Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks


Discovered 2026-05-11 11:23 UTC
Est. attack date 2026-05-11
Country TW
Duplicate Entry
This victim has been identified as a duplicate of another entry in our database. However, this may not always be the case: the same organization can be targeted multiple times by the same or different ransomware groups, which may result in separate legitimate entries. Search for related entries

Description:

The world's largest contract electronics manufacturer, whose operations are officially divided into four key segments: consumer electronics, cloud and networking products, computing equipment, as well as components and other products.

Infostealer activity detected by HudsonRock

Compromised Employees: 53

Compromised Users: 719

Third Party Employee Credentials: 185


External Attack Surface: 137


Infostealer Distribution

DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • DomainAbuseservice.aliyun.com
MX Records
  • relay23945tw.foxconn.com.
  • relay-la.foxconn.com.
  • mail4-la.foxconn.com.
  • vhost4.foxconn.com.
  • relay45tw.foxconn.com.
  • relay46tw.foxconn.com.
  • relay8tw.foxconn.com.
TXT Records
  • MS=ms38938038
  • v=spf1 include:_spf.foxconn.com include:amazonses.com include:spf.protection.outlook.com include:_spf.google.com ~all
  • cisco-ci-domain-verification=4f62fbc6712ef80d75b7762e5286620ee5cce469202a5c19ece12c055d26ba57
  • _1ru0a7tuyzrh9rpy15g4ce1sijndzsa
  • _cxzxu4ogkqmc4sxd6zx5lla1e0fdm8m
  • _06ehgdcj0z608bzpozzz4vrddre39co
  • _6w7s2keaaph7i4amyppfyji0v7nziph
  • autodesk-domain-verification=ps9lfb0bIo0Q5GAH0EKK
  • br6rxyp5sk3m50544mrv5rppp17vh8q0
  • fqwl9jdyrm6w5m9bzc3t47b0d16g1w29
  • _3he1wxlfpd9mjeemwhwxcpmbu2i92l1
  • _globalsign-domain-verification=GdnVuxtjB9Cx5sdPFG3vkPVbl-zkvOuleHZslT-_4n
  • r4fn6vf5swr80glgtd11t7r64l2v6nqf
  • lzt7rgd5q3322pvr8j52t33dfqpglq2n
  • ybb88grk9dy37d4lw1f12232nqg8j26r
  • n6g9jxlxqtscsws8c201340x361cxvht
  • _rz8h11hr53s0tnqp448vngmctqiytmq
  • 9dg2f2oe992o2n1gg77afs2u0
  • w78069ncbthbkxcb67j5dfrpv0x4m2f0
  • vdb9x5vcf2wcjc4t8q48hbzvpsrvrx2p
  • _globalsign-domain-verification=3wS5Ka2U4kGWANRKeQcxQYdBKXKs6JAxnTszdN4haR
  • _globalsign-domain-verification=_X3JSytwlHAQcJWd56HDmORxKw804ylLRm9Yhid4NF
  • google-site-verification=LJ4BJ7IgiqBu_0RLgpk2v-5qDwNiNDpR3BwCiJlQYo8
  • 3fd9m9g739yxlr58hr9jthwk8zxncks6
Cloud / SaaS Services Detected
Amazon SES/WorkMail Global Sign Microsoft 365 Autodesk Cisco

Leak Screenshot:

Leak Screenshot