{"id":4040,"date":"2026-04-14T08:54:43","date_gmt":"2026-04-14T06:54:43","guid":{"rendered":"https:\/\/computershop.eu\/blog\/?p=4032"},"modified":"2026-04-14T09:07:41","modified_gmt":"2026-04-14T07:07:41","slug":"hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants","status":"publish","type":"post","link":"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants","title":{"rendered":"HWMonitor et CPU-Z infect\u00e9es par des logiciels malveillants"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 2<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>\n<p>Un incident r\u00e9cent de cybers\u00e9curit\u00e9 a attir\u00e9 l&#8217;attention de la communaut\u00e9 informatique : les applications populaires <strong>HWMonitor<\/strong> et <strong>CPU-Z<\/strong>, d\u00e9velopp\u00e9es par la soci\u00e9t\u00e9 CPUID, ont \u00e9t\u00e9 utilis\u00e9es pour distribuer des logiciels malveillants aux utilisateurs. Cet \u00e9v\u00e9nement souligne les risques croissants associ\u00e9s aux attaques de type <em>supply chain<\/em> et l&#8217;importance de v\u00e9rifier les sources de t\u00e9l\u00e9chargement.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Que s&#8217;est-il pass\u00e9?<\/h2>\n\n\n\n<p>Selon les derni\u00e8res informations apparues sur des sites sp\u00e9cialis\u00e9s (Cybernews, Tom&#8217;s Hardware, etc.), le site officiel de <a href=\"https:\/\/www.cpuid.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">CPUID<\/a> a \u00e9t\u00e9 compromis par des attaquants inconnus. Suite \u00e0 cette br\u00e8che, les utilisateurs qui t\u00e9l\u00e9chargeaient HWMonitor ou CPU-Z recevaient, au lieu des applications l\u00e9gitimes, des versions infect\u00e9es par des logiciels malveillants.<\/p>\n\n\n\n<p>L&#8217;attaque a dur\u00e9 environ six heures et a \u00e9t\u00e9 rendue possible par la compromission d&#8217;une API secondaire du site. Pendant cet intervalle, les liens de t\u00e9l\u00e9chargement ont \u00e9t\u00e9 redirig\u00e9s vers des domaines contr\u00f4l\u00e9s par les attaquants, qui livraient des fichiers malveillants \u00e0 la place des originaux.<\/p>\n\n\n\n<p>Il est important de noter que les fichiers originaux sign\u00e9s num\u00e9riquement n&#8217;ont pas \u00e9t\u00e9 compromis, mais seulement l&#8217;infrastructure de distribution.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Comment fonctionne ces types de logiciels malveillants?<\/h2>\n\n\n\n<p>Le logiciel malveillant distribu\u00e9 est complexe, multi-\u00e9tapes, con\u00e7u pour \u00e9viter la d\u00e9tection par les solutions antivirus. Les sp\u00e9cialistes ont observ\u00e9 qu&#8217;il fonctionnait presque enti\u00e8rement en m\u00e9moire et utilisait des techniques d&#8217;\u00e9vasion avanc\u00e9es.<\/p>\n\n\n\n<p>Ce type de logiciel malveillant utilise PowerShell pour t\u00e9l\u00e9charger des fichiers suppl\u00e9mentaires depuis les serveurs des attaquants et laisse une adresse incluse dans le code par laquelle il re\u00e7oit des commandes.<\/p>\n\n\n\n<p>Pour passer inaper\u00e7u, le fichier infect\u00e9 a \u00e9t\u00e9 nomm\u00e9 CRYPTBASE.dll, similaire \u00e0 la biblioth\u00e8que Windows utilis\u00e9e par HWMonitor. L&#8217;objectif principal de l&#8217;attaque \u00e9tait le vol de donn\u00e9es sensibles, en particulier les identifiants enregistr\u00e9s dans le navigateur, comme les mots de passe de Google Chrome.<\/p>\n\n\n\n<p>Dans certains cas, les fichiers t\u00e9l\u00e9charg\u00e9s avaient des noms suspects, tels que \u00ab HWiNFO_Monitor_Setup.exe \u00bb, et pr\u00e9sentaient des indices inhabituels, comme des ex\u00e9cutables en langue russe.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Pourquoi cet incident est-il important?<\/h2>\n\n\n\n<p>Ce cas repr\u00e9sente un exemple clair d&#8217;attaque de type <em>supply chain<\/em>, o\u00f9 les pirates ne compromettent pas directement l&#8217;application, mais le canal par lequel elle est distribu\u00e9e. De telles attaques sont extr\u00eamement dangereuses car elles ciblent des logiciels de confiance, utilis\u00e9s par des millions de personnes.<\/p>\n\n\n\n<p>De plus, la popularit\u00e9 d&#8217;applications telles que CPU-Z (utilis\u00e9e pour identifier les composants mat\u00e9riels) rend l&#8217;impact potentiel tr\u00e8s important.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Que faire si vous avez t\u00e9l\u00e9charg\u00e9 les applications infect\u00e9es par des logiciels malveillants ?<\/h2>\n\n\n\n<p>Si vous avez t\u00e9l\u00e9charg\u00e9 ou mis \u00e0 jour HWMonitor ou CPU-Z pendant la p\u00e9riode affect\u00e9e, les experts recommandent:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>La d\u00e9sinstallation imm\u00e9diate de l&#8217;application<\/li>\n\n\n\n<li>La num\u00e9risation compl\u00e8te du syst\u00e8me avec un antivirus mis \u00e0 jour<\/li>\n\n\n\n<li>Le changement de tous les mots de passe importants<\/li>\n\n\n\n<li>L&#8217;activation de l&#8217;authentification \u00e0 deux facteurs (2FA)<\/li>\n\n\n\n<li>La v\u00e9rification de l&#8217;activit\u00e9 des comptes en ligne.<\/li>\n<\/ul>\n\n\n\n<p>Dans le cas o\u00f9 le logiciel malveillant a \u00e9t\u00e9 install\u00e9, il existe un risque que les donn\u00e9es personnelles aient \u00e9t\u00e9 compromises.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Comment se prot\u00e9ger \u00e0 l&#8217;avenir ?<\/h2>\n\n\n\n<p>Pour \u00e9viter des situations similaires :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>T\u00e9l\u00e9chargez des logiciels uniquement \u00e0 partir de sources officielles et v\u00e9rifiez l&#8217;int\u00e9grit\u00e9 des fichiers<\/li>\n\n\n\n<li>Utilisez des solutions antivirus \u00e0 jour<\/li>\n\n\n\n<li>Soyez attentif aux noms suspects ou aux comportements inhabituels lors de l&#8217;installation<\/li>\n\n\n\n<li>Comparez les hachages ou les signatures num\u00e9riques des fichiers.<\/li>\n<\/ul>\n\n\n\n<p>L&#8217;incident HWMonitor et CPU-Z montre \u00e0 quel point m\u00eame les applications les plus populaires peuvent \u00eatre vuln\u00e9rables. En 2026, la <a href=\"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes\" target=\"_blank\" rel=\"noreferrer noopener\">s\u00e9curit\u00e9 en ligne<\/a> ne d\u00e9pend plus seulement des d\u00e9veloppeurs, mais aussi de la vigilance des utilisateurs. Une v\u00e9rification attentive des t\u00e9l\u00e9chargements et l&#8217;adoption de pratiques de s\u00e9curit\u00e9 solides peuvent faire la diff\u00e9rence entre un syst\u00e8me s\u00e9curis\u00e9 et un syst\u00e8me compromis.<\/p>\n\n\n\n<p>Sources : <a href=\"https:\/\/www.tomshardware.com\/tech-industry\/cyber-security\/hwmonitor-and-cpu-z-developer-cpuid-breached-by-unknown-attackers-cyberattack-forced-users-to-download-malware-instead-of-valid-apps-for-approximately-six-hours\" target=\"_blank\" rel=\"noreferrer noopener\">tomshardware.com<\/a>, <a href=\"https:\/\/cybernews.com\/security\/cpuid-hwmonitor-hwinfo-cpuz-deliver-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">cybernews.com<\/a><\/p>\n\t<div class=\"quickshare-container\">\r\n\t<ul class=\"quickshare-genericons monochrome quickshare-effect-expand\">\r\n\t\t<li class=\"quickshare-share\">Share:<\/li> \r\n\t\t<li><a href=\"https:\/\/facebook.com\/sharer.php?u=https%3A%2F%2Fcomputershop.eu%2Fblog%2Ffr%2Fhwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants&amp;t=HWMonitor+et+CPU-Z+infect%C3%A9es+par+des+logiciels+malveillants+<+Refurbished+Computers+-+ComputerShop.EU\" target=\"_blank\" title=\"Share on Facebook\"><span class=\"quickshare-facebook\">Facebook<\/span><\/a><\/li>\t\t<li><a href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Ffr%2Fhwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants&amp;text=HWMonitor+et+CPU-Z+infect%C3%A9es+par+des+logiciels+malveillants+<+Refurbished+Computers+-+ComputerShop.EU\" target=\"_blank\" title=\"Share on Twitter\"><span class=\"quickshare-twitter\">Twitter<\/span><\/a><\/li>\t\t<li><a href=\"http:\/\/pinterest.com\/pin\/create\/button\/?url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Ffr%2Fhwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants&amp;media=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fwp-content%2Fuploads%2F2026%2F04%2FHWMonitor-si-CPU-Z-infectate-cu-malware-300x168.png&amp;description=Un+incident+r%C3%A9cent+de+cybers%C3%A9curit%C3%A9+a+attir%C3%A9+l%27attention+de+la+communaut%C3%A9+informatique+%3A+les+applications+populaires+HWMonitor+et+CPU-Z%2C+d%C3%A9velopp%C3%A9es+par+la+soci%C3%A9t%C3%A9+CPUID%2C+ont+%C3%A9t%C3%A9+utilis%C3%A9es+pour+distribuer+des+logiciels+malveillants+aux+utilisateurs.+Cet+%C3%A9v%C3%A9nement+souligne+les+risques+croissants%26hellip%3B\" target=\"_blank\" title=\"Share on Pinterest\"><span class=\"quickshare-pinterest\">Pinterest<\/span><\/a><\/li>\t\t<li><a href=\"http:\/\/linkedin.com\/shareArticle?mini=true&amp;url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Ffr%2Fhwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants&amp;title=HWMonitor+et+CPU-Z+infect%C3%A9es+par+des+logiciels+malveillants&amp;source=Refurbished+Computers+-+ComputerShop.EU&amp;summary=Un+incident+r%C3%A9cent+de+cybers%C3%A9curit%C3%A9+a+attir%C3%A9+l%27attention+de+la+communaut%C3%A9+informatique+%3A+les+applications+populaires+HWMonitor+et+CPU-Z%2C+d%C3%A9velopp%C3%A9es+par+la+soci%C3%A9t%C3%A9+CPUID%2C+ont+%C3%A9t%C3%A9+utilis%C3%A9es+pour+distribuer+des+logiciels+malveillants+aux+utilisateurs.+Cet+%C3%A9v%C3%A9nement+souligne+les+risques+croissants%26hellip%3B\" title=\"Share on Linkedin\" target=\"_blank\"><span class=\"quickshare-linkedin\">Linkedin<\/span><\/a><\/li>\t\t<li><a href=\"https:\/\/plus.google.com\/share?url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Ffr%2Fhwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants\" target=\"_blank\" title=\"Share on Google+\"><span class=\"quickshare-googleplus\">Google+<\/span><\/a><\/li>\t\t\t\t\t\t\t\t<li><a href=\"mailto:?subject=Refurbished+Computers+-+ComputerShop.EU:+HWMonitor+et+CPU-Z+infect%C3%A9es+par+des+logiciels+malveillants&amp;body=https%3A%2F%2Fcomputershop.eu%2Fblog%2Ffr%2Fhwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants\" target=\"_blank\" title=\"Share via Email\"><span class=\"quickshare-email\">Email<\/span><\/a><\/li>\t<\/ul>\r\n\t<\/div>\r\n","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 2<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>Un incident r\u00e9cent de cybers\u00e9curit\u00e9 a attir\u00e9 l&#8217;attention de la communaut\u00e9 informatique : les applications populaires HWMonitor et CPU-Z, d\u00e9velopp\u00e9es par la soci\u00e9t\u00e9 CPUID, ont \u00e9t\u00e9 utilis\u00e9es pour distribuer des logiciels malveillants aux utilisateurs. Cet \u00e9v\u00e9nement souligne les risques croissants &hellip; <a href=\"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":4035,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[103],"tags":[15117,15120,2588,9028,4233,15068],"class_list":["post-4040","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nouvelles","tag-attaque-cpuid","tag-attaque-de-logiciel-malveillant","tag-logiciel","tag-securite-en-ligne","tag-securite-informatique","tag-virus"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>HWMonitor et CPU-Z infect\u00e9es par des logiciels malveillants - Refurbished Computers - ComputerShop.EU<\/title>\n<meta name=\"description\" content=\"HWMonitor et CPU-Z, d\u00e9velopp\u00e9es par la soci\u00e9t\u00e9 CPUID, ont \u00e9t\u00e9 utilis\u00e9es pour distribuer des logiciels malveillants aux utilisateurs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HWMonitor et CPU-Z infect\u00e9es par des logiciels malveillants - Refurbished Computers - ComputerShop.EU\" \/>\n<meta property=\"og:description\" content=\"HWMonitor et CPU-Z, d\u00e9velopp\u00e9es par la soci\u00e9t\u00e9 CPUID, ont \u00e9t\u00e9 utilis\u00e9es pour distribuer des logiciels malveillants aux utilisateurs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants\" \/>\n<meta property=\"og:site_name\" content=\"Refurbished Computers - ComputerShop.EU\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-14T06:54:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-14T07:07:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"896\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alex\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants#article\",\"isPartOf\":{\"@id\":\"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants\"},\"author\":{\"name\":\"Alex\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a\"},\"headline\":\"HWMonitor et CPU-Z infect\u00e9es par des logiciels malveillants\",\"datePublished\":\"2026-04-14T06:54:43+00:00\",\"dateModified\":\"2026-04-14T07:07:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants\"},\"wordCount\":702,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants#primaryimage\"},\"thumbnailUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png\",\"keywords\":[\"attaque cpuid\",\"attaque de logiciel malveillant\",\"logiciel\",\"s\u00e9curit\u00e9 en ligne\",\"s\u00e9curit\u00e9 informatique\",\"virus\"],\"articleSection\":[\"Nouvelles\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants\",\"url\":\"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants\",\"name\":\"HWMonitor et CPU-Z infect\u00e9es par des logiciels malveillants - Refurbished Computers - ComputerShop.EU\",\"isPartOf\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants#primaryimage\"},\"image\":{\"@id\":\"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants#primaryimage\"},\"thumbnailUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png\",\"datePublished\":\"2026-04-14T06:54:43+00:00\",\"dateModified\":\"2026-04-14T07:07:41+00:00\",\"description\":\"HWMonitor et CPU-Z, d\u00e9velopp\u00e9es par la soci\u00e9t\u00e9 CPUID, ont \u00e9t\u00e9 utilis\u00e9es pour distribuer des logiciels malveillants aux utilisateurs.\",\"breadcrumb\":{\"@id\":\"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants#primaryimage\",\"url\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png\",\"contentUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png\",\"width\":1600,\"height\":896,\"caption\":\"HWMonitor \u0219i CPU-Z infectate cu malware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/computershop.eu\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"HWMonitor et CPU-Z infect\u00e9es par des logiciels malveillants\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/computershop.eu\/blog\/#website\",\"url\":\"https:\/\/computershop.eu\/blog\/\",\"name\":\"Refurbished Computers - ComputerShop.EU\",\"description\":\"Best Refurbished Computers In The EU\",\"publisher\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/computershop.eu\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/computershop.eu\/blog\/#organization\",\"name\":\"Refurbished Computers - ComputerShop.EU\",\"url\":\"https:\/\/computershop.eu\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png\",\"contentUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png\",\"width\":300,\"height\":54,\"caption\":\"Refurbished Computers - ComputerShop.EU\"},\"image\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a\",\"name\":\"Alex\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g\",\"caption\":\"Alex\"},\"url\":\"https:\/\/computershop.eu\/blog\/author\/alex\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"HWMonitor et CPU-Z infect\u00e9es par des logiciels malveillants - Refurbished Computers - ComputerShop.EU","description":"HWMonitor et CPU-Z, d\u00e9velopp\u00e9es par la soci\u00e9t\u00e9 CPUID, ont \u00e9t\u00e9 utilis\u00e9es pour distribuer des logiciels malveillants aux utilisateurs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants","og_locale":"en_US","og_type":"article","og_title":"HWMonitor et CPU-Z infect\u00e9es par des logiciels malveillants - Refurbished Computers - ComputerShop.EU","og_description":"HWMonitor et CPU-Z, d\u00e9velopp\u00e9es par la soci\u00e9t\u00e9 CPUID, ont \u00e9t\u00e9 utilis\u00e9es pour distribuer des logiciels malveillants aux utilisateurs.","og_url":"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants","og_site_name":"Refurbished Computers - ComputerShop.EU","article_published_time":"2026-04-14T06:54:43+00:00","article_modified_time":"2026-04-14T07:07:41+00:00","og_image":[{"width":1600,"height":896,"url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png","type":"image\/png"}],"author":"Alex","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alex","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants#article","isPartOf":{"@id":"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants"},"author":{"name":"Alex","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a"},"headline":"HWMonitor et CPU-Z infect\u00e9es par des logiciels malveillants","datePublished":"2026-04-14T06:54:43+00:00","dateModified":"2026-04-14T07:07:41+00:00","mainEntityOfPage":{"@id":"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants"},"wordCount":702,"commentCount":0,"publisher":{"@id":"https:\/\/computershop.eu\/blog\/#organization"},"image":{"@id":"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants#primaryimage"},"thumbnailUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png","keywords":["attaque cpuid","attaque de logiciel malveillant","logiciel","s\u00e9curit\u00e9 en ligne","s\u00e9curit\u00e9 informatique","virus"],"articleSection":["Nouvelles"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants#respond"]}]},{"@type":"WebPage","@id":"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants","url":"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants","name":"HWMonitor et CPU-Z infect\u00e9es par des logiciels malveillants - Refurbished Computers - ComputerShop.EU","isPartOf":{"@id":"https:\/\/computershop.eu\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants#primaryimage"},"image":{"@id":"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants#primaryimage"},"thumbnailUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png","datePublished":"2026-04-14T06:54:43+00:00","dateModified":"2026-04-14T07:07:41+00:00","description":"HWMonitor et CPU-Z, d\u00e9velopp\u00e9es par la soci\u00e9t\u00e9 CPUID, ont \u00e9t\u00e9 utilis\u00e9es pour distribuer des logiciels malveillants aux utilisateurs.","breadcrumb":{"@id":"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants#primaryimage","url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png","contentUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png","width":1600,"height":896,"caption":"HWMonitor \u0219i CPU-Z infectate cu malware"},{"@type":"BreadcrumbList","@id":"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/computershop.eu\/blog\/"},{"@type":"ListItem","position":2,"name":"HWMonitor et CPU-Z infect\u00e9es par des logiciels malveillants"}]},{"@type":"WebSite","@id":"https:\/\/computershop.eu\/blog\/#website","url":"https:\/\/computershop.eu\/blog\/","name":"Refurbished Computers - ComputerShop.EU","description":"Best Refurbished Computers In The EU","publisher":{"@id":"https:\/\/computershop.eu\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/computershop.eu\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/computershop.eu\/blog\/#organization","name":"Refurbished Computers - ComputerShop.EU","url":"https:\/\/computershop.eu\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png","contentUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png","width":300,"height":54,"caption":"Refurbished Computers - ComputerShop.EU"},"image":{"@id":"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a","name":"Alex","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g","caption":"Alex"},"url":"https:\/\/computershop.eu\/blog\/author\/alex"}]}},"jetpack_featured_media_url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/HWMonitor-si-CPU-Z-infectate-cu-malware.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts\/4040","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/comments?post=4040"}],"version-history":[{"count":2,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts\/4040\/revisions"}],"predecessor-version":[{"id":4044,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts\/4040\/revisions\/4044"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/media\/4035"}],"wp:attachment":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/media?parent=4040"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/categories?post=4040"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/tags?post=4040"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}