RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research
Why RL Built Spectra Assure Community
April 14, 2026

Why RL Built Spectra Assure Community

We set out to help dev and AppSec teams secure the village: OSS dependencies, malware, more. Learn how.

Read More about Why RL Built Spectra Assure Community
Why RL Built Spectra Assure Community

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
AppSec & Supply Chain SecurityMay 17, 2023

Lessons from MSI's UEFI key breach: How safe are the secrets in your software?

Stolen keys allow bootkits to avoid Intel’s “Guard” features. And there’s no way to revoke them.

Richi Jennings
Richi Jennings, Independent industry analyst, editor, and content strategist.Richi Jennings
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
antique iron master key

Last month’s MSI data theft is causing panic. Some extremely sensitive signing keys have been found among the leaked data drifting through the dark web.

Devs need to ask if any of their dev, test, source, build or prod machines might be vulnerable. Bad actors are no doubt already building signed bootkits that subvert operating system controls from underneath.

If nothing else, there are important lessons to learn from MSI’s mistake. In this week’s Secure Software Blogwatch, we lock up our secrets.

Your humble blogwatcher curated these bloggy bits for your entertainment. Not to mention: Steamfest 2023.

See special report: Secrets Exposed: An Essential Guide for Securing Secrets

OEM OMG: No HSM

What’s the craic? Mark Tyson reports — “Boot Guard Keys From MSI Hack Posted”:

“Leak has certainly made a mess”

Files purloined during the substantial MSI hack last month have started to proliferate around the dark web. One of the more worrying things spotted among the digital loot is an Intel OEM private key … generated by the OEM (MSI) not Intel itself. … Now hackers can use the key to sign malicious BIOS, firmware and apps, which will look entirely like official MSI releases.

…

Intel Boot Guard ensures that PCs only can run verified apps before boot. … Intel talks with some pride about its BIOS Guard, Boot Guard, and Firmware Guard technologies. … Sadly, it is not longer going to be a useful 'guard' for a wide range of MSI systems.

…

This leak has certainly made a mess, and it isn't clear whether the leaked keys can be revoked. … Please avoid checking the stolen files on the dark web or other sources, as they might now be laced with malware.

In fact, it is clear. And it’s bad news. Paul Ducklin — “Low-level motherboard security keys leaked”:

“Take control over the firmware”

To strengthen the level of cryptographic verification provided by both BIOS Guard and Boot Guard … the cryptographic keys they use aren’t themselves stored in rewritable flash memory. They’re saved … into write-once memory embedded on the motherboard itself … fused in other words — in a one-shot modification that flips them permanently into binary 0s (or 1s). … They’re locked in forever.

…

A debug-level OEM key … provides a motherboard vendor with a way to take control over the firmware as it’s booting up, including watching it instruction-by-instruction, tweaking its behaviour, spying on and modifying the data it’s holding in memory, and much more. … The crooks have now leaked [such a] key that can enable low-level boot-time debugging on 11 different motherboards supplied by HP, Lenovo, Star Labs, AOPEN and CompuLab.

So it doesn’t only affect MSI mobos? Elizabeth Montalbano says it “Could Have Security Repercussions for Years”:

“Should serve as a reminder”

[It] could cast a shadow on firmware security for years to come and leave devices that use the keys highly vulnerable to cyberattacks. … It's likely threat actors would pounce on the availability of the Intel Boot Guard signing keys, presenting a major firmware security problem for years to come.

…

The BIOS runs even before a device's OS, which means the vulnerable code is present at the most basic device level and thus difficult to patch or defend against, complicating the scenario even further. … The inherent vulnerability of outdated device firmware … often gets overlooked in patching cycles and thus, if vulnerable, represents a large and dangerous attack surface.

…

The latest leak also should serve as a reminder to organizations that firmware and other private keys should be kept separate from code as much as possible to mitigate the risk of theft.

You can say that again. And, as if by magic, digitalgriffin says that again:

Why why why do major companies not keep the keys to the company on air gapped systems? Why?!?

Similarly, afidel waxes apoplectic:

Why would that key ever be online? That's exactly the kind of thing an offline root is for. Heck, even then I think I'd have the actual signing key in an HSM, where it couldn't be retrieved. The mind just boggles that this was possible.

Good point. And ctilsie242 expands on it:

Hasn't MSI heard about an HSM? Even my GitHub signing key is in a YubiKey, and my CA stuff is in a YubiHSM. These are not expensive items, and can mean the difference between an attacker being stopped cold as the HSM waits for a button press, or doesn't allow operations altogether due to users, versus key material being divulged and copied off.

What can we learn? RickVS sums up what you shouldn’t do, if you have secrets to keep:

So MSI's perspective on security is: "Let's just hope we don't get hacked!"

With a colorful metaphor, here’s Richard 12:

Revocation, that's what you need. If you can't revoke a credential, then you do not have any security. … Would you buy a house if you have to knock it down to change the locks?

Meanwhile, Toni Morton — @haxor4evr — laughs his *** off:

LMAO we spent millions of dollars for this hardware chain of trust system for our UEFIs and one leak caused the entire supply chain to just fall in the lap of the attackers.

And Finally:

Racing steam trains in Australia (not sure who won, though)

Hat tip: evil_andy

Previously in And finally


You have been reading Secure Software Blogwatch by Richi Jennings. Richi curates the best bloggy bits, finest forums, and weirdest websites … so you don’t have to. Hate mail may be directed to @RiCHi or ssbw@richi.uk. Ask your doctor before reading. Your mileage may vary. Past performance is no guarantee of future results. Do not stare into laser with remaining eye. E&OE. 30.

Image sauce: Tom Joseph (via Unsplash; leveled and cropped)

[ See special report: Secrets Exposed - An Essential Guide to Securing Secrets ]

Keep learning

  • Get up to speed on the state of software security with RL's Software Supply Chain Security Report 2026. Plus: See the the webinar to discussing the findings.
  • Learn why binary analysis is a must-have in the Gartner® CISO Playbook for Commercial Software Supply Chain Security.
  • Take action on securing AI/ML with our report: AI Is the Supply Chain. Plus: See RL's research on nullifAI and watch how RL discovered the novel threat.
  • Get the report: Go Beyond the SBOM. Plus: See the CycloneDX xBOM webinar.

Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:AppSec & Supply Chain Security

More Blog Posts

Open Sign

Shai-Hulud code drop: It’s open season for supply chain attacks

The malware's public release provides a blueprint for threat actors. Take action on supply chain security.

Learn More about Shai-Hulud code drop: It’s open season for supply chain attacks
Shai-Hulud code drop: It’s open season for supply chain attacks
AI infrastructure

Think AI agents are risky? Your underlying stack is too

To manage agentic AI risk, organizations need to focus more on the infrastructure they run on.

Learn More about Think AI agents are risky? Your underlying stack is too
Think AI agents are risky? Your underlying stack is too
Shai-hulud worm DevOps

Mini Shai-Hulud tears at OSS trust

New Team PCP compromises of foundational npm packages are rocking open source. 

Learn More about Mini Shai-Hulud tears at OSS trust
Mini Shai-Hulud tears at OSS trust
NVD enrichment

Selective NVD enrichment: Why it matters

AI vulnerability reporting is overwhelming teams — and NIST. But for AppSec, scaling back analysis is cause for alarm.

Learn More about Selective NVD enrichment: Why it matters
Selective NVD enrichment: Why it matters

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top