May 15, 2023, 11:18 a.m. | Bruce Schneier

Schneier on Security www.schneier.com

Micro-Star International—aka MSI—had its UEFI signing key stolen last month.


This raises the possibility that the leaked key could push out updates that would infect a computer’s most nether regions without triggering a warning. To make matters worse, Matrosov said, MSI doesn’t have an automated patching process the way Dell, HP, and many larger hardware makers do. Consequently, MSI doesn’t provide the same kind of key revocation capabilities.


Delivering a signed payload isn’t as easy as all that. “Gaining the …

automated computer dell hardware infect international key leaked micro msi patching process ransomware signatures signing stolen supply chain uefi updates warning

Network Security Administrator

@ Peraton | United States

IT Security Engineer 2

@ Oracle | BENGALURU, KARNATAKA, India

Sr Cybersecurity Forensics Specialist

@ Health Care Service Corporation | Chicago (200 E. Randolph Street)

Security Engineer

@ Apple | Hyderabad, Telangana, India

Cyber GRC & Awareness Lead

@ Origin Energy | Adelaide, SA, AU, 5000

Senior Security Analyst

@ Prenuvo | Vancouver, British Columbia, Canada