CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads
嗯,用户让我总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”这样的开头。首先,我需要仔细阅读文章,抓住主要信息。 文章讲的是CPUID网站被未知威胁者入侵,时间不到24小时。他们通过这个网站分发恶意软件和部署远程访问木马STX RAT。事件发生在4月9日至10日,下载链接被替换成了恶意网站。 CPUID确认了这次入侵,是由于一个次要功能被攻破。攻击没有影响到他们签名的原始文件。Kaspersky提到恶意网站的名字和分发方式,包括ZIP和独立安装程序,里面包含合法签名的可执行文件和恶意DLL。 这个DLL会联系外部服务器并执行额外载荷,在此之前还会做反沙盒检查。最终目的是部署STX RAT,它有远程控制、后续载荷执行等功能。 C2服务器地址和配置是从之前的攻击中复用的,那次攻击是通过恶意FileZilla安装程序分发同一RAT。Kaspersky发现超过150名受害者,主要是个体用户,也有企业受到影响,集中在巴西、俄罗斯和中国。 攻击者最大的错误是重复使用相同的感染链和C2域名,导致容易被检测到。威胁行为者的开发和运营安全能力较低。 现在我需要把这些信息浓缩到100字以内。要包括入侵事件、时间、影响、恶意软件、受害者分布以及攻击者的错误。 可能的结构:CPUID网站被入侵不到24小时,用于分发恶意软件和部署STX RAT。事件发生在4月9日至10日,下载链接被替换为恶意网站。攻击者利用次要功能漏洞,未影响签名文件。Kaspersky发现超过150名受害者,主要在巴西、俄罗斯和中国。攻击者重复使用感染链和C2域名导致易被检测。 </think> CPUID网站遭未知威胁者入侵不到24小时,用于分发恶意软件并部署STX RAT远程访问木马。事件发生在4月9日至10日间,下载链接被替换为恶意网站。攻击利用次要功能漏洞进行,未影响签名文件。Kaspersky报告称超150名受害者分布于巴西、俄罗斯和中国等地。攻击者因重复使用感染链及C2域名易被检测。 2026-4-12 05:54:0 Author: thehackernews.com(查看原文) 阅读量:7 收藏

Malware / Threat Intelligence

Unknown threat actors compromised CPUID ("cpuid[.]com"), a website that hosts popular hardware monitoring tools like CPU-Z, HWMonitor, HWMonitor Pro, and PerfMonitor, for less than 24 hours to serve malicious executables for the software and deploy a remote access trojan called STX RAT.

The incident lasted from approximately April 9, 15:00 UTC, to about April 10, 10:00 UTC, with the download URLs for CPU-Z and HWMonitor installers replaced with links to malicious websites.

In a post shared on X, CPUID confirmed the breach, attributing it to a compromise of a "secondary feature (basically a side API)" that caused the main site to randomly display malicious links. It's worth noting that the attack did not impact its signed original files.

According to Kaspersky, the names of the rogue websites are as follows -

  • cahayailmukreatif.web[.]id
  • pub-45c2577dbd174292a02137c18e7b1b5a.r2[.]dev
  • transitopalermo[.]com
  • vatrobran[.]hr

"The trojanized software was distributed both as ZIP archives and as standalone installers for the aforementioned products," the Russian cybersecurity company said. "These files contain a legitimate signed executable for the corresponding product and a malicious DLL, which is named 'CRYPTBASE.dll' to leverage the DLL side-loading technique."

The malicious DLL, for its part, contacts an external server and executes additional payloads, but not before performing anti-sandbox checks to sidestep detection. The end goal of the campaign is to deploy STX RAT, a RAT with HVNC and broad infostealer capabilities.

STX RAT "exposes a broad command set for remote control, follow-on payload execution, and post-exploitation actions (e.g., in-memory execution of EXE/DLL/PowerShell/shellcode, reverse proxy/tunneling, desktop interaction)," eSentire said in an analysis of the malware last week.

The command-and-control (C2) server address and the connection configuration have been reused from a prior campaign that leveraged trojanized FileZilla installers hosted on bogus sites to deploy the same RAT malware. The activity was documented by Malwarebytes early last month.

Kaspersky said it has identified more than 150 victims, mostly individuals who were affected by the incident. However, organizations in retail, manufacturing, consulting, telecommunications, and agriculture have also been impacted. Most of the infections are located in Brazil, Russia, and China.

"The gravest mistake attackers made was to reuse the same infection chain involving STX RAT, and the same domain names for C2 communication, from the previous attack related to fake FileZilla installers," Kaspersky said. "The overall malware development/deployment and operational security capabilities of the threat actor behind this attack are quite low, which, in turn, made it possible to detect the watering hole compromise as soon as it started."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/cpuid-breach-distributes-stx-rat-via.html
如有侵权请联系:admin#unsafe.sh