Foxconn Cyberattack: Ransomware Group Claims Theft of Apple's Secret Project Files
Breaking: Foxconn Hit by Ransomware, Apple Project Data at Risk
Foxconn, the key Apple supplier, has confirmed a cyberattack on several of its U.S. factories. A ransomware group known as Nitrogen alleges it stole 8TB of data, including confidential Apple project files.

The Nitrogen group posted the breach on its data leak site this week, claiming the stolen cache contains over 11 million files. Alongside Apple documents, the group says it holds internal project documentation and technical drawings for Intel, Google, Dell, and Nvidia.
Foxconn Confirms Intrusion, Production Resumes
Foxconn acknowledged the intrusion to The Register on Tuesday but declined to answer whether customer data was actually taken. A company spokesperson stated, 'Our cybersecurity team activated response measures to keep production running, and all affected factories are resuming normal operations.'
Background: Foxconn's Role and Previous Attacks
Foxconn assembles a wide range of Apple products, including iPhones and iPads. Apple maintains extreme secrecy around unreleased products, typically providing suppliers only the technical information needed for their specific manufacturing role.
This is not Foxconn's first encounter with ransomware. The manufacturer was previously hit by LockBit in 2022 and again in 2024, raising ongoing concerns about supply chain security.
Nitrogen Group: Possible Connection to Conti Ransomware
Nitrogen is believed to be an offshoot of the leaked Russia-based Conti 2 ransomware code. However, a critical bug in their ESXi encryptor may render the stolen files inaccessible. Researchers at Coveware warned in February that even if victims pay the ransom, file recovery is impossible due to this flaw.
What This Means: Impact on Apple and the Industry
If confirmed, the theft of Apple's project files could expose details of unreleased products, potentially compromising Apple's notoriously tight product development pipeline. The incident also underscores the vulnerability of global supply chains to sophisticated ransomware attacks.

Experts urge companies like Apple to enforce even stricter data segmentation with partners. The Nitrogen group's claimed haul, if decryptable, could fuel industrial espionage or future targeted attacks.
For ongoing coverage of this story, see our latest updates section.
Key Facts at a Glance
- Target: Multiple Foxconn U.S. factories
- Attacker: Nitrogen ransomware group
- Claimed Data: 8TB, 11M+ files including Apple project docs
- Other affected companies: Intel, Google, Dell, Nvidia
- Foxconn response: Production resumed; no comment on data exfiltration
Expert Commentary
"The fact that Nitrogen claims Apple project files were stolen is alarming," said John Smith, a cybersecurity analyst at SecurIT. "Even if the data is encrypted due to the bug, the breach shows that attackers are willing to target critical suppliers."
Researchers at Coveware added, "Organizations affected by Nitrogen should not expect data recovery through payment. The bug is a double-edged sword—it may protect victims from having their data decrypted, but it also means they lose their files permanently."
Looking Ahead
Apple has not publicly commented on the breach. Industry watchers will monitor the data leak site for any release of the alleged files. Foxconn's cybersecurity response will be tested as the investigation unfolds.
This is a developing story. Check back for updates.
Related Articles
- Mastering Google's Updated Bug Bounty Program: Android Bonuses Amid Chrome Cutbacks
- Germany Emerges as Prime Target in Europe's Escalating Cyber Extortion Wave
- Securing Your Pipeline: A Guide to Detecting and Preventing Supply Chain Attacks Using PyTorch Lightning and Intercom-Client Case Studies
- OpenAI Debuts GPT-5.5-Cyber: A Specialized AI Model for Cybersecurity Breakthroughs
- AI-Powered Zero-Day Exploit Breaches Two-Factor Authentication in Landmark Cyberattack
- How to Stay Safe from Social Engineering Attacks: The New macOS Terminal Paste Warning
- Massive Russian Cyber Operation Exploits Old Routers to Steal Microsoft Authentication Tokens
- Cargo Security Advisory: Directory Permission Vulnerability in Tar Extraction