Trusted software, compromised delivery: the real lesson from CPUID

In January 2026, security researchers identified two malicious Python packages on PyPI — spellcheckerpy and spellcheckpy — that pretended to be connected to the legitimate pyspellchecker project. They looked credible enough to fool developers, but were designed to deliver a remote access trojan instead.

That may sound like a narrow developer problem.

It isn’t.

This is a clear example of a wider business issue: modern software teams increasingly rely on open-source packages they did not write, do not fully inspect, and often install in seconds. When one of those packages is malicious — or simply looks close enough to a trusted one — the risk is not theoretical. It can become a direct route into systems, credentials, and sensitive development environments.

What actually happened

The simplest way to understand this breach is this:

People went to a trusted software site.
They clicked what looked like a normal download link.
Some of them received malware instead of the legitimate tool.

According to multiple reports, the malicious package paired a real signed executable with a malicious DLL called CRYPTBASE.dll. That DLL was then used to launch a multi-stage malware chain that ultimately delivered STX RAT, a remote access trojan associated with credential theft and ongoing access to compromised machines.

Non-technical readers do not need to remember the file names. The important point is this:

the attacker did not need to rewrite CPUID’s software to cause serious harm.
They only needed to interfere with how the software was delivered.

That distinction matters, because many organisations still think software risk begins and ends with the codebase itself. This incident shows that the delivery path can be just as dangerous as the application.

Why this matters beyond IT teams

CPU-Z and HWMonitor are not obscure downloads. They are widely used utilities, especially by technical users such as IT professionals, administrators, engineers, and support teams. Researchers described the exposure surface as large, and Kaspersky said it identified more than 150 victims, including organisations across sectors such as retail, manufacturing, consulting, telecommunications, and agriculture.

That is what makes this story important for non-technical audiences.

This was not just “someone downloaded a bad file.”
It was a compromise of a trusted channel used by the kind of people who often have elevated access, sensitive credentials, and visibility into important systems.

In practical terms, that can mean exposure of:

  • browser-stored credentials
  • session cookies
  • privileged access
  • internal systems reached through reused or stolen credentials
  • follow-on compromise well beyond the original infected machine

So while the mechanics were technical, the business issue is simple:

trusted software became a business risk because trust itself was exploited.

The leadership lesson

The real lesson from the CPUID breach is not “be more careful downloading files.”

That is too shallow.

The real lesson is that modern software risk is no longer limited to whether your developers wrote good code. It also includes:

  • what third-party software your teams rely on
  • what components and dependencies exist across your estate
  • where software came from
  • whether anything changed unexpectedly
  • how quickly you can assess exposure when something trusted is compromised

That is why incidents like this matter to boards, CEOs, investors and operational leaders.

Because when a software supplier, tool, dependency, or download path is compromised, the first question is no longer just, “Was the vendor breached?”

It becomes:

Where are we exposed?
What systems are affected?
What credentials might be at risk?
What do we need to do now?

If those answers are slow, unclear, or dependent on manual guesswork, the business is already behind.

Where The Code Registry fits

This is where TCR has a natural role in the conversation.

The Code Registry is not a download filter, and it would be wrong to pretend otherwise. But this breach is exactly the kind of event that shows why organisations need better visibility into their software estate.

When trusted software becomes suspect, businesses need to understand:

  • what code and components they rely on
  • what third-party exposure exists
  • what risk is sitting inside their software environment
  • and how to explain that risk clearly to both technical and non-technical stakeholders

That is the bigger point.

You cannot manage software risk if you do not understand your software estate.

And in 2026, that understanding has to go beyond “our vendor is reputable” or “the file was signed.”

It has to be evidence-based.

Trust is no longer enough

The CPUID incident is a reminder that software trust is no longer binary.

A known vendor can be legitimate.


A signed executable can be legitimate.


The software can still become dangerous if the delivery chain is compromised.

For technical teams, that means better validation, monitoring, and incident response.
For leadership teams, it means accepting that software assurance now requires visibility, provenance, and independent verification, not just brand trust.

That is the mindset shift.

Because the cost of not knowing is rising, and the organisations that respond best will be the ones that can quickly answer a simple but increasingly important question:

Do we actually know our code, our dependencies, and our exposure, or are we still trusting by default?
Incidents like the CPUID breach are a reminder that software risk does not begin and end with the source code. It lives in dependencies, delivery paths, third-party tools, and blind spots across the software estate. That is why organisations need more than trust. They need visibility. They need evidence. They need to know their code.

Want to Learn More?

Our simple sign-up process takes less than 5 minutes, once we’ve replicated your code and created your dedicated IP Code Vault you’ll be able to start understanding more about your code immediately! Why not book a non obligation demo today to see our platform in action.

Know Your Code
Verify Your Code
Remediate Your Code

Today, everyone is using AI code generation tools — including your developers. But how do you know your code is secure, your IP is protected, it is properly licensed, and it is actually worth what you think it is?

Now you can.

The Code Registry was built to solve exactly this problem. Our patent-pending code intelligence platform helps you verify, audit, value, and remediate your code in real time.

Schedule a Call
Before you go

Take our quiz - How well do you Know Your Code?

We’ve analyzed over 1 billion lines of code, so we know what the trends are!

Answer just 6 questions and we’ll tell you how you score against our recommended best practices.