Foxconn Confirms Cyberattack While Ransomware Group Claims to Have Apple and NVIDIA Data

Foxconn, one of the world’s largest electronics manufacturers and a supplier to companies such as Apple, Google, NVIDIA, Dell, Intel, and Sony, has confirmed a cyberattack that affected several of its facilities in North America. The company states that the impacted factories are resuming normal production, but has not clarified how many centers were affected, what systems were compromised, or if there was any actual theft of customer data.

The claim has been made by the ransomware group Nitrogen, which has included Foxconn in its dark web leak site. The attackers claim to have stolen 8 TB of data and over 11 million files, including alleged technical schematics, product documentation, internal guides, and bank statements related to top-tier clients. For now, these claims should be treated with caution: Foxconn has acknowledged the incident but has not confirmed data exfiltration or the authenticity of the material shown by the criminals.

A breach that impacts a central piece of the tech supply chain

The relevance of this case extends beyond Foxconn as a victim. It lies in its position within the global supply chain. The Taiwanese company, also known as Hon Hai Precision Industry, manufactures devices, components, and systems for some of the most important brands in the tech sector. Any intrusion into its networks can have repercussions beyond its own operations.

Foxconn confirmed that some North American factories experienced a cyberattack, and that the affected facilities are back to normal operations. Specialized media have focused on operations in the U.S. and Mexico, although the company has not publicly detailed the exact extent. Lack of concrete information is typical in the early stages of such incidents, especially when there may be contractual implications with clients, ongoing forensic investigations, and potential negotiations with the attackers.

Meanwhile, Nitrogen claims to have obtained documents related to Apple, Dell, Google, Intel, NVIDIA, and other clients. The group has published several images as supposed proof, a common tactic in double extortion campaigns: first encrypting or disrupting part of the victim’s infrastructure; then threatening to leak the stolen data if payment is not made. The goal is not only to paralyze systems but also to increase reputational and commercial pressure.

The presence of technical client documentation would heighten the risk. In electronics manufacturing, sensitive files can include schematics, bill of materials, production instructions, component designs, manufacturing schedules, financial data, logistics information, or quality documentation. Even if some of the material cannot reconstruct complete products, it can still provide valuable intelligence on processes, suppliers, variants, industrial capabilities, or business relationships.

Nitrogen and double extortion ransomware

Nitrogen is not a new name for threat intelligence teams. Broadcom describes it as a double extortion group active across multiple sectors, with campaigns targeting manufacturing, technology, construction, and financial services organizations. Such groups deploy more than just encryption malware: they seek credentials, move laterally within networks, steal information, and then use leaks as leverage to pressure victims into paying.

Cybersecurity Dive reports that Nitrogen gained prominence as a ransomware group in September 2024, based on investigations by Symantec and Carbon Black. Since then, it has been linked to attacks against sectors with high operational dependency and high value data. The choice of Foxconn fits this logic: it is not only a large company but also an industrial platform where intellectual property, production schedules, and relationships with global brands converge.

For attackers, a company of this scale offers multiple leverage points. Disrupting a factory incurs operational costs. Stealing internal data affects reputation. Mentioning strategic clients increases the incident’s public and contractual sensitivity. This combination makes critical manufacturers especially attractive targets for modern ransomware groups.

The attack also underscores a harsh reality: the security of a major tech company does not depend solely on its defenses. It also relies on suppliers, assemblers, subcontractors, logistics providers, integrators, factories, cloud platforms, and partners handling data or processes on its behalf. A design protected within Apple, Google, or NVIDIA can become exposed if it passes through a manufacturing chain with inconsistent controls.

Production, data, and trust

Foxconn has indicated that the affected factories are returning to normal. This message aims to mitigate operational impact but does not address the most critical question for clients and partners: whether sensitive documentation was stolen and what type of information could be in the attackers’ hands. Until more detailed communication or an independent investigation occurs, attribution and the volume of stolen data remain claims made by the criminal group.

The situation arrives at a time when Foxconn is strengthening its role in artificial intelligence infrastructure. The company not only assembles consumer electronics but also manufactures servers, components, and systems for AI data centers. TIME recently highlighted its new investments in Mexico and Texas related to NVIDIA servers and AI infrastructure demand. This positioning enhances its strategic value but also makes it an attractive target.

For companies reliant on major manufacturers, this case offers several lessons. First, supply contracts should include verifiable cybersecurity requirements, not just confidentiality clauses. Second, intellectual property protection must extend throughout the supply chain via segmentation, access controls, encryption, activity logs, third-party audits, and shared response plans. Third, industrial continuity cannot be separated from digital security.

It’s also important to avoid alarmism. Claiming to have stolen millions of files does not mean all are critical, current, or authentic. Many leaks include old documents, duplicates, low-value internal files, or selectively chosen screenshots intended to maximize pressure. However, minimizing the risk is also unwise: in ransomware cases, even a small amount of valid technical information can have significant business, security, or competitive impacts.

Foxconn has been a recurring target for cybercriminals in recent years, and the attack attributed to Nitrogen confirms that major manufacturers remain central to cyber pressure. Industry digitization has interconnected factories, design, logistics, and clients into increasingly complex networks. While this boosts efficiency, it also broadens the attack surface.

The question is no longer whether major industrial suppliers will be targeted but how prepared they are to withstand attacks, contain damages, and assure their customers that the shared information used in manufacturing will not be turned into extortion material.

Frequently Asked Questions

What has Foxconn confirmed?

Foxconn has confirmed that some of its factories in North America suffered a cyberattack and that the affected facilities are returning to normal operations.

What does the Nitrogen group claim?

Nitrogen claims to have stolen 8 TB of data and over 11 million files, including purported confidential documents from clients such as Apple, Google, NVIDIA, Dell, and Intel. Foxconn has not publicly confirmed this exfiltration.

What is double extortion in ransomware?

It’s a tactic where attackers encrypt or disrupt systems and also steal data, threatening to release it if the victim does not pay.

Why does this attack concern the tech industry?

Because Foxconn is part of the supply chain for major tech manufacturers. An intrusion into its systems can impact production, intellectual property, technical documentation, and trust among suppliers and clients.

via: techcrunch

Scroll to Top