Tuesday , January 21 2025

MSI’s leaked firmware keys endanger hundreds of devices

MSI attackers leaked the company’s firmware image signing keys, a crucial component for differentiating between legitimate and malicious updates. Over 200 MSI products are believed to be exposed.

Researchers have identified leaked firmware image signing keys and Intel’s BootGuard for MSI products. According to Alex Matrosov, CEO of firmware supply chain security platform Binarly, leaked firmware keys affect 57 MSI products, while leaked BootGuard keys affect 166 of the company’s products.

Multiple Azure DevOps Vulns Allow To Inject CRLF Queries & Rebind DNS

Security researchers have found several vulnerabilities in Azure DevOps that could enable attackers to inject CRLF queries and carry out...
Read More
Multiple Azure DevOps Vulns Allow To Inject CRLF Queries & Rebind DNS

Intel holds 22 employees from one Bangladeshi University

Intel Corporation is a leading semiconductor chip manufacturer, employing at least 22 graduates from the Department of Applied Chemistry and...
Read More
Intel holds 22 employees from one Bangladeshi University

VPN Surge 1500% in USA after TikTok Shut Down

vpnMentor’s Research Team is monitoring the potential TikTok ban in the U.S., driven by national security and data privacy issues....
Read More
VPN Surge 1500% in USA after TikTok Shut Down

MITRE Launches D3FEND 1.0; The Milestone for Cybersecurity Ontology

MITRE launched D3FENDTM 1.0, a cybersecurity framework that provides a vocabulary and understanding of the cyber domain. D3FEND 1.0, funded...
Read More
MITRE Launches D3FEND 1.0; The Milestone for Cybersecurity Ontology

AWS Patches Multiple Vulns in WorkSpaces, AppStream 2.0

Amazon Web Services (AWS) has recently fixed two major security vulnerabilities in its cloud services: Amazon WorkSpaces, Amazon AppStream 2.0,...
Read More
AWS Patches Multiple Vulns in WorkSpaces, AppStream 2.0

Malware Trends Review 2024: Ever Recorded Cyber Threats

Last year saw a significant rise in cyber threats, with malware becoming more advanced and attack strategies more sophisticated. A...
Read More
Malware Trends Review 2024: Ever Recorded Cyber Threats

Botnet Exploits 13,000 MikroTik Devices Abusing Misconfigured DNS

A recent Infoblox Threat Intel report reveals a sophisticated botnet that exploits DNS misconfigurations to spread malware widely. This botnet,...
Read More
Botnet Exploits 13,000 MikroTik Devices Abusing Misconfigured DNS

CVE-2024-9042
Code Execution Vulnerability Found in Kubernetes Windows Nodes

A new security flaw traced, CVE-2024-9042, poses a serious risk to Kubernetes clusters with Windows worker nodes. It has a...
Read More
CVE-2024-9042  Code Execution Vulnerability Found in Kubernetes Windows Nodes

Hacker leaked 15k config files and VPN passwords of FortiGate firewall device

The hacking group "Belsen Group" has posted over 15,000 unique FortiGate firewall configurations online. The data dump, reportedly obtained by exploiting...
Read More
Hacker leaked 15k config files and VPN passwords of FortiGate firewall device

Registration open for 1st Agile Cyber Drill 2025

Registration open for "1st Agile Cyber Drill-2025" scheduled for February 26, 2025 online with an awards ceremony for 9 March...
Read More
Registration open for 1st Agile Cyber Drill 2025

Firmware image signing keys are an essential part of the security infrastructure for hardware. The keys provide trust that the firmware is authentic and hasn’t been tampered with by anyone except the software developer or the device manufacturer.

Similarly, Intel Boot Guard is a processor safeguard that prevents the computer from running firmware images not published by the system manufacturer.

Exposing the keys poses significant risks to users as attackers with access to leaked keys can push malware-infected firmware images or firmware updates as legitimate.

Since firmware is often launched before the operating system starts, malicious code could fly under the radar of antivirus or other security measures. Attackers could also use the keys to modify the firmware, severely impacting the reliability of the device.

According to Binarly, the exposed devices include numerous models of MSI’s Stealth, Creator, Crosshair, Prestige, Pulse, Modern, Raider, Sword, Summit, Vector, and Katana series laptops. The complete list with specific models can be found here.

Earlier this year, the Money Message ransomware cartel published nearly 528 GB of data supposedly taken from the Taiwanese computer manufacturer Micro-Star International (MSI).

MSI confirmed that the company had suffered a cyberattack, with attackers supposedly demanding several million dollars in ransom for the stolen MSI source code. The company refused to pay the ransom.

MSI is a major information technologies player in the global market, with a presence in over 100 countries and a yearly revenue hovering close to $6 billion (TWD 180 billion).

Check Also

CISA

CISA Adds Second BeyondTrust Flaw to KEV On Active Attacks

U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a second security flaw affecting BeyondTrust’s Privileged …

Leave a Reply

Your email address will not be published. Required fields are marked *