Ransomware victim disclosure
← All victimsMicro Star International
Claimed by Moneymessage · listed 3 years ago
Status timeline
- Listed
Apr 7, 2023
- Data leaked
At a glance
- Group
- Moneymessage
- Status
- Data leaked
- Country
- United States
- Sector
- Technology
- Listed on leak site
- Apr 7, 2023
- Ransom demanded
- $7B
- Estimated revenue
- $7B
About the victim
AI dossier — public-source company profileMicro Star International (MSI) is a Taiwanese multinational technology corporation headquartered in New Taipei City, Taiwan. The company designs, manufactures, and sells motherboards, graphics cards, laptops, desktops, and other computing hardware to customers in the United States, Canada, and internationally. MSI is one of the world's largest PC component manufacturers with global distribution.
- Industry
- Computer Hardware Manufacturing (Motherboards & Graphics Cards)
- Address
- No. 69, Lide Street, Zhonghe District, New Taipei City, Taiwan
- Employees
- 10000+
- Founded
- 1986
Attack summary
Severity: critical — Exfiltration of BIOS source code and private signing keys represents an extraordinary supply-chain risk: leaked firmware signing keys could enable malicious firmware updates affecting millions of end-user devices globally. Combined with multiple internal ERP/operational databases, this is a critical-severity incident well beyond typical PII breaches.Money Message claims to have exfiltrated MSI source code including BIOS development frameworks and private signing keys, as well as multiple internal databases (wwrlt2, eais, CTMS, ERP), threatening to publish the stolen data upon timer expiry.
Data the group says was taken
AI dossier — extracted from the leak post- BIOS source code
- Private signing keys
- ERP database
- CTMS database
- EAIS database
- WWRLT2 database
What the group claims
Micro-Star International AKA MSI designs, manufactures, and sells motherboards and graphics cards for customers in the United States, Canada, and internationally. MSI is headquartered in Taipei, Taiwan. MSI source code, including framework to develop bios, also we have private keys.We will publish stolen data when timer expires.Databases: wwrlt2, eais, CTMS, ERP.Revenue: $7BWebsite: msi.com
Sources
- Victim sitemsi.com
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
