PSA: CrystalDiskInfo & CrystalDiskMark now embeds adwares /!\
For unknown, and regrettable, reasons, these 2 awesome utilities now embeds adwares ! It is recent: - For CrystalDiskMark, this starts from version 9.0.0. - For CrystalDiskInfo, this starts from version 9.7.0 You can see the "*ads.exe" files: - hxxps://sourceforge.net/projects/crystaldiskmark/files/9.0.1/ - hxxps://sourceforge.net/projects/crystaldiskmark/files/9.0.0/ - hxxps://sourceforge.net/projects/crystaldiskinfo/files/9.7.0/ More explanations here: hxxps://forums.tomshardware.com/threads/is-crystaldiskinfo-still-safe.3882065/
AI Analysis
Technical Summary
Recent versions of two popular disk utility tools, CrystalDiskInfo (starting from version 9.7.0) and CrystalDiskMark (starting from version 9.0.0), have been reported to embed adware components within their installation packages. These adware executables, identified as "*ads.exe" files, are bundled with the software distributed via SourceForge, a common platform for open-source software distribution. The inclusion of adware is a significant deviation from the previously clean reputation of these utilities, which are widely used for monitoring and benchmarking storage devices. While the adware does not appear to be a direct exploit such as remote code execution (RCE), the presence of unsolicited advertising software can introduce privacy risks, degrade system performance, and potentially open indirect attack vectors if the adware is malicious or poorly maintained. The discussion and awareness around this issue have been raised primarily on Reddit's NetSec community and forums such as Tom's Hardware, indicating community concern but minimal widespread discussion or exploitation to date. No known exploits are currently reported in the wild, and there is no indication that the adware includes direct vulnerabilities like RCE, but the embedding of adware in trusted utilities undermines user trust and may lead to inadvertent exposure to further threats.
Potential Impact
For European organizations, the impact of this threat is primarily reputational and operational rather than immediately catastrophic. Many enterprises and IT professionals rely on CrystalDiskInfo and CrystalDiskMark for hardware diagnostics and performance testing. The presence of adware can lead to unwanted network traffic, potential data leakage, and increased attack surface if the adware communicates with external servers or downloads additional payloads. This could contravene strict European data protection regulations such as GDPR if personal or device data is transmitted without consent. Additionally, organizations with strict software procurement policies may face challenges in software approval and compliance. The indirect risks include potential malware delivery through the adware or exploitation of vulnerabilities within the adware itself if it is not securely maintained. While no direct remote code execution exploits are currently known, the embedding of adware in widely used utilities could be leveraged by threat actors in supply chain attacks or social engineering campaigns targeting European businesses.
Mitigation Recommendations
European organizations should immediately audit their use of CrystalDiskInfo and CrystalDiskMark, especially versions 9.0.0 and above for CrystalDiskMark and 9.7.0 and above for CrystalDiskInfo. It is advisable to revert to earlier versions known to be free of adware or switch to alternative trusted disk utility tools that do not bundle adware. Organizations should implement strict software whitelisting and application control policies to prevent unauthorized or unvetted software installations. Network monitoring should be enhanced to detect unusual outbound connections potentially initiated by adware components. Endpoint detection and response (EDR) solutions should be configured to flag and quarantine unexpected executables like "*ads.exe". Additionally, organizations should educate users about the risks of downloading software from third-party sites and encourage the use of official vendor websites or verified repositories. Regular vulnerability assessments and supply chain security reviews should include checks for adware or unwanted software bundled with legitimate tools.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
PSA: CrystalDiskInfo & CrystalDiskMark now embeds adwares /!\
Description
For unknown, and regrettable, reasons, these 2 awesome utilities now embeds adwares ! It is recent: - For CrystalDiskMark, this starts from version 9.0.0. - For CrystalDiskInfo, this starts from version 9.7.0 You can see the "*ads.exe" files: - hxxps://sourceforge.net/projects/crystaldiskmark/files/9.0.1/ - hxxps://sourceforge.net/projects/crystaldiskmark/files/9.0.0/ - hxxps://sourceforge.net/projects/crystaldiskinfo/files/9.7.0/ More explanations here: hxxps://forums.tomshardware.com/threads/is-crystaldiskinfo-still-safe.3882065/
AI-Powered Analysis
Technical Analysis
Recent versions of two popular disk utility tools, CrystalDiskInfo (starting from version 9.7.0) and CrystalDiskMark (starting from version 9.0.0), have been reported to embed adware components within their installation packages. These adware executables, identified as "*ads.exe" files, are bundled with the software distributed via SourceForge, a common platform for open-source software distribution. The inclusion of adware is a significant deviation from the previously clean reputation of these utilities, which are widely used for monitoring and benchmarking storage devices. While the adware does not appear to be a direct exploit such as remote code execution (RCE), the presence of unsolicited advertising software can introduce privacy risks, degrade system performance, and potentially open indirect attack vectors if the adware is malicious or poorly maintained. The discussion and awareness around this issue have been raised primarily on Reddit's NetSec community and forums such as Tom's Hardware, indicating community concern but minimal widespread discussion or exploitation to date. No known exploits are currently reported in the wild, and there is no indication that the adware includes direct vulnerabilities like RCE, but the embedding of adware in trusted utilities undermines user trust and may lead to inadvertent exposure to further threats.
Potential Impact
For European organizations, the impact of this threat is primarily reputational and operational rather than immediately catastrophic. Many enterprises and IT professionals rely on CrystalDiskInfo and CrystalDiskMark for hardware diagnostics and performance testing. The presence of adware can lead to unwanted network traffic, potential data leakage, and increased attack surface if the adware communicates with external servers or downloads additional payloads. This could contravene strict European data protection regulations such as GDPR if personal or device data is transmitted without consent. Additionally, organizations with strict software procurement policies may face challenges in software approval and compliance. The indirect risks include potential malware delivery through the adware or exploitation of vulnerabilities within the adware itself if it is not securely maintained. While no direct remote code execution exploits are currently known, the embedding of adware in widely used utilities could be leveraged by threat actors in supply chain attacks or social engineering campaigns targeting European businesses.
Mitigation Recommendations
European organizations should immediately audit their use of CrystalDiskInfo and CrystalDiskMark, especially versions 9.0.0 and above for CrystalDiskMark and 9.7.0 and above for CrystalDiskInfo. It is advisable to revert to earlier versions known to be free of adware or switch to alternative trusted disk utility tools that do not bundle adware. Organizations should implement strict software whitelisting and application control policies to prevent unauthorized or unvetted software installations. Network monitoring should be enhanced to detect unusual outbound connections potentially initiated by adware components. Endpoint detection and response (EDR) solutions should be configured to flag and quarantine unexpected executables like "*ads.exe". Additionally, organizations should educate users about the risks of downloading software from third-party sites and encourage the use of official vendor websites or verified repositories. Regular vulnerability assessments and supply chain security reviews should include checks for adware or unwanted software bundled with legitimate tools.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Source Type
- Subreddit
- netsec
- Reddit Score
- 2
- Discussion Level
- minimal
- Content Source
- reddit_link_post
- Domain
- forums.tomshardware.com
- Newsworthiness Assessment
- {"score":30.200000000000003,"reasons":["external_link","newsworthy_keywords:rce","established_author","very_recent"],"isNewsworthy":true,"foundNewsworthy":["rce"],"foundNonNewsworthy":[]}
- Has External Source
- true
- Trusted Domain
- false
Threat ID: 68778679a83201eaacd9e78c
Added to database: 7/16/2025, 11:01:13 AM
Last enriched: 7/16/2025, 11:01:26 AM
Last updated: 7/16/2025, 11:01:26 AM
Views: 2
Related Threats
Salt Typhoon breach: Chinese APT compromises U.S. Army National Guard network
HighCritical Golden dMSA Attack in Windows Server 2025 Enables Cross-Domain Attacks and Persistent Access
CriticalUnitedHealth-Linked Health Tech Firm Episource Breach Hits 5.4M Patients
HighEricsson to lead security-first overhaul of telecom defense as nation-state threats intensify in 2025
LowNew MITRE framework takes aim at crypto threats
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.