Sunday, April 9th 2023
Money Message Ransomware Group Apparently Behind MSI Breach
It appears that MSI's data breach is more significant than originally thought and according to recent information, a new ransomware group known as "Money Message" was behind the attack, stealing databases and source code from MSI's network.
According to a report over from the BleepingComputer, Money Message claims to have stolen 1.5 TB of data from MSI's systems, including CTMS and ERP databases, software source code, private keys, and BIOS firmware. Money Message is threatening to publish these allegedly stolen documents and asking a ransom payment of $4 million. MSI has already warned its customers about the cyberattack, has started the "relevant defense mechanisms," and has been gradually restoring its systems back to normal operations.
Sources:
Bleeping Computer, Thanks to forum member P4-630
According to a report over from the BleepingComputer, Money Message claims to have stolen 1.5 TB of data from MSI's systems, including CTMS and ERP databases, software source code, private keys, and BIOS firmware. Money Message is threatening to publish these allegedly stolen documents and asking a ransom payment of $4 million. MSI has already warned its customers about the cyberattack, has started the "relevant defense mechanisms," and has been gradually restoring its systems back to normal operations.
20 Comments on Money Message Ransomware Group Apparently Behind MSI Breach
but one can see the need.
And even if your comment was contextually proper, you'd still be incorrect. Software security and hardware security are two separate things that CAN be interconnected, but don't NEED to be interconnected. The push for new hardware is all about coding laziness(on the part of microsoft) and computer sales. Nothing more. This! And partly because of... ...this! MSI's servers are unlikely to be Windows Server based. But even if they are, 99% of all breaches are due to some form of incorrectly configured security settings along with a measure of social engineering. It's almost never a purely technological exploit.
Companies are reluctant to pay groups anyway, sort of like a "not negociating with terrorits"policy
so double playing would not help anyone.
If you give a mouse a cookie, he's going to ask for a glass of milk
Because eventually they WILL cut corners. And IT is one of the places they WILL cut.
And regardless of all of the VPN's and Fire walls and what not (though it does help a great deal)...
The best way to keep your information is to not have it online at all. Secondly back everything in a regular manner.
Again CLOSED SYSTEMS for your important things. This is why I still use snail mail for payment of important things.
In my case as I do backups up my system, If I get tagged with ransomware, I just hot swap it out with a HD+OS that has my back up (once a week) and frag the infected drive to oblivion.
Again as state before my rig has the ICY DOCK system. So 6 different OS are on my rig at the moment.
I'm also playing around with Zorin Linux and Gnome Box for virtualization as Linux has less issues than Windows.
The lesson is to not willingly give out your personal information to anyone and make it harder for thieves to get your info so they can to make your life miserable.
I maybe Old...
I maybe Cranky...
But Grandpa Charlie...
Does not sing The Blues...
:peace: