Unknown menace actors compromised CPUID (“cpuid[.]com”), an internet site that hosts fashionable {hardware} monitoring instruments like CPU-Z, HWMonitor, HWMonitor Professional, and PerfMonitor, for lower than 24 hours to serve malicious executables for the software program and deploy a distant entry trojan referred to as STX RAT.
The incident lasted from roughly April 9, 15:00 UTC, to about April 10, 10:00 UTC, with the obtain URLs for CPU-Z and HWMonitor installers changed with hyperlinks to malicious web sites.
In a put up shared on X, CPUID confirmed the breach, attributing it to a compromise of a “secondary function (principally a aspect API)” that prompted the primary web site to randomly show malicious hyperlinks. It is value noting that the assault didn’t affect its signed unique information.
In accordance to Kaspersky, the names of the rogue web sites are as follows –
- cahayailmukreatif.net[.]id
- pub-45c2577dbd174292a02137c18e7b1b5a.r2[.]dev
- transitopalermo[.]com
- vatrobran[.]hr
“The trojanized software program was distributed each as ZIP archives and as standalone installers for the aforementioned merchandise,” the Russian cybersecurity firm stated. “These information comprise a authentic signed executable for the corresponding product and a malicious DLL, which is called ‘CRYPTBASE.dll’ to leverage the DLL side-loading method.”
The malicious DLL, for its half, contacts an exterior server and executes further payloads, however not earlier than performing anti-sandbox checks to sidestep detection. The finish purpose of the marketing campaign is to deploy STX RAT, a RAT with HVNC and broad infostealer capabilities.
STX RAT “exposes a broad command set for distant management, follow-on payload execution, and post-exploitation actions (e.g., in-memory execution of EXE/DLL/PowerShell/shellcode, reverse proxy/tunneling, desktop interplay),” eSentire stated in an evaluation of the malware final week.
The command-and-control (C2) server tackle and the connection configuration have been reused from a prior marketing campaign that leveraged trojanized FileZilla installers hosted on bogus websites to deploy the identical RAT malware. The exercise was documented by Malwarebytes early final month.
Kaspersky stated it has recognized greater than 150 victims, principally people who had been affected by the incident. Nevertheless, organizations in retail, manufacturing, consulting, telecommunications, and agriculture have additionally been impacted. Most of the infections are situated in Brazil, Russia, and China.
“The gravest mistake attackers made was to reuse the identical an infection chain involving STX RAT, and the identical domains for C2 communication, from the earlier assault associated to pretend FileZilla installers,” Kaspersky stated. “The general malware improvement/deployment and operational safety capabilities of the menace actor behind this assault are fairly low, which, in flip, made it doable to detect the watering gap compromise as quickly because it began.”










