Answer Brief
Taiwan’s iThome reports that ransomware operators using the “Nitrogen” name have listed Foxconn (Hon Hai Precision Industry) as a victim on a dark-web leak site, claiming they stole 8TB of data comprising about 11 million files. The actors allege the haul includes confidential orders, projects, and design sketches tied to multiple technology companies, but the report notes those partner references are not yet independently verified. The disclosure follows a widely reported early-May IT outage at Foxconn’s U.S. Wisconsin campus; Foxconn confirmed an “IT network issue” and later stated that production operations at affected North American sites remained normal after response actions were initiated.

Executive Summary: Taiwan’s iThome reports that ransomware operators using the “Nitrogen” name have listed Foxconn (Hon Hai Precision Industry) as a victim on a dark-web leak site, claiming they stole 8TB of data comprising about 11 million files. The actors allege the haul includes confidential orders, projects, and design sketches tied to multiple technology companies, but the report notes those partner references are not yet independently verified. The disclosure follows a widely reported early-May IT outage at Foxconn’s U.S. Wisconsin campus; Foxconn confirmed an “IT network issue” and later stated that production operations at affected North American sites remained normal after response actions were initiated.
Why It Matters
This report matters beyond Taiwan because Foxconn is a core node in global electronics manufacturing and systems integration; any credible ransomware-driven data theft or plant IT disruption can translate into downstream supply-chain risk for multiple brands, engineering programs, and delivery schedules.
Based on iThome’s account, Nitrogen’s operators are using a classic double-extortion narrative: claim encryption plus data exfiltration, then publish proof screenshots and threaten broader disclosure if demands are not met. The screenshots described by iThome reportedly include component descriptions, engineering diagrams, investment documents, and financial process materials. However, the article stresses an important boundary for enterprise risk teams: while the actors name Apple, Dell, Intel, and Nvidia in their claims, the visible evidence cited in the report could only be connected to a Google-related production document, and the rest of the partner tie-ins were not confirmed.
The coincidence in timing with the Wisconsin outage is operationally significant but not conclusive. Large-scale IT outages at industrial sites can be ransomware-related, but they can also stem from other failures; iThome explicitly notes the linkage between the outage and the alleged exfiltration remains uncertain. Still, the reported impact—production lines unable to operate and employees relying on personal hotspots—matches the kind of business interruption that makes manufacturers high-pressure targets for extortion.
For global cloud, identity, and security teams supporting manufacturing environments, the key takeaway is the exposure surface implied by the claim: high-volume file repositories tied to production and customers, plus engineering artifacts that may be shared across partners. Even if partner names are used primarily as leverage, the episode underscores how ransomware campaigns increasingly aim to turn a single manufacturer into a multi-organization disclosure and trust problem. iThome also relays that security firms characterize Nitrogen as an emerging group since 2023 with debated links to other ransomware ecosystems (including speculation about connections to BlackCat/ALPHV), highlighting the fluid branding and affiliate dynamics that complicate attribution and risk scoring.
Event Type: security
Importance: high
Affected Companies
- Apple
- Dell
- Foxconn (Hon Hai Precision Industry)
- Intel
- Nitrogen (ransomware group)
- Nvidia
Affected Sectors
- Cybersecurity
- Electronics
- Manufacturing
- Supply chain
Key Numbers
- Alleged data stolen: 8TB
- Alleged number of files: ~11 million
- Reported U.S. site outage start: 2026-05-01
- Public disclosure (Foxconn statement referenced by iThome): 2026-05-12
Timeline
- Foxconn’s Mount Pleasant, Wisconsin campus reportedly experienced a major network outage affecting production lines and office connectivity, lasting into the first weekend of May (per iThome’s summary of reporting).
- Cybernews reported that after the U.S. IT disruption, Nitrogen operators listed Foxconn as a victim and claimed theft of 8TB/11M files (per iThome).
- Foxconn posted a material disclosure stating parts of its North American sites were hit by a cyberattack; its security team activated incident response and said affected sites’ production and operations remained normal (as cited by iThome).
- iThome published details of the alleged ransomware incident, including the claims and what could/could not be validated from posted screenshots.