Tuesday , December 5 2023

MSI Confirms Breach as Ransomware Gang Claims Responsibility

A new statement(Opens in a new window) from MSI says users should avoid downloading firmware and BIOS updates from third-party sources, and instead only obtain such software from the company’s official website.

The statement suggests MSI is worried hackers could circulate malicious versions of the company’s BIOS software when the ransomware gang, Money Message, claims it stole the PC maker’s source code.

Original story:

MSI has confirmed it suffered a data breach after a ransomware gang claimed it stole files from the PC maker. The company published a Taiwanese stock exchange filing(Opens in a new window) about experiencing a “cyber attack,” although the company is thin on details.

“After detecting some information systems being attacked by hackers, MSI’s IT department has initiated information security defense mechanism and recovery procedures,” the PC maker said. The company also reported the incident to authorities.

MSI filing

(Credit: MOPS)

MSI didn’t immediately respond to a request for comment, making it unclear whether customer data is affected. But in the stock exchange filing, the PC maker says it anticipates the breach having “no significant impact” on its financials or operations.


The leak site for the Money Message gang.

The leak site for the ransomware group Money Message.

Money Message posted screenshots of the stolen files on the group’s dark web site. The ransomware gang is demanding MSI pay $4 million or else it’ll leak the stolen data next week, according(Opens in a new window) to BleepingComputer, citing chats Money Message made with a victim representative.


As for MSI, the PC maker says in the stock exchange filing that it’s working to bolster its cybersecurity for company systems.

About infosecbulletin

Check Also


Secureworks reports
Booking.com hackers intensify attacks on customers

Booking.com, a major online travel agency, reported that customers have been targeted by hackers. While …

Leave a Reply

Your email address will not be published. Required fields are marked *