{"id":21144,"date":"2023-05-30T18:30:12","date_gmt":"2023-05-30T14:30:12","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/msi-firmware-keys-leak\/21144\/"},"modified":"2023-05-30T18:30:12","modified_gmt":"2023-05-30T14:30:12","slug":"msi-firmware-keys-leak","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/msi-firmware-keys-leak\/21144\/","title":{"rendered":"MSI leak: tips for users, organizations, and developers"},"content":{"rendered":"<p>What could be worse than a ransomware attack on your company? Only an incident that hits your company\u2019s clients, I guess. Well, that\u2019s exactly what happened to MSI \u2014 the large Taiwanese manufacturer of laptops, video adapters and motherboards. In the beginning of April, word got out that the <a href=\"https:\/\/www.pcmag.com\/news\/msi-confirms-breach-as-ransomware-gang-claims-responsibility\" target=\"_blank\" rel=\"nofollow noopener\">company was attacked by a new ransomware gang called Money Message<\/a>; a while later the extorters published a <a href=\"https:\/\/twitter.com\/AlvieriD\/status\/1646467436684759041\" target=\"_blank\" rel=\"nofollow noopener\">portion of the stolen information<\/a> on the darknet; then, in May, researchers discovered the most disturbing aspect to the leak \u2014 that private <a href=\"https:\/\/twitter.com\/matrosov\/status\/1653923749723512832\" target=\"_blank\" rel=\"nofollow noopener\">firmware-signing keys and Intel Boot Guard keys<\/a> had been make public. MSI <a href=\"https:\/\/www.msi.com\/news\/detail\/MSI-Statement-141688\" target=\"_blank\" rel=\"nofollow noopener\">went public<\/a> regarding the leak, but presented very little information \u2014 even omitting the subject of keys completely. Here, we try to give you a bit more context\u2026<\/p>\n<h2>Boot Guard keys, and how they protect your computer<\/h2>\n<p>Even before its operating system boots up, your computer performs many preparatory operations upon instructions from a motherboard chip. In the past, the mechanism was called <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/bios\/\" target=\"_blank\" rel=\"noopener\">BIOS<\/a>, until it was replaced by the expandable <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/uefi\/\" target=\"_blank\" rel=\"noopener\">UEFI<\/a> architecture. UEFI code is stored in the firmware, but extra modules can be loaded from a special hard-drive partition. Next, UEFI boots up the operating system itself. If UEFI is maliciously modified, the operating system, user apps and all security systems will start up under the control of the malicious code. The attackers will be able to circumvent all further layers of defense, including BitLocker, Secure Boot and the OS-level security systems, such as anti-viruses and EDR.<\/p>\n<p>Referred to as BIOS-level implants (sometimes also \u201chardware <a href=\"https:\/\/www.kaspersky.com\/blog\/mosaicregressor-uefi-malware\/37252\/\" target=\"_blank\" rel=\"nofollow noopener\">bootkits<\/a>\u201c), such threats are very hard to detect \u2014 and even harder to get rid of: you can\u2019t purge your PC of them even by replacing your hard drive with a brand new one.<\/p>\n<p>Computer and OS vendors have developed a variety of safeguards to make it as difficult as possible for threat actors to devise such dangerous threats. First, to update firmware and make additions to UEFI one needs an app signed by the vendor: Intel BIOS Guard doesn\u2019t allow updating UEFI from untrusted apps or using unsigned firmware. Second, there\u2019s a hardware verification mechanism called Boot Guard. The technology checks the signature of the opening part of UEFI (IBB \u2014 Initial Boot Block) and aborts the computer boot if the firmware has been tampered with. Boot Guard\u2019s cryptographic keys used to verify these protection mechanisms are stored in a special write-once memory, meaning they can\u2019t be deleted or rewritten (in turn meaning they can\u2019t be falsified or replaced), while at the same time they can\u2019t be revoked if compromised!<\/p>\n<h2>What\u2019s so dangerous about an MSI key leak?<\/h2>\n<p>A firmware-signing keys leak may allow threat actors to create update utilities and rogue firmware capable of successfully passing verifications with the potential to update microprograms on MSI motherboards. Such keys can be revoked, so after a while (actually, we\u2019re talking months if not years!) the problem will become irrelevant \u2014 if legitimate updates are applied in a secure way. The situation is much worse with Boot Guard keys, since these can\u2019t be revoked. Moreover, according to Binarly, these keys can be used even in <a href=\"https:\/\/github.com\/binarly-io\/SupplyChainAttacks\/blob\/main\/MSI\/IntelOemKeyImpactedDevices.md\" target=\"_blank\" rel=\"nofollow noopener\">some products manufactured by vendors other than<\/a> MSI. This disrupts the secure-boot trust chain for all products relying on these keys, leaving device owners with no other option but to ramp up third-party protective measures and keep using them that way until the products cease being used.<\/p>\n<h2>Tips for MSI device users<\/h2>\n<p>First off, check if your computers are endangered. If you have an MSI computer or laptop, the threat is there, but even computers from other vendors may have MSI motherboards. Here\u2019s how you can check this:<\/p>\n<ul>\n<li>Type \u201cSystem Information\u201d into the Windows search line to locate and run it<\/li>\n<li>Under <em>System summary<\/em> scroll down to <em>Motherboard manufacturer<\/em> or <em>BaseBoard manufacturer<\/em>. If it says MSI or Micro-Star International, the threat is relevant to you.<\/li>\n<\/ul>\n<p>Please note that MSI makes hundreds of products, and the leaked keys don\u2019t affect them all. The longest list of products affected by the threat is <a href=\"https:\/\/github.com\/binarly-io\/SupplyChainAttacks\/blob\/main\/MSI\/MsiImpactedDevices.md\" target=\"_blank\" rel=\"nofollow noopener\">here<\/a>, but we cannot attest to its completeness or accuracy. Your best bet would be to take extra care and proceed from the assumption that all current MSI boards can be targeted by attackers.<\/p>\n<p>If exposed to the threat, you should be extremely mindful of the risk when updating your proprietary utilities, drivers, and firmware. Download these only from the official website <a href=\"http:\/\/www.msi.com\/\" target=\"_blank\" rel=\"nofollow noopener\">www.msi.com<\/a> by manually typing the address into the browser \u2014 not by following links from e-mails, messenger threads or other websites. We also recommend you to watch out for updates on the MSI website: these shouldn\u2019t be ignored. It\u2019s quite possible that MSI will devise a way to revoke some of the leaked keys or otherwise prevent their use.<\/p>\n<p>In addition, make sure not to use an MSI computer as administrator, and make sure that it\u2019s equipped with <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">reliable protection against phishing and malware <\/a>.<\/p>\n<h2>Tips for IT administrators<\/h2>\n<p>The risk of UEFI implants based on the MSI leaks is in a way compensated by the complexity of their installation, which involves having administrative access to a target computer plus a bunch of conspicuous firmware update apps. So the issue could be mitigated by suppressing these apps at group policy level and by making sure that the <a href=\"https:\/\/www.kaspersky.com\/blog\/zero-trust-security\/36423\/\" target=\"_blank\" rel=\"noopener nofollow\">principle of least privilege<\/a> is enforced on all the computers within your organization. However, it\u2019s likely that in the future specialized hacker tools will come into play that will use stolen keys and sufficient obfuscation to conceal firmware updates. To reduce this risk, consider experimenting with detection of <a href=\"https:\/\/github.com\/binarly-io\/SupplyChainAttacks\/tree\/main\/MSI\" target=\"_blank\" rel=\"nofollow noopener\">leaked keys<\/a> on corporate machines \u2014 a recommendation more suited to companies employing <a href=\"https:\/\/www.kaspersky.com\/blog\/enterprise-strategy-edr\/18582\/\" target=\"_blank\" rel=\"noopener nofollow\">threat hunters<\/a> in their information-security task-force.<\/p>\n<p>Of course, the problem can also be eased through proper general practices: <a href=\"https:\/\/me-en.kaspersky.com\/enterprise-security\/edr-security-software-solution?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">integrated network and endpoint protection<\/a>, timely updating of business apps, and a system policy for patch management.<\/p>\n<h2>Tips for developers<\/h2>\n<p>The MSI example highlights how it is unacceptable in terms of information security and DevSecOps to keep secrets (especially ones difficult to rotate) on computers either next to or inside the code that uses them.<\/p>\n<p>There are dedicated solutions for centralized secret management \u2014 for example, HashiCorp Vault \u2014 but even smaller developers can afford a simple protection system of their own, such as encrypted removable drive storage connected only for as long as it takes to publish an app.<\/p>\n<p>As to companies the size of MSI, they should keep their confidential data \u2014 such as app and driver signing keys, let alone firmware signing keys \u2014 in specialized signature generation hardware units (HSM) or at least within a special secure perimeter on computers completely isolated from the rest of the network.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"mdr\"><input type=\"hidden\" class=\"placeholder_for_banner\" data-cat_id=\"mdr\" value=\"37724\">\n","protected":false},"excerpt":{"rendered":"<p>Now anyone can sign device firmware with MSI private keys. This represents a long-term persistent risk to be considered by all users.<\/p>\n","protected":false},"author":2722,"featured_media":21145,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916,1486],"tags":[2649,1614,2650,433,1144,521,2235],"class_list":{"0":"post-21144","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-threats","10":"tag-bootkits","11":"tag-intel","12":"tag-msi","13":"tag-ransomware","14":"tag-technologies","15":"tag-threats","16":"tag-uefi"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/msi-firmware-keys-leak\/21144\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/msi-firmware-keys-leak\/25723\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/msi-firmware-keys-leak\/28416\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/msi-firmware-keys-leak\/26022\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/msi-firmware-keys-leak\/35451\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/msi-firmware-keys-leak\/48300\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/msi-firmware-keys-leak\/26333\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/msi-firmware-keys-leak\/32033\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/msi-firmware-keys-leak\/31717\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/uefi\/","name":"UEFI"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=21144"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21144\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/21145"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=21144"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=21144"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=21144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}