![]() ![]() These leaked keys apparently control run-time verification of firmware code for 116 different MSI motherboards.Īccording to Intel’s own documentation, modern Intel-based motherboards can be protected by multiple layers of cryptographic safety.įirst comes BIOS Guard, which only allows code that’s signed with a manufacturer-specified cryptographic key to get write access to the flash memory used to store so-called Initial Boot Block, or IBB.Īs the name suggests, the IBB is the where the first component of the motherboard vendor’s startup code lives. Binarly claims that these keys can be used to sign firmware updates for 57 different MSI motherboards. Apparently, this key can be used to control firmware debugging on 11 different motherboards. So far, Binarly is claiming on Github and Twitter to have extracted numerous signing keys from the data in its possession, including what it describes as: Nevertheless, researchers at vulnerability research company Binarly claim not only to have got hold of the data stolen in the breach, but also to have searched through it for embedded crpyotgraphic keys and come up with numerous hits. The “reveal timer” in the screenshot above expired on, just over a month ago, but the Money Message site on the dark web is otherwise unchanged since the gang’s initial posting: One month later. ![]()
0 Comments
Leave a Reply. |