Cyberattack on Foxconn: A stress test for vendor risk management of global supply chains
On May 12, 2026, the Taiwanese contract manufacturer confirmed Foxconn a cyberattack that led to IT outages at its North American factories. The incident was triggered by the claims of the ransomware group Nitrogen which stated, 8 TB of data to have been stolen. As Foxconn is a key producer for technology companies such as Apple, Google and Intel, the attack brings the security of supply chains and the need for continuous vendor risk management (VRM) into focus.
What happened? Facts and allegations
According to reports, there were IT disruptions from May 1, 2026, which primarily affected the plant in Mount Pleasant, Wisconsin - an important center for the production of AI servers. On May 11, Foxconn appeared on the Nitrogen Group's leak site. The attackers threatened to publish over 11 million files containing sensitive information from Foxconn and its customers.
Foxconn's official communication confirms a „cyber attack“ and the gradual resumption of production. However, the company has not yet acknowledged the use of ransomware or data theft. The attribution to the actor Nitrogen is based solely on its own assertion. This incident is one in a series of attacks on the company: DoppelPaymer hit a Foxconn factory in Ciudad Juárez (Mexico) back in November 2020, LockBit 2.0 attacked the plant in Tijuana in May 2022, and in January 2024, the subsidiary Foxsemicon was again a victim of the LockBit group.
Tactics of the Nitrogen Group
Nitrogen has been known since mid-2023 and was first analyzed in detail by Sophos X-Ops. The group typically uses malvertising campaigns as its initial access route. Trojanized installers are distributed via manipulated ads for legitimate IT software (e.g. via Google or Bing). According to Sophos X-Ops, the infection chain leads to the execution of payloads such as Cobalt Strike Beacons or a Meterpreter shell, which allow the attackers far-reaching access to the network. A technical analysis of Nitrogen's ESXi encryptor by Coveware also revealed a critical flaw: Due to faulty key management, it is technically impossible to decrypt the data even after a ransom has been paid.
Impact on the global supply chain
A successful attack on a manufacturing giant like Foxconn has far-reaching consequences. The Nitrogen Group claims to have captured sensitive data from Foxconn customers. Independent analysis of some of the published data has revealed topology diagrams for Google- and Intel-components. For Apple In contrast, sample analyses to date suggest that the company is not directly affected; the allegations regarding Dell and Nvidia have not yet been confirmed. The potential theft of topology diagrams and production documentation nevertheless poses a significant risk to the intellectual property of the companies concerned.
The incident demonstrates that a supplier's security situation can have a direct impact on its own organization - from production downtime to the loss of critical trade secrets. This underscores the need to consider supply chain security as an integral part of your own cyber resilience, as required by regulations such as NIS-2 demand.
For European companies that use Foxconn as a supplier, the following applies: If their own personal data has been compromised, Art. 33 GDPR applies with a 72-hour reporting obligation to the responsible supervisory authority. In addition, NIS-2 (Art. 21) obliges critical institutions in the EU to actively manage cyber security risks in their supply chain - an incident like the one at Foxconn is therefore not just a US problem, but a direct compliance issue for DACH companies with corresponding supplier relationships.
Continuous vendor risk management as a strategic response
An incident like the one at Foxconn shows the limits of traditional supplier risk assessments based on questionnaires. Cyber risks are dynamic and require continuous monitoring of the external attack surface of business partners - especially for tier 1 suppliers with a high level of vertical integration and a broad customer base.
A Continuous Vendor Risk Management (C-VRM) platform such as LocateRisk enables companies to assess the security posture of their critical vendors on an ongoing, data-driven basis. Instead of relying on annual audits, the platform provides up-to-date insights into potential vulnerabilities such as unsecured VPN or RDP access - known gateways for ransomware groups such as Nitrogen. Exposed remote access services, outdated certificates or unexpected open ports at a supplier can be detected early and addressed in direct dialog before a security incident occurs.
Such an approach allows risks to be identified proactively and addressed in dialog with the supplier. LocateRisk is a „Made in Germany“ solution that is hosted in certified German data centers and supports companies in meeting GDPR requirements. This enables companies to systematically manage their supply chain risks and support the requirements of standards such as ISO 27001 or TISAX.
Sources and further information
Evaluate your supplier risk based on data
A continuous overview of your suppliers' external IT systems is the first step towards minimizing risk. LocateRisk offers a fast and comprehensive analysis of the external attack surface - for your company and your most important partners.
Request a free safety check
Frequently asked questions
Nitrogen claims to have stolen 8 TB of data with over 11 million files from Foxconn's North American plants. Foxconn itself has not yet officially confirmed the use of ransomware or the theft of data. The attribution of the attack to Nitrogen is based solely on the group's own claims on its leak site.
Independent sample analyses were able to verify topology diagrams for Google and Intel components in the published data set. For Apple, previous analyses suggest that the company is not directly affected. The allegations regarding Dell and Nvidia are currently unconfirmed.
Coveware discovered that Nitrogen's ESXi encryptor encrypts files with a corrupted public key due to a programming error in key management. This makes it technically impossible to restore the data even after a ransom payment - neither victims nor attackers can decrypt the affected ESXi systems. Companies without functional backups face permanent data loss.