lockbit2 attacks Foxconn
Incident Date:
May 29, 2022
Overview
Title
lockbit2 attacks Foxconn
Victim
Foxconn
Attacker
Lockbit2
Location
First Reported
May 29, 2022
Foxconn Subsidiary Foxsemicon Targeted by LockBit Ransomware Group
Foxconn, a leading contract manufacturing company, has suffered a ransomware attack by the notorious LockBit group. The attack targeted Foxsemicon Integrated Technology, a subsidiary of Foxconn, which specializes in semiconductor equipment manufacturing. The LockBit group claimed to have stolen 5 terabytes of data from the company and threatened to publish it online unless a ransom is paid.
Foxsemicon is a significant player in the semiconductor industry, with a focus on manufacturing and supplying semiconductor equipment. The company is partially owned by Foxconn or Hon Hai Technology Group in China and Taiwan. Despite the attack, Foxsemicon has stated that the incident should not significantly impact its operations.
The LockBit ransomware group is known for its prolific attacks, having been named the most active threat actor on the planet in January 2023. The group operates on a ransomware-as-a-service model, where affiliates use already developed ransomware to execute attacks.
The attack on Foxsemicon is not the first time the LockBit group has targeted the semiconductor industry. In the past year, they have targeted several other semiconductor companies, including Taiwan Semiconductor Manufacturing Company (TSMC), for which they initially demanded a $70 million ransom.
The incident highlights the ongoing threat of ransomware attacks on critical infrastructure and the need for robust cybersecurity measures to protect against such threats.
Sources
Recent Ransomware Attacks
The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.
The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.