Foxconn, the world's largest contract electronics manufacturer and a critical component of the global tech supply chain, has confirmed it sustained a ransomware attack impacting its North American operations. The attack, claimed by the Nitrogen ransomware group, caused network outages and operational disruptions at facilities in the U.S. and Mexico. The threat actors claim to have exfiltrated 8 terabytes of data, including highly sensitive intellectual property belonging to Foxconn's clients, which include Apple, Intel, and Google. This incident highlights the significant supply chain risk posed by attacks on major manufacturers and demonstrates the continued evolution of ransomware gangs, with Nitrogen believed to be a splinter group using leaked code from the notorious Conti syndicate.
The attack was publicly claimed by the Nitrogen ransomware gang on its dark web leak site on May 11, 2026. They allege the theft of 11 million files, totaling 8 terabytes of data. To substantiate their claims, they posted sample images of what appear to be internal documents and technical drawings. The stolen data allegedly contains confidential project files and internal documentation related to Foxconn's most prominent customers. The attack forced some factory operations to revert to manual processes, indicating a significant impact on the company's IT and potentially OT networks. This is the latest in a series of ransomware attacks against Foxconn, which has previously been targeted by LockBit and DoppelPaymer.
While the exact initial access vector has not been disclosed, ransomware attacks on large manufacturing enterprises often begin with phishing, exploitation of unpatched VPN appliances, or compromised credentials. The Nitrogen gang's connection to Conti suggests they may use a similar playbook.
MITRE ATT&CK Techniques Identified:
T1566 - Phishing or T1190 - Exploit Public-Facing Application.T1053.005 - Scheduled Task for persistence and disabling security tools via T1562.001 - Disable or Modify Tools.T1003.001 - LSASS Memory is a staple for credential theft.net view, net user) is common to map the internal network. (T1087 - Account Discovery, T1018 - Remote System Discovery).T1567.002 - Exfiltration to Cloud Storage: Exfiltrating 8 TB of data likely involved pushing it to attacker-controlled cloud storage accounts.T1486 - Data Encrypted for Impact: The final payload involves encrypting files across the network to force operational shutdown and payment.The claim of stealing 8 TB of data, if true, is a monumental failure of data loss prevention controls. Exfiltrating such a large volume of data is noisy and time-consuming. This suggests the attackers had a long dwell time within the network and that egress traffic monitoring was either insufficient or the alerts it generated were missed.
The direct impact on Foxconn includes operational downtime, significant incident response costs, and potential ransom payment. However, the secondary impact on the global technology supply chain could be far more severe. The theft and potential leak of intellectual property from Apple, Intel, Google, Dell, and Nvidia could expose future product roadmaps, proprietary designs, and trade secrets, leading to immense competitive and financial damage for these companies. This attack underscores the systemic risk inherent in a concentrated manufacturing ecosystem; a single breach at a supplier like Foxconn can have cascading consequences for the entire industry.
No specific technical Indicators of Compromise (IOCs) such as IP addresses, domains, or file hashes were mentioned in the source articles.
Security teams should hunt for TTPs associated with Conti-derived ransomware:
AdFind.exe, nltest.exe, and PsExec.exe originating from unusual user accounts or workstations.vssadmin delete shadows).File Content Rules (D3-FCR) and behavioral analysis are key.Network Isolation (D3-NI).Network Traffic Analysis (D3-NTA).Software Update (D3-SU) practice.Crucial for separating IT and OT networks, and for isolating sensitive R&D and client data segments to prevent lateral movement.
Strict egress filtering to block outbound connections to non-approved cloud storage services could have prevented or slowed the 8TB data exfiltration.
Strict controls over privileged accounts can prevent attackers from gaining the domain-wide access needed to deploy ransomware at scale.
Modern endpoint protection should be deployed to detect and block the execution of known ransomware payloads and associated tools.
The Nitrogen ransomware gang claims responsibility for the attack on its dark web leak site.
Foxconn confirms it was the victim of a cyberattack and that recovery operations are underway.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.