Company Details
ingrasys
689
7,147
3341
ingrasys.com
0
ING_1569603
In-progress


Ingrasys 鴻佰科技股份有限公司 Vendor Cyber Rating & Cyber Score
ingrasys.com鴻佰科技股份有限公司(Ingrasys Inc.)是富士康科技集團(Foxconn Technology Group)的子公司,是世界級智慧型雲網服務產品之技術領導者,提供廣泛的產品和服務,包括伺服器、儲存裝置、高性能計算加速器和創新的環境友善解決方案,協助全球客戶滿足使用需求。公司已獲得AS9100認證,確保提供高品質的航太產品和服務。更多資訊,請參考鴻佰科技相關網站: -> Ingrasys Inc.:https://www.ingrasys.com/ -> LinkedIn:https://www.linkedin.com/company/ingrasys/about/ About Ingrasys Ingrasys Inc., a subsidiary of Foxconn Technology Group and a global leading cloud infrastructure provider, offers a wide range of products and services, including servers, storage, HPC accelerators and innovative, eco-friendly solutions, to help worldwide customers meet their needs. Ingrasys manufacturing facility has achieved AS9100 Certification, ensuring the provision of high-quality aviation and space computing products and services. For more information about Ingrasys, visit Ingrasys website. -> Ingrasys Inc.:https://www.ingrasys.com/ -> LinkedIn:https://www.linkedin.com/company/ingrasys/about/
Company Details
ingrasys
689
7,147
3341
ingrasys.com
0
ING_1569603
In-progress
Between 750 and 799

Ingrasys 鴻佰科技股份有限公司 Global Score (TPRM)XXXX

Description: Cyberattack Targets Apple Supplier in China, Raising Production Concerns In mid-December, a sophisticated cyberattack struck an undisclosed Apple subcontractor operating in China, potentially disrupting production and exposing sensitive data. While details remain scarce, the incident mirrors past disruptions such as the 2018 malware attack on TSMC, which halted chip production for Apple suggesting possible delays in device manufacturing. The motives behind the attack are unclear. Hackers may have sought proprietary information on Apple products or manufacturing processes, or deployed ransomware to extort the supplier, with Apple potentially pressured to intervene to avoid production slowdowns. The compromised data could range from iPhone specifications to internal operational procedures. Apple relies on a vast network of suppliers, including major players like Foxconn, Pegatron, and Wistron, but the identity of the targeted company has not been disclosed. The incident underscores the vulnerabilities in global supply chains, where even a single breach can ripple through production pipelines, impacting product availability. Further updates on the attack’s scope and impact are pending.
Description: Smartphone manufacturing giant Foxconn was targeted in a ransomware attack by the DoppelPaymer ransomware group in November 2020 where the attackers stole unencrypted files before encrypting devices The attackers targeted Foxconn's North America facility and encrypted about 1,200 servers, stole 100 GB of unencrypted files, deleted 20-30 TB Of backups, and shut its website down. The attackers demanded a ransom of about 1804.0955 BTC that's approximately $34,686,000.


No incidents recorded for Ingrasys 鴻佰科技股份有限公司 in 2026.
No incidents recorded for Ingrasys 鴻佰科技股份有限公司 in 2026.
No incidents recorded for Ingrasys 鴻佰科技股份有限公司 in 2026.
Ingrasys 鴻佰科技股份有限公司 cyber incidents detection timeline including parent company and subsidiaries

鴻佰科技股份有限公司(Ingrasys Inc.)是富士康科技集團(Foxconn Technology Group)的子公司,是世界級智慧型雲網服務產品之技術領導者,提供廣泛的產品和服務,包括伺服器、儲存裝置、高性能計算加速器和創新的環境友善解決方案,協助全球客戶滿足使用需求。公司已獲得AS9100認證,確保提供高品質的航太產品和服務。更多資訊,請參考鴻佰科技相關網站: -> Ingrasys Inc.:https://www.ingrasys.com/ -> LinkedIn:https://www.linkedin.com/company/ingrasys/about/ About Ingrasys Ingrasys Inc., a subsidiary of Foxconn Technology Group and a global leading cloud infrastructure provider, offers a wide range of products and services, including servers, storage, HPC accelerators and innovative, eco-friendly solutions, to help worldwide customers meet their needs. Ingrasys manufacturing facility has achieved AS9100 Certification, ensuring the provision of high-quality aviation and space computing products and services. For more information about Ingrasys, visit Ingrasys website. -> Ingrasys Inc.:https://www.ingrasys.com/ -> LinkedIn:https://www.linkedin.com/company/ingrasys/about/


At Western Digital, our vision is to unleash the power and value of data. For decades, we have been at the forefront of storage innovation, which fuels our mission to be the market leader in data storage, delivering solutions for now and the future. We are committed to providing scalable, sustainabl

ASUS is a global technology leader delivering incredible experiences that enhance the lives of people everywhere. World renowned for continuously reimagining today’s technologies for tomorrow, ASUS puts users first In Search of Incredible to provide the world’s most innovative and intuitive devices,

Seagate is a leader in mass-capacity data storage. We’ve delivered more than four and a half billion terabytes of capacity over the past four decades. We make storage that scales, bringing trust and integrity to innovations that depend on data. In an era of unprecedented creation, Seagate stores inf

Since its founding in 1993, NVIDIA (NASDAQ: NVDA) has been a pioneer in accelerated computing. The company’s invention of the GPU in 1999 sparked the growth of the PC gaming market, redefined computer graphics, ignited the era of modern AI and is fueling the creation of the metaverse. NVIDIA is now
.png)
Three-year coordinated collaboration aims to automate incident detection, response, certification, and secure updates.
A LinkedIn post from Cyberhaven highlights an intensive schedule of recent field marketing and community engagement activities across...
A LinkedIn post from ReliaQuest highlights comments by founder and CEO Brian Murphy at the company's EXPONENT 2026 event, where he described...
MOSCOW ― Operations across the Gritman Medical Center System are coming back online following a cybersecurity incident and systems outage...
Harvard is monitoring an ongoing cybersecurity threat involving individuals impersonating University information technology staff to gain...
Intrigue IT Solutions, a Dallas-based technology services provider, has announced the expansion of its comprehensive IT, web, cloud,...
AI cybersecurity keynote speaker, IT defense and artificial intelligence thought leader, celebrity influencer and consulting expert Scott...
Recently approved legislation in West Virginia grants the state's chief information security officer greater authority to implement...
The fall of health tech company Theranos exposed how hype can outpace reality. In cybersecurity, similar pressures are emerging as vendors...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Ingrasys 鴻佰科技股份有限公司 is https://http://www.ingrasys.com.
According to Rankiteo, Ingrasys 鴻佰科技股份有限公司’s AI-generated cybersecurity score is 757, reflecting their Fair security posture.
According to Rankiteo, Ingrasys 鴻佰科技股份有限公司 currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Ingrasys 鴻佰科技股份有限公司 has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Ingrasys 鴻佰科技股份有限公司 is not certified under SOC 2 Type 1.
According to Rankiteo, Ingrasys 鴻佰科技股份有限公司 does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Ingrasys 鴻佰科技股份有限公司 is not listed as GDPR compliant.
According to Rankiteo, Ingrasys 鴻佰科技股份有限公司 does not currently maintain PCI DSS compliance.
According to Rankiteo, Ingrasys 鴻佰科技股份有限公司 is not compliant with HIPAA regulations.
According to Rankiteo,Ingrasys 鴻佰科技股份有限公司 is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Ingrasys 鴻佰科技股份有限公司 operates primarily in the Computer Hardware Manufacturing industry.
Ingrasys 鴻佰科技股份有限公司 employs approximately 689 people worldwide.
Ingrasys 鴻佰科技股份有限公司 presently has no subsidiaries across any sectors.
Ingrasys 鴻佰科技股份有限公司’s official LinkedIn profile has approximately 7,147 followers.
Ingrasys 鴻佰科技股份有限公司 is classified under the NAICS code 3341, which corresponds to Computer and Peripheral Equipment Manufacturing.
No, Ingrasys 鴻佰科技股份有限公司 does not have a profile on Crunchbase.
Yes, Ingrasys 鴻佰科技股份有限公司 maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ingrasys.
As of April 04, 2026, Rankiteo reports that Ingrasys 鴻佰科技股份有限公司 has experienced 2 cybersecurity incidents.
Ingrasys 鴻佰科技股份有限公司 has an estimated 1,203 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware and Cyber Attack.
Title: Foxconn Ransomware Attack
Description: Smartphone manufacturing giant Foxconn was targeted in a ransomware attack by the DoppelPaymer ransomware group in November 2020 where the attackers stole unencrypted files before encrypting devices.
Date Detected: November 2020
Type: Ransomware
Attack Vector: Ransomware
Threat Actor: DoppelPaymer ransomware group
Motivation: Financial Gain
Title: Cyberattack on Apple's Chinese Subcontractor
Description: A sophisticated cyberattack targeted a Chinese subcontractor of Apple, potentially impacting production and causing delays. The attack could have been motivated by espionage, ransomware, or disruption of Apple's supply chain. Details about the compromised data, the specific subcontractor, and the full impact remain undisclosed.
Date Publicly Disclosed: mid-December 2023
Type: espionage
Threat Actor: Unknown (potentially Chinese hackers)
Motivation: espionagefinancial gaindisruption
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Data Compromised: 100 GB of unencrypted files
Systems Affected: 1,200 servers
Downtime: Website shut down
Operational Impact: 20-30 TB of backups deleted

Data Compromised: Potential compromise of product details, manufacturing processes, or sensitive Apple-related information
Downtime: Possible production halt
Operational Impact: Potential delays in Apple's production timeline
Brand Reputation Impact: Potential reputational damage to Apple and its subcontractor
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Product Details, Manufacturing Processes and .

Entity Name: Foxconn
Entity Type: Manufacturing
Industry: Electronics
Location: North America

Entity Type: Subcontractor
Industry: Manufacturing/Electronics
Location: China
Customers Affected: Potentially Apple and its customers

Data Exfiltration: 100 GB of unencrypted files

Type of Data Compromised: Product details, Manufacturing processes
Sensitivity of Data: High (potentially proprietary or confidential)

Ransom Demanded: 1804.0955 BTC (approximately $34,686,000)
Ransomware Strain: DoppelPaymer
Data Encryption: 1,200 servers encrypted
Data Exfiltration: 100 GB of unencrypted files

Source: Clubic
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Clubic.

Investigation Status: Ongoing
Last Ransom Demanded: The amount of the last ransom demanded was 1804.0955 BTC (approximately $34,686,000).
Last Attacking Group: The attacking group in the last incident were an DoppelPaymer ransomware group and Unknown (potentially Chinese hackers).
Most Recent Incident Detected: The most recent incident detected was on November 2020.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on mid-December 2023.
Most Significant Data Compromised: The most significant data compromised in an incident were 100 GB of unencrypted files, Potential compromise of product details, manufacturing processes and or sensitive Apple-related information.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were 100 GB of unencrypted files, Potential compromise of product details, manufacturing processes and or sensitive Apple-related information.
Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was 1804.0955 BTC (approximately $34,686,000).
Most Recent Source: The most recent source of information about an incident is Clubic.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
.png)
Hirschmann EagleSDV version 05.4.01 prior to 05.4.02 contains a denial-of-service vulnerability that causes the device to crash during session establishment when using TLS 1.0 or TLS 1.1. Attackers can trigger a crash by initiating TLS connections with these protocol versions to disrupt service availability.
The stored API keys in temporary browser client is not marked as protected allowing for JavScript console or other errors to allow for extraction of the encryption credentials.
XSS vulnerability in cveInterface.js allows for inject HTML to be passed to display, as cveInterface trusts input from CVE API services
Multiple reflected cross-site scripting (XSS) vulnerabilities in the login.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda and red_url parameters.
A reflected cross-site scripting (XSS) vulnerability in the login_newpwd.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda parameter.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.