Skip to main content

PSA: CrystalDiskInfo & CrystalDiskMark now embeds adwares /!\

Medium
Published: Wed Jul 16 2025 (07/16/2025, 10:46:35 UTC)
Source: Reddit NetSec

Description

For unknown, and regrettable, reasons, these 2 awesome utilities now embeds adwares ! It is recent: - For CrystalDiskMark, this starts from version 9.0.0. - For CrystalDiskInfo, this starts from version 9.7.0 You can see the "*ads.exe" files: - hxxps://sourceforge.net/projects/crystaldiskmark/files/9.0.1/ - hxxps://sourceforge.net/projects/crystaldiskmark/files/9.0.0/ - hxxps://sourceforge.net/projects/crystaldiskinfo/files/9.7.0/ More explanations here: hxxps://forums.tomshardware.com/threads/is-crystaldiskinfo-still-safe.3882065/

AI-Powered Analysis

AILast updated: 07/16/2025, 11:01:26 UTC

Technical Analysis

Recent versions of two popular disk utility tools, CrystalDiskInfo (starting from version 9.7.0) and CrystalDiskMark (starting from version 9.0.0), have been reported to embed adware components within their installation packages. These adware executables, identified as "*ads.exe" files, are bundled with the software distributed via SourceForge, a common platform for open-source software distribution. The inclusion of adware is a significant deviation from the previously clean reputation of these utilities, which are widely used for monitoring and benchmarking storage devices. While the adware does not appear to be a direct exploit such as remote code execution (RCE), the presence of unsolicited advertising software can introduce privacy risks, degrade system performance, and potentially open indirect attack vectors if the adware is malicious or poorly maintained. The discussion and awareness around this issue have been raised primarily on Reddit's NetSec community and forums such as Tom's Hardware, indicating community concern but minimal widespread discussion or exploitation to date. No known exploits are currently reported in the wild, and there is no indication that the adware includes direct vulnerabilities like RCE, but the embedding of adware in trusted utilities undermines user trust and may lead to inadvertent exposure to further threats.

Potential Impact

For European organizations, the impact of this threat is primarily reputational and operational rather than immediately catastrophic. Many enterprises and IT professionals rely on CrystalDiskInfo and CrystalDiskMark for hardware diagnostics and performance testing. The presence of adware can lead to unwanted network traffic, potential data leakage, and increased attack surface if the adware communicates with external servers or downloads additional payloads. This could contravene strict European data protection regulations such as GDPR if personal or device data is transmitted without consent. Additionally, organizations with strict software procurement policies may face challenges in software approval and compliance. The indirect risks include potential malware delivery through the adware or exploitation of vulnerabilities within the adware itself if it is not securely maintained. While no direct remote code execution exploits are currently known, the embedding of adware in widely used utilities could be leveraged by threat actors in supply chain attacks or social engineering campaigns targeting European businesses.

Mitigation Recommendations

European organizations should immediately audit their use of CrystalDiskInfo and CrystalDiskMark, especially versions 9.0.0 and above for CrystalDiskMark and 9.7.0 and above for CrystalDiskInfo. It is advisable to revert to earlier versions known to be free of adware or switch to alternative trusted disk utility tools that do not bundle adware. Organizations should implement strict software whitelisting and application control policies to prevent unauthorized or unvetted software installations. Network monitoring should be enhanced to detect unusual outbound connections potentially initiated by adware components. Endpoint detection and response (EDR) solutions should be configured to flag and quarantine unexpected executables like "*ads.exe". Additionally, organizations should educate users about the risks of downloading software from third-party sites and encourage the use of official vendor websites or verified repositories. Regular vulnerability assessments and supply chain security reviews should include checks for adware or unwanted software bundled with legitimate tools.

Need more detailed analysis?Get Pro

Technical Details

Source Type
reddit
Subreddit
netsec
Reddit Score
2
Discussion Level
minimal
Content Source
reddit_link_post
Domain
forums.tomshardware.com
Newsworthiness Assessment
{"score":30.200000000000003,"reasons":["external_link","newsworthy_keywords:rce","established_author","very_recent"],"isNewsworthy":true,"foundNewsworthy":["rce"],"foundNonNewsworthy":[]}
Has External Source
true
Trusted Domain
false

Threat ID: 68778679a83201eaacd9e78c

Added to database: 7/16/2025, 11:01:13 AM

Last enriched: 7/16/2025, 11:01:26 AM

Last updated: 7/16/2025, 11:01:26 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats