Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

Foxconn Interconnect Technology Limited (FIT)

foxconn.com

Discovered 2025-12-08 18:16 UTC
Est. attack date 2025-12-07
Country TW
Duplicate Entry
This victim has been identified as a duplicate of another entry in our database. However, this may not always be the case: the same organization can be targeted multiple times by the same or different ransomware groups, which may result in separate legitimate entries. Search for related entries

Description:

Foxconn Interconnect Technology Limited (FIT) focuses on the development, manufacturing, and marketing of electronic and optoelectronic connectors, antennas, acoustic components, cables, and modules for applications in computers, communication equipment, consumer electronics, automobiles, industrial and green energy field products. With offices and manufacturing sites located in Asia, the Americas, and Europe, FIT is a global leader in the supply of precision components.

Infostealer activity detected by HudsonRock

Compromised Employees: 53

Compromised Users: 719

Third Party Employee Credentials: 185


External Attack Surface: 137


Infostealer Distribution

DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • DomainAbuseservice.aliyun.com
MX Records
  • mail4-la.foxconn.com.
  • vhost4.foxconn.com.
  • relay45tw.foxconn.com.
  • relay46tw.foxconn.com.
  • relay8tw.foxconn.com.
  • relay23945tw.foxconn.com.
  • relay-la.foxconn.com.
TXT Records
  • r4fn6vf5swr80glgtd11t7r64l2v6nqf
  • _6w7s2keaaph7i4amyppfyji0v7nziph
  • n6g9jxlxqtscsws8c201340x361cxvht
  • fqwl9jdyrm6w5m9bzc3t47b0d16g1w29
  • _globalsign-domain-verification=3wS5Ka2U4kGWANRKeQcxQYdBKXKs6JAxnTszdN4haR
  • v=spf1 include:_spf.foxconn.com include:amazonses.com include:spf.protection.outlook.com include:_spf.google.com ~all
  • lzt7rgd5q3322pvr8j52t33dfqpglq2n
  • _cxzxu4ogkqmc4sxd6zx5lla1e0fdm8m
  • _globalsign-domain-verification=_X3JSytwlHAQcJWd56HDmORxKw804ylLRm9Yhid4NF
  • 9dg2f2oe992o2n1gg77afs2u0
  • cisco-ci-domain-verification=4f62fbc6712ef80d75b7762e5286620ee5cce469202a5c19ece12c055d26ba57
  • _globalsign-domain-verification=GdnVuxtjB9Cx5sdPFG3vkPVbl-zkvOuleHZslT-_4n
  • vdb9x5vcf2wcjc4t8q48hbzvpsrvrx2p
  • _1ru0a7tuyzrh9rpy15g4ce1sijndzsa
  • ybb88grk9dy37d4lw1f12232nqg8j26r
  • _rz8h11hr53s0tnqp448vngmctqiytmq
  • w78069ncbthbkxcb67j5dfrpv0x4m2f0
  • _06ehgdcj0z608bzpozzz4vrddre39co
  • google-site-verification=LJ4BJ7IgiqBu_0RLgpk2v-5qDwNiNDpR3BwCiJlQYo8
  • 3fd9m9g739yxlr58hr9jthwk8zxncks6
  • MS=ms38938038
  • br6rxyp5sk3m50544mrv5rppp17vh8q0
  • autodesk-domain-verification=ps9lfb0bIo0Q5GAH0EKK
  • _3he1wxlfpd9mjeemwhwxcpmbu2i92l1
Cloud / SaaS Services Detected
Amazon SES/WorkMail Global Sign Microsoft 365 Autodesk Cisco

Leak Screenshot:

Leak Screenshot