CPUID’s software distribution site (cpuid.com) was compromised for approximately 19 hours on April 9-10, 2026, with legitimate download links for CPU-Z, HWMonitor, HWMonitor Pro, and PerfMonitor replaced by trojanized installers delivering STX RAT via DLL side-loading. Over 150 victims across retail, manufacturing, consulting, telecommunications, and agriculture have been confirmed by Kaspersky; no CVE is assigned as the vulnerability was in the distribution channel rather than the software itself, and the site has since been remediated. Any organization whose staff downloaded these utilities during the compromise window should immediately isolate affected endpoints, revoke credentials accessible from those systems, and hunt for STX RAT indicators using IOCs published in the Kaspersky Securelist report.