wccftech.com Open in urlscan Pro
136.243.171.225  Public Scan

URL: https://wccftech.com/msi-breach-leaks-intel-bootguard-oem-image-signing-keys-compromises-security-of-over-200-devices...
Submission: On July 10 via api from IN — Scanned from DE

Form analysis 2 forms found in the DOM

/find/

<form class="container" action="/find/">
  <input id="q" name="wp_searchable_posts[query]" type="text" placeholder="Search..." value="" autocomplete="off" autofocus="">
  <div id="search-clear" class="search-clear" onclick="wccfToggleSearch();">
    <svg width="14" height="14">
      <g transform="translate(-426 -38)">
        <rect width="14" height="14" transform="translate(426 38)" opacity="0"></rect>
        <path d="M409,39l10,10" transform="translate(19 1)" fill="none" stroke="currentColor" stroke-linecap="round" stroke-width="2"></path>
        <path d="M419,39,409,49" transform="translate(19 1)" fill="none" stroke="currentColor" stroke-linecap="round" stroke-width="2"></path>
      </g>
    </svg>
  </div>
  <input type="submit" style="visibility: hidden;">
</form>

<form id="traqli" class="traqli" data-page="home">
  <div id="traqli_success" class="traqli_success" style="min-height: 46px;">
    <div class="my-border-bottom" style="position: relative;">
      <label for="traqli_email" class="visually-hidden">Email address</label>
      <input type="email" autocomplete="off" class="form-control traqli_email" id="traqli_email" placeholder="Enter your email...">
      <button type="submit" class="btn btn-sm btn-newsletter" aria-label="Submit Email" onclick="wccfSubscribe(); return false;">
        <svg width="20" height="20">
          <use xlink:href="#icn-subscribeArrow"></use>
        </svg>
      </button>
    </div>
  </div>
  <div id="traqli_status" class="traqli_status invalid-feedback" style="display: block">&nbsp;</div>
</form>

Text Content

Privacy Preference

Your privacy choices

We and our partners process personal data such as cookies, unique identifiers,
and other device data. Some partners may process your personal data on the basis
of legitimate interest. View a list of partners to see the purposes they believe
they have legitimate interest or and how you can object to it.

We and our partners may use your data for the listed purposes, you can manage
your choices by clicking Manage Options.

You can change your settings at any time, including by withdrawing your consent,
by clicking the cog icon at corner or the link at bottom of the page.

Purposes
Store and/or access information on a device
Develop and improve products
Personalised ads and content, ad and content measurement, and audience insights
Special Features
Use precise geolocation data
Actively scan device characteristics for identification
Manage OptionsAgree and proceed

Powered by
Menu News Hardware Gaming Mobile Finance Software Deals Reviews Videos How To
Wccftech


News Hardware Gaming Mobile Finance Software Deals Reviews Videos How To


HardwareReport


MSI BREACH LEAKS INTEL BOOTGUARD & OEM IMAGE SIGNING KEYS, COMPROMISES SECURITY
OF OVER 200 DEVICES & MAJOR VENDORS

Hassan Mujtaba • May 6, 2023 08:00 AM EDT
• Copy Shortlink
39

A recent breach in MSI's servers exposed Intel's BootGuard keys and has now put
the security of various devices at risk.


MAJOR MSI BREACH AFFECTS THE SECURITY OF VARIOUS INTEL DEVICES

Update: Inte has provided us with the following statement regarding the breach:

Related StoryHassan Mujtaba

INTEL CORE I7-14700K 20 CORE “RAPTOR LAKE REFRESH” CPU BENCHMARKS LEAK, UP TO
15% FASTER THAN 13700K



> "It should be noted that Intel BootGuard OEM keys are generated by the system
> manufacturer, and these are not Intel signing keys.”

Last month, a hacker group by the name of Money Message revealed that they had
breached MSI's servers and stolen 1.5 TBs of data from the company's servers
including source code amongst a list of various files that are important to the
integrity of the company. The group asked MSI to pay $4.0 million in ransom to
avert them from releasing the files to the public but MSI refused the payment.

This action promoted the group to release the files on public servers this
Thursday and based on an investigation done by BINARLY, the files include Intel
BootGuard keys from MSI which not only affects MSI itself but also other major
vendors including Intel, Lenovo, Supermicron & many others.





The leaked files contain signing keys for a total of over 200 MSI products which
can be used to access the firmware of these devices. These include a total of 57
devices whose Firmware Image Signing Keys have leaked out and 116 devices whose
Intel BootGuard Keys have leaked.



Why these keys are so important is because they are used to flag certain
software that isn't verified as untrusted and "potentially malicious", says
PCMAG. These keys can be used to tag malicious software with malware as trusted
and handed over to the system which ends up compromising its security.

> “The signing keys for fw [firmware] image allow an attacker to craft malicious
> firmware updates and it can be delivered through normal BIOS update processes
> with MSI update tools,” Binarly CEO Alex Matrosov tells PCMag.

MSI replied to its customers to avoid downloading UEFI/BIOS Firmware from any
place except its own official websites where the proper version will be
available without any fear of being compromised. Furthermore, since these files
have been made public over the last couple of days, it is very likely a number
of UEFI/BIOS firmware are already floating around various sections of the web
with malicious code.





According to Alex Matrosov, the CEO of BINARLY, the leak is confirmed to include
Intel's private keys for OEM devices. Furthermore, the BootGuard may not be as
effective on devices based on 11th-Gen Tiger Lake, 12th-Gen Alder Lake, and
13th-Gen Raptor Lake platforms. The leak also affects all OEM signing-based
mechanisms within CSME (Converged Security and Management Engine) as stated by
Alex. Intel and its partners who are affected by this leak have to to comment on
how they plan on tackling this major security flaw that's occured through this
breach.

News Source: VideoCardz

Share this story
Facebook
Twitter


DEAL OF THE DAY




FURTHER READING

 * INTEL 14TH GEN RAPTOR LAKE-HX CPUS TO UTILIZE 8+16 CORE DIE: MORE CORES,
   THREADS & CACHE FOR LAPTOPS

 * ASUS PN64-E1 MINI PC HITS RETAIL: UP TO INTEL CORE I7-13700H 14 CORE CPU,
   STARTING AT $499

 * INTEL GRANITE RAPIDS-D CPUS GETS SPOTTED FOR THE FIRST TIME, WILL REPLACE ICE
   LAKE-D

 * NVIDIA MAY NOT LIKE ITS GPU PARTNERS WORKING WITH INTEL FOR NEXT-GEN ARC
   BATTLEMAGE CARDS




COMMENTS


Please enable JavaScript to view the comments.


TRENDING STORIES

 * HERE’S WHEN APPLE WILL RELEASE IOS 17 PUBLIC BETA FOR IPHONE
   
   54 Active Readers

 * THE APPLE VISION PRO, AND FUTURE HEADSETS NEED TO GROW BUSINESS BY 20X JUST
   TO REACH THE SAME LEVEL AS THE IPAD CATEGORY
   
   44 Active Readers

 * INTEL CORE I7-14700K 20 CORE “RAPTOR LAKE REFRESH” CPU BENCHMARKS LEAK, UP TO
   15% FASTER THAN 13700K
   
   33 Active Readers

 * APPLE’S LARGER 32-INCH IMAC IN EARLY DEVELOPMENT BUT COULD REPLACE YOUR MAC
   STUDIO AND PRO DISPLAY XDR SETUP
   
   29 Active Readers

 * BOGUS SAMSUNG 980 & 990 PRO SSDS CIRCULATING ONLINE, PERFORMS WORSE THAN A
   USB STICK
   
   29 Active Readers




POPULAR DISCUSSIONS

 * AMD TO BUNDLE STARFIELD WITH RYZEN 7000 CPUS, RADEON RX 7000 & RX 6000 GPUS
   
   1689 Comments

 * INTEL ARROW LAKE CPUS RUMORED TO DROP 20A NODE, UTILIZING TSMC 3NM INSTEAD
   
   1168 Comments

 * INTEL ARC A770 16 GB PRICE DROPS DOWN TO $318 US, A770 8 GB CHEAPER THAN
   NVIDIA RTX 4060, A750 8 GB CHEAPER THAN AMD RX 7600
   
   784 Comments

 * INTEL 14TH GEN RAPTOR LAKE-HX CPUS TO UTILIZE 8+16 CORE DIE: MORE CORES,
   THREADS & CACHE FOR LAPTOPS
   
   743 Comments

 * INTEL ARROW LAKE-S DESKTOP CPUS TO FEATURE SUPPORT ON Z890, B860 & H810
   MOTHERBOARDS
   
   667 Comments


 


Subscribe to get an everyday digest of the latest technology news in your inbox

Email address
 

FOLLOW US ON

Facebook Youtube Twitter

© 2023 WCCF TECH INC. All rights reserved.

TOPICS

 * Hardware
 * Gaming
 * Mobile
 * Finance
 * Software
 * Security
 * Web

SECTIONS

 * Deals
 * Reviews
 * Videos
 * How To's
 * Analysis
 * Exclusives
 * Interviews
   

COMPANY

 * About
 * Advertise with Us
 * Contact
 * Tip Us
 * Careers
 * Terms of Use
 * Privacy & Cookie Policy
 * Ethics Statement
 * Appeal Moderation

Some posts on wccftech.com may contain affiliate links. We are a participant in
the Amazon Services LLC Associates Program, an affiliate advertising program
designed to provide a means for sites to earn advertising fees by advertising
and linking to amazon.com



© 2023 WCCF TECH INC. All rights reserved.





Change Consent