Cybercriminals claim to have breached the systems of an important Foxconn factory in Mexico and they are threatening to leak stolen files if the company doesn’t pay a ransom.
Foxconn Baja California, located in the city of Tijuana at the border with California, specializes in medical devices, consumer electronics and industrial operations. The facility has 5,000 employees.
A threat group that uses the LockBit 2.0 ransomware claims to have hit this factory and is threatening to release stolen information on June 11, unless the victim pays up.
It’s unclear if the ransomware attack had any impact on operational technology (OT) systems.
SecurityWeek has reached out to the electronics manufacturing giant, but we have yet to receive a response.
This is not the first time Foxconn has been hit by ransomware. In December 2020, the company confirmed that some of its systems in the United States had been targeted in a cyberattack after the DoppelPaymer ransomware group started leaking files allegedly stolen from the company.
While Foxconn said at the time that the attack had impacted US systems, the hackers claimed to have breached a facility in Mexico. The cybercriminals demanded more than $34 million in bitcoin.
LockBit 2.0 hackers recently also claimed to have stolen files from tire and rubber giant Bridgestone Americas.
In February, the FBI released indicators of compromise (IoCs) for LockBit 2.0 attacks and noted that the ransomware’s operators typically breach enterprise networks by purchasing access or by leveraging unpatched vulnerabilities, zero-day exploits, or insider access.
Related: Ransomware Attack Hits Production Facilities of Agricultural Equipment Giant AGCO
Related: French Ministry of Justice Targeted in Ransomware Attack
Related: Biomanufacturing Facilities Warned of Attacks Involving Sophisticated Malware

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Dole Says Employee Information Compromised in Ransomware Attack
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
Latest News
- Intel Co-founder, Philanthropist Gordon Moore Dies at 94
- Google Leads $16 Million Investment in Dope.security
- US Charges 20-Year-Old Head of Hacker Site BreachForums
- Tesla Hacked Twice at Pwn2Own Exploit Contest
- CISA Ships ‘Untitled Goose Tool’ to Hunt for Microsoft Azure Cloud Infections
- Critical WooCommerce Payments Vulnerability Leads to Site Takeover
- PoC Exploit Published for Just-Patched Veeam Data Backup Solution Flaw
- CISA Gets Proactive With New Pre-Ransomware Alerts
