A new statement(Opens in a new window) from MSI says users should avoid downloading firmware and BIOS updates from third-party sources, and instead only obtain such software from the company’s official website.
The statement suggests MSI is worried hackers could circulate malicious versions of the company’s BIOS software when the ransomware gang, Money Message, claims it stole the PC maker’s source code.
By infosecbulletin
/ Friday , May 9 2025
YouTube has restricted access to at least four Bangladeshi television channels in India following a takedown request from the Indian...
Read More
By infosecbulletin
/ Friday , May 9 2025
Microsoft has fixed critical vulnerabilities in its core cloud services, including Azure Automation, Azure Storage, Azure DevOps, and Microsoft Power...
Read More
By infosecbulletin
/ Thursday , May 8 2025
The cyber threat landscape is rapidly changing, with a notable increase in ransomware activity in April 2025, driven by the...
Read More
By infosecbulletin
/ Thursday , May 8 2025
SonicWall has released patches for three security flaws in SMA 100 Secure Mobile Access appliances that could allow remote code...
Read More
By infosecbulletin
/ Thursday , May 8 2025
From April 2024 to April 2025, Flashpoint analysts noted that the financial sector was a major target for threat actors,...
Read More
By infosecbulletin
/ Thursday , May 8 2025
Cisco has issued a security advisory for a critical vulnerability in its IOS XE Software for Wireless LAN Controllers (WLCs)....
Read More
By infosecbulletin
/ Wednesday , May 7 2025
Attackers linked to the Play ransomware operation deployed a zero-day privilege escalation exploit during an attempted attack against an organization...
Read More
By infosecbulletin
/ Wednesday , May 7 2025
Hackers are exploiting an unauthenticated remote code execution vulnerability in the Samsung MagicINFO 9 Server to take control of devices...
Read More
By infosecbulletin
/ Tuesday , May 6 2025
CISA added the Langflow vulnerability, CVE-2025-3248 (CVSS score 9.8), to its Known Exploited Vulnerabilities catalog. Langflow is a popular tool...
Read More
By infosecbulletin
/ Tuesday , May 6 2025
Google has released its monthly Android security updates, addressing 46 vulnerabilities, including one that has been actively exploited. CVE-2025-27363 (CVSS...
Read More
Original story:
MSI has confirmed it suffered a data breach after a ransomware gang claimed it stole files from the PC maker. The company published a Taiwanese stock exchange filing(Opens in a new window) about experiencing a “cyber attack,” although the company is thin on details.
“After detecting some information systems being attacked by hackers, MSI’s IT department has initiated information security defense mechanism and recovery procedures,” the PC maker said. The company also reported the incident to authorities.

(Credit: MOPS)
MSI didn’t immediately respond to a request for comment, making it unclear whether customer data is affected. But in the stock exchange filing, the PC maker says it anticipates the breach having “no significant impact” on its financials or operations.
A new
ransomware group called Money Message claims it breached the PC maker to steal the company’s source code, including the framework for the
BIOS used in MSI products.

The leak site for the ransomware group Money Message.
Money Message posted screenshots of the stolen files on the group’s dark web site. The ransomware gang is demanding MSI pay $4 million or else it’ll leak the stolen data next week, according(Opens in a new window) to BleepingComputer, citing chats Money Message made with a victim representative.
Money Message seems to have only emerged last month. The group has targeted Windows and Linux computers and will try to encrypt
shared network resources,
according(Opens in a new window) to cybersecurity firm Cyble. The company also uncovered evidence Money Message will first try to identify and steal the admin credentials for an IT network before spreading their ransomware attacks.
As for MSI, the PC maker says in the stock exchange filing that it’s working to bolster its cybersecurity for company systems.