Saturday , May 10 2025

MSI’s leaked firmware keys endanger hundreds of devices

MSI attackers leaked the company’s firmware image signing keys, a crucial component for differentiating between legitimate and malicious updates. Over 200 MSI products are believed to be exposed.

Researchers have identified leaked firmware image signing keys and Intel’s BootGuard for MSI products. According to Alex Matrosov, CEO of firmware supply chain security platform Binarly, leaked firmware keys affect 57 MSI products, while leaked BootGuard keys affect 166 of the company’s products.

YouTube geo-blocks at least 4 Bangladeshi TV channels in India

YouTube has restricted access to at least four Bangladeshi television channels in India following a takedown request from the Indian...
Read More
YouTube geo-blocks at least 4 Bangladeshi TV channels in India

Microsoft Patches Four Critical Azure and Power Apps Vulns

Microsoft has fixed critical vulnerabilities in its core cloud services, including Azure Automation, Azure Storage, Azure DevOps, and Microsoft Power...
Read More
Microsoft Patches Four Critical Azure and Power Apps Vulns

Qilin Ransomware topped April 2025 with 45+ data leak disclosures

The cyber threat landscape is rapidly changing, with a notable increase in ransomware activity in April 2025, driven by the...
Read More
Qilin Ransomware topped April 2025 with 45+ data leak disclosures

SonicWall Patches 3 Flaws in SMA 100 Devices

SonicWall has released patches for three security flaws in SMA 100 Secure Mobile Access appliances that could allow remote code...
Read More
SonicWall Patches 3 Flaws in SMA 100 Devices

Top Ransomware Actively Attacking Financial Sector: 406 Incidents Disclosed

From April 2024 to April 2025, Flashpoint analysts noted that the financial sector was a major target for threat actors,...
Read More
Top Ransomware Actively Attacking Financial Sector: 406 Incidents Disclosed

Critical (CVSS 10) Flaw in Cisco IOS XE WLCs Allows RRA

Cisco has issued a security advisory for a critical vulnerability in its IOS XE Software for Wireless LAN Controllers (WLCs)....
Read More
Critical (CVSS 10) Flaw in Cisco IOS XE WLCs Allows RRA

CVE-2025-29824
Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day

Attackers linked to the Play ransomware operation deployed a zero-day privilege escalation exploit during an attempted attack against an organization...
Read More
CVE-2025-29824  Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day

Hacker exploited Samsung MagicINFO 9 Server RCE flaw

Hackers are exploiting an unauthenticated remote code execution vulnerability in the Samsung MagicINFO 9 Server to take control of devices...
Read More
Hacker exploited Samsung MagicINFO 9 Server RCE flaw

CISA adds Langflow flaw to its KEV catalog

CISA added the Langflow vulnerability, CVE-2025-3248 (CVSS score 9.8), to its Known Exploited Vulnerabilities catalog. Langflow is a popular tool...
Read More
CISA adds Langflow flaw to its KEV catalog

Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

Google has released its monthly Android security updates, addressing 46 vulnerabilities, including one that has been actively exploited. CVE-2025-27363 (CVSS...
Read More
Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

Firmware image signing keys are an essential part of the security infrastructure for hardware. The keys provide trust that the firmware is authentic and hasn’t been tampered with by anyone except the software developer or the device manufacturer.

Similarly, Intel Boot Guard is a processor safeguard that prevents the computer from running firmware images not published by the system manufacturer.

Exposing the keys poses significant risks to users as attackers with access to leaked keys can push malware-infected firmware images or firmware updates as legitimate.

Since firmware is often launched before the operating system starts, malicious code could fly under the radar of antivirus or other security measures. Attackers could also use the keys to modify the firmware, severely impacting the reliability of the device.

According to Binarly, the exposed devices include numerous models of MSI’s Stealth, Creator, Crosshair, Prestige, Pulse, Modern, Raider, Sword, Summit, Vector, and Katana series laptops. The complete list with specific models can be found here.

Earlier this year, the Money Message ransomware cartel published nearly 528 GB of data supposedly taken from the Taiwanese computer manufacturer Micro-Star International (MSI).

MSI confirmed that the company had suffered a cyberattack, with attackers supposedly demanding several million dollars in ransom for the stolen MSI source code. The company refused to pay the ransom.

MSI is a major information technologies player in the global market, with a presence in over 100 countries and a yearly revenue hovering close to $6 billion (TWD 180 billion).

Check Also

Protect AI

Palo Alto Networks to Acquire AI Security Firm “Protect AI”

On Monday, Palo Alto Networks confirmed it is acquiring the US-based AI security company Protect …

Leave a Reply

Your email address will not be published. Required fields are marked *