Supply Chain Attack on CPU-Z Neutralized by SentinelOne's AI EDR: A Real-World Case Study

Introduction: A Breach of Trust in Software Distribution

On April 9, 2026, the official website cpuid.com became a conduit for malware, distributing malicious executables through its own download buttons. Threat actors had compromised the domain at the API level, redirecting legitimate download requests to attacker-controlled servers. The attack persisted for approximately 19 hours before being neutralized. Users who navigated directly to the official site received an apparently legitimate, digitally signed binary – but with a hidden malicious payload bundled inside. This incident underscores a systemic shift in cyber threats: attackers now exploit the very trust chains that users rely on.

Supply Chain Attack on CPU-Z Neutralized by SentinelOne's AI EDR: A Real-World Case Study
Source: www.sentinelone.com

Anatomy of the Attack: How the Watering Hole Worked

Compromised Infrastructure, Valid Signatures

The attackers did not tamper with the CPU-Z executable itself. Instead, they compromised the download infrastructure at the API level. When a user clicked the official download button, the request was silently rerouted to attacker-controlled infrastructure. The delivered file – cpuz_x64.exe – bore a valid digital signature from the vendor, making it appear authentic. The malicious code was injected as a payload inside the signed binary.

Behavioral Anomalies Detected by SentinelOne's Agent

SentinelOne’s AI-driven endpoint detection and response (EDR) flagged the file within seconds of execution. The agent observed five converging behavioral indicators that pointed to an active attack:

The agent autonomously terminated and quarantined the involved processes before the attack could advance further. The malicious CRYPTBASE.dll, placed in the application folder by the attacker, was rendered harmless.

The Trust Chain Breakdown: A Deeper Pattern

Why Users Were Powerless

CPU-Z, HWMonitor, and other tools from CPUID are staples in IT toolkits worldwide. Users who downloaded them during the attack followed every security guideline: they used the official site, verified the digital signature, and executed a normally safe binary. The trust chain broke above them – at the vendor’s own infrastructure. As SentinelOne’s Annual Threat Report notes, this extension of attacks “into the software supply chain, where the identity of a trusted developer becomes the vector of attack” is a systemic shift.

Supply Chain Attack on CPU-Z Neutralized by SentinelOne's AI EDR: A Real-World Case Study
Source: www.sentinelone.com

Parallel Campaigns: GhostAction and NPM Phishing

The CPUID incident is not an isolated case. In late 2025, the GhostAction campaign compromised a GitHub maintainer account, pushing malicious workflows to extract secrets. Concurrently, a phishing attack against an NPM package maintainer deployed malicious code capable of intercepting cryptocurrency transactions. In both cases, commit logs and push events appeared legitimate because they originated from accounts with valid write access. The identity was verified; the intent had been subverted.

Lessons for Securing the Software Supply Chain

Beyond Signature Validation

This attack demonstrated that digital signatures alone are insufficient. Attackers can sign malicious code with stolen or abused certificates. Organizations must implement behavioral detection that monitors what executables do, not just where they come from.

Autonomous Response at Scale

SentinelOne’s AI EDR acted without human intervention, stopping the attack in seconds. For enterprises managing thousands of endpoints, autonomous response is critical to contain supply chain attacks before they proliferate.

Supply Chain Visibility

Organizations should demand visibility into the software supply chain of their vendors. This includes verifying that vendors themselves monitor for API-level compromises and maintain strict access controls.

Conclusion: The Next Attack Will Use the Same Playbook

The CPU-Z watering hole attack was a stark reminder that trust is a vulnerability. Attackers will continue to exploit legitimate infrastructure, social engineering, and identity-based access to slip past traditional defenses. Detection based on behavioral indicators – not just signatures or reputation – is the new baseline. SentinelOne’s autonomous blocking of this attack provides a blueprint for defending against the next generation of supply chain threats.

Tags:

Recommended

Discover More

10 Critical Reasons Educators Are Abandoning the Classroom – And What Schools Can Do About ItGitHub Launches Declarative Security Modeling in CodeQL for Faster, Custom AnalysisHow to Supercharge Your Flutter Development with AI Agent Skills: A Step-by-Step GuideXpeng's VLA 2.0 Autonomous Drive Surpasses Tesla FSD in Hostile Beijing Traffic: Zero InterventionsStanford and Adobe Unveil AI Video Model That Finally Remembers Beyond Seconds