},{"@type":"WebSite","@id":"https:\/\/computershop.eu\/blog\/#website","url":"https:\/\/computershop.eu\/blog\/","name":"Refurbished Computers - ComputerShop.EU","description":"Best Refurbished Computers In The EU","publisher":{"@id":"https:\/\/computershop.eu\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/computershop.eu\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/computershop.eu\/blog\/#organization","name":"Refurbished Computers - ComputerShop.EU","url":"https:\/\/computershop.eu\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png","contentUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png","width":300,"height":54,"caption":"Refurbished Computers - ComputerShop.EU"},"image":{"@id":"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a","name":"Alex","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g","caption":"Alex"},"url":"https:\/\/computershop.eu\/blog\/author\/alex"}]}},"jetpack_featured_media_url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts\/4036","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/comments?post=4036"}],"version-history":[{"count":1,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts\/4036\/revisions"}],"predecessor-version":[{"id":4046,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts\/4036\/revisions\/4046"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/media\/4035"}],"wp:attachment":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/media?parent=4036"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/categories?post=4036"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/tags?post=4036"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}