Badge
11,371 badges added since 01 January 2025
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions

鴻佰科技股份有限公司(Ingrasys Inc.)是富士康科技集團(Foxconn Technology Group)的子公司,是世界級智慧型雲網服務產品之技術領導者,提供廣泛的產品和服務,包括伺服器、儲存裝置、高性能計算加速器和創新的環境友善解決方案,協助全球客戶滿足使用需求。公司已獲得AS9100認證,確保提供高品質的航太產品和服務。更多資訊,請參考鴻佰科技相關網站: -> Ingrasys Inc.:https://www.ingrasys.com/ -> LinkedIn:https://www.linkedin.com/company/ingrasys/about/ About Ingrasys Ingrasys Inc., a subsidiary of Foxconn Technology Group and a global leading cloud infrastructure provider, offers a wide range of products and services, including servers, storage, HPC accelerators and innovative, eco-friendly solutions, to help worldwide customers meet their needs. Ingrasys manufacturing facility has achieved AS9100 Certification, ensuring the provision of high-quality aviation and space computing products and services. For more information about Ingrasys, visit Ingrasys website. -> Ingrasys Inc.:https://www.ingrasys.com/ -> LinkedIn:https://www.linkedin.com/company/ingrasys/about/

Ingrasys 鴻佰科技股份有限公司 A.I CyberSecurity Scoring

Ingrasys 鴻佰科技股份有限公司

Company Details

Linkedin ID:

ingrasys

Employees number:

689

Number of followers:

7,147

NAICS:

3341

Industry Type:

Computer Hardware Manufacturing

Homepage:

ingrasys.com

IP Addresses:

0

Company ID:

ING_1569603

Scan Status:

In-progress

AI scoreIngrasys 鴻佰科技股份有限公司 Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/ingrasys.jpeg
Ingrasys 鴻佰科技股份有限公司 Computer Hardware Manufacturing
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
Get a Score Increase
globalscoreIngrasys 鴻佰科技股份有限公司 Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/ingrasys.jpeg
Ingrasys 鴻佰科技股份有限公司 Computer Hardware Manufacturing
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Ingrasys 鴻佰科技股份有限公司 Company CyberSecurity News & History

Past Incidents
2
Attack Types
2
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
FoxconnCyber Attack100512/2025NA
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Cyberattack Targets Apple Supplier in China, Raising Production Concerns In mid-December, a sophisticated cyberattack struck an undisclosed Apple subcontractor operating in China, potentially disrupting production and exposing sensitive data. While details remain scarce, the incident mirrors past disruptions such as the 2018 malware attack on TSMC, which halted chip production for Apple suggesting possible delays in device manufacturing. The motives behind the attack are unclear. Hackers may have sought proprietary information on Apple products or manufacturing processes, or deployed ransomware to extort the supplier, with Apple potentially pressured to intervene to avoid production slowdowns. The compromised data could range from iPhone specifications to internal operational procedures. Apple relies on a vast network of suppliers, including major players like Foxconn, Pegatron, and Wistron, but the identity of the targeted company has not been disclosed. The incident underscores the vulnerabilities in global supply chains, where even a single breach can ripple through production pipelines, impacting product availability. Further updates on the attack’s scope and impact are pending.

Ingrasys 鴻佰科技股份有限公司Ransomware100611/2020NA
Rankiteo Explanation :
Attack threatening the economy of a geographical region

Description: Smartphone manufacturing giant Foxconn was targeted in a ransomware attack by the DoppelPaymer ransomware group in November 2020 where the attackers stole unencrypted files before encrypting devices The attackers targeted Foxconn's North America facility and encrypted about 1,200 servers, stole 100 GB of unencrypted files, deleted 20-30 TB Of backups, and shut its website down. The attackers demanded a ransom of about 1804.0955 BTC that's approximately $34,686,000.

Pegatron, Foxconn, Wistron and Apple: Cyberattaque contre un partenaire Apple, des délais en perspective ?
Cyber Attack
Severity: 100
Impact: 5
Seen: 12/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization's existence

Description: Cyberattack Targets Apple Supplier in China, Raising Production Concerns In mid-December, a sophisticated cyberattack struck an undisclosed Apple subcontractor operating in China, potentially disrupting production and exposing sensitive data. While details remain scarce, the incident mirrors past disruptions such as the 2018 malware attack on TSMC, which halted chip production for Apple suggesting possible delays in device manufacturing. The motives behind the attack are unclear. Hackers may have sought proprietary information on Apple products or manufacturing processes, or deployed ransomware to extort the supplier, with Apple potentially pressured to intervene to avoid production slowdowns. The compromised data could range from iPhone specifications to internal operational procedures. Apple relies on a vast network of suppliers, including major players like Foxconn, Pegatron, and Wistron, but the identity of the targeted company has not been disclosed. The incident underscores the vulnerabilities in global supply chains, where even a single breach can ripple through production pipelines, impacting product availability. Further updates on the attack’s scope and impact are pending.

Foxconn
Ransomware
Severity: 100
Impact: 6
Seen: 11/2020
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the economy of a geographical region

Description: Smartphone manufacturing giant Foxconn was targeted in a ransomware attack by the DoppelPaymer ransomware group in November 2020 where the attackers stole unencrypted files before encrypting devices The attackers targeted Foxconn's North America facility and encrypted about 1,200 servers, stole 100 GB of unencrypted files, deleted 20-30 TB Of backups, and shut its website down. The attackers demanded a ransom of about 1804.0955 BTC that's approximately $34,686,000.

Ailogo

Ingrasys 鴻佰科技股份有限公司 Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Ingrasys 鴻佰科技股份有限公司

Incidents vs Computer Hardware Manufacturing Industry Average (This Year)

No incidents recorded for Ingrasys 鴻佰科技股份有限公司 in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Ingrasys 鴻佰科技股份有限公司 in 2026.

Incident Types Ingrasys 鴻佰科技股份有限公司 vs Computer Hardware Manufacturing Industry Avg (This Year)

No incidents recorded for Ingrasys 鴻佰科技股份有限公司 in 2026.

Incident History — Ingrasys 鴻佰科技股份有限公司 (X = Date, Y = Severity)

Ingrasys 鴻佰科技股份有限公司 cyber incidents detection timeline including parent company and subsidiaries

Ingrasys 鴻佰科技股份有限公司 Company Subsidiaries

SubsidiaryImage

鴻佰科技股份有限公司(Ingrasys Inc.)是富士康科技集團(Foxconn Technology Group)的子公司,是世界級智慧型雲網服務產品之技術領導者,提供廣泛的產品和服務,包括伺服器、儲存裝置、高性能計算加速器和創新的環境友善解決方案,協助全球客戶滿足使用需求。公司已獲得AS9100認證,確保提供高品質的航太產品和服務。更多資訊,請參考鴻佰科技相關網站: -> Ingrasys Inc.:https://www.ingrasys.com/ -> LinkedIn:https://www.linkedin.com/company/ingrasys/about/ About Ingrasys Ingrasys Inc., a subsidiary of Foxconn Technology Group and a global leading cloud infrastructure provider, offers a wide range of products and services, including servers, storage, HPC accelerators and innovative, eco-friendly solutions, to help worldwide customers meet their needs. Ingrasys manufacturing facility has achieved AS9100 Certification, ensuring the provision of high-quality aviation and space computing products and services. For more information about Ingrasys, visit Ingrasys website. -> Ingrasys Inc.:https://www.ingrasys.com/ -> LinkedIn:https://www.linkedin.com/company/ingrasys/about/

Loading...
similarCompanies

Ingrasys 鴻佰科技股份有限公司 Similar Companies

Western Digital

At Western Digital, our vision is to unleash the power and value of data. For decades, we have been at the forefront of storage innovation, which fuels our mission to be the market leader in data storage, delivering solutions for now and the future. We are committed to providing scalable, sustainabl

ASUS is a global technology leader delivering incredible experiences that enhance the lives of people everywhere. World renowned for continuously reimagining today’s technologies for tomorrow, ASUS puts users first In Search of Incredible to provide the world’s most innovative and intuitive devices,

Seagate Technology

Seagate is a leader in mass-capacity data storage. We’ve delivered more than four and a half billion terabytes of capacity over the past four decades. We make storage that scales, bringing trust and integrity to innovations that depend on data. In an era of unprecedented creation, Seagate stores inf

NVIDIA

Since its founding in 1993, NVIDIA (NASDAQ: NVDA) has been a pioneer in accelerated computing. The company’s invention of the GPU in 1999 sparked the growth of the PC gaming market, redefined computer graphics, ignited the era of modern AI and is fueling the creation of the metaverse. NVIDIA is now

newsone

Ingrasys 鴻佰科技股份有限公司 CyberSecurity News

April 04, 2026 02:07 AM
Enforcers project plans to strengthen European cybersecurity

Three-year coordinated collaboration aims to automate incident detection, response, certification, and secure updates.

April 04, 2026 01:54 AM
Cyberhaven Steps Up Event and Partner Engagement in Key Cybersecurity Markets

A LinkedIn post from Cyberhaven highlights an intensive schedule of recent field marketing and community engagement activities across...

April 04, 2026 01:54 AM
ReliaQuest Positions Strategy Around Rethinking Legacy Cybersecurity Detection Models

A LinkedIn post from ReliaQuest highlights comments by founder and CEO Brian Murphy at the company's EXPONENT 2026 event, where he described...

April 04, 2026 12:46 AM
Gritman Electronic Systems Coming Back Online Following Cybersecurity Incident

MOSCOW ― Operations across the Gritman Medical Center System are coming back online following a cybersecurity incident and systems outage...

April 04, 2026 12:41 AM
Harvard Warns of Active Cyberattack Impersonating IT Staff and Targeting Affiliates

Harvard is monitoring an ongoing cybersecurity threat involving individuals impersonating University information technology staff to gain...

April 04, 2026 12:13 AM
Intrigue IT Solutions expands cybersecurity services across US

Intrigue IT Solutions, a Dallas-based technology services provider, has announced the expansion of its comprehensive IT, web, cloud,...

April 03, 2026 11:11 PM
AI CYBERSECURITY KEYNOTE SPEAKER & IT FUTURIST CONSULTING EXPERT FOR EVENTS

AI cybersecurity keynote speaker, IT defense and artificial intelligence thought leader, celebrity influencer and consulting expert Scott...

April 03, 2026 10:22 PM
West Virginia gives CISO greater authority to lead statewide cyber program

Recently approved legislation in West Virginia grants the state's chief information security officer greater authority to implement...

April 03, 2026 10:14 PM
The Theranos Playbook Is Quietly Returning in Cybersecurity

The fall of health tech company Theranos exposed how hype can outpace reality. In cybersecurity, similar pressures are emerging as vendors...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Ingrasys 鴻佰科技股份有限公司 CyberSecurity History Information

Official Website of Ingrasys 鴻佰科技股份有限公司

The official website of Ingrasys 鴻佰科技股份有限公司 is https://http://www.ingrasys.com.

Ingrasys 鴻佰科技股份有限公司’s AI-Generated Cybersecurity Score

According to Rankiteo, Ingrasys 鴻佰科技股份有限公司’s AI-generated cybersecurity score is 757, reflecting their Fair security posture.

How many security badges does Ingrasys 鴻佰科技股份有限公司’ have ?

According to Rankiteo, Ingrasys 鴻佰科技股份有限公司 currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Ingrasys 鴻佰科技股份有限公司 been affected by any supply chain cyber incidents ?

According to Rankiteo, Ingrasys 鴻佰科技股份有限公司 has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does Ingrasys 鴻佰科技股份有限公司 have SOC 2 Type 1 certification ?

According to Rankiteo, Ingrasys 鴻佰科技股份有限公司 is not certified under SOC 2 Type 1.

Does Ingrasys 鴻佰科技股份有限公司 have SOC 2 Type 2 certification ?

According to Rankiteo, Ingrasys 鴻佰科技股份有限公司 does not hold a SOC 2 Type 2 certification.

Does Ingrasys 鴻佰科技股份有限公司 comply with GDPR ?

According to Rankiteo, Ingrasys 鴻佰科技股份有限公司 is not listed as GDPR compliant.

Does Ingrasys 鴻佰科技股份有限公司 have PCI DSS certification ?

According to Rankiteo, Ingrasys 鴻佰科技股份有限公司 does not currently maintain PCI DSS compliance.

Does Ingrasys 鴻佰科技股份有限公司 comply with HIPAA ?

According to Rankiteo, Ingrasys 鴻佰科技股份有限公司 is not compliant with HIPAA regulations.

Does Ingrasys 鴻佰科技股份有限公司 have ISO 27001 certification ?

According to Rankiteo,Ingrasys 鴻佰科技股份有限公司 is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Ingrasys 鴻佰科技股份有限公司

Ingrasys 鴻佰科技股份有限公司 operates primarily in the Computer Hardware Manufacturing industry.

Number of Employees at Ingrasys 鴻佰科技股份有限公司

Ingrasys 鴻佰科技股份有限公司 employs approximately 689 people worldwide.

Subsidiaries Owned by Ingrasys 鴻佰科技股份有限公司

Ingrasys 鴻佰科技股份有限公司 presently has no subsidiaries across any sectors.

Ingrasys 鴻佰科技股份有限公司’s LinkedIn Followers

Ingrasys 鴻佰科技股份有限公司’s official LinkedIn profile has approximately 7,147 followers.

NAICS Classification of Ingrasys 鴻佰科技股份有限公司

Ingrasys 鴻佰科技股份有限公司 is classified under the NAICS code 3341, which corresponds to Computer and Peripheral Equipment Manufacturing.

Ingrasys 鴻佰科技股份有限公司’s Presence on Crunchbase

No, Ingrasys 鴻佰科技股份有限公司 does not have a profile on Crunchbase.

Ingrasys 鴻佰科技股份有限公司’s Presence on LinkedIn

Yes, Ingrasys 鴻佰科技股份有限公司 maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ingrasys.

Cybersecurity Incidents Involving Ingrasys 鴻佰科技股份有限公司

As of April 04, 2026, Rankiteo reports that Ingrasys 鴻佰科技股份有限公司 has experienced 2 cybersecurity incidents.

Number of Peer and Competitor Companies

Ingrasys 鴻佰科技股份有限公司 has an estimated 1,203 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Ingrasys 鴻佰科技股份有限公司 ?

Incident Types: The types of cybersecurity incidents that have occurred include Ransomware and Cyber Attack.

Incident Details

Can you provide details on each incident ?

Incident : Ransomware

Title: Foxconn Ransomware Attack

Description: Smartphone manufacturing giant Foxconn was targeted in a ransomware attack by the DoppelPaymer ransomware group in November 2020 where the attackers stole unencrypted files before encrypting devices.

Date Detected: November 2020

Type: Ransomware

Attack Vector: Ransomware

Threat Actor: DoppelPaymer ransomware group

Motivation: Financial Gain

Incident : espionage

Title: Cyberattack on Apple's Chinese Subcontractor

Description: A sophisticated cyberattack targeted a Chinese subcontractor of Apple, potentially impacting production and causing delays. The attack could have been motivated by espionage, ransomware, or disruption of Apple's supply chain. Details about the compromised data, the specific subcontractor, and the full impact remain undisclosed.

Date Publicly Disclosed: mid-December 2023

Type: espionage

Threat Actor: Unknown (potentially Chinese hackers)

Motivation: espionagefinancial gaindisruption

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Impact of the Incidents

What was the impact of each incident ?

Incident : Ransomware FOX2064622

Data Compromised: 100 GB of unencrypted files

Systems Affected: 1,200 servers

Downtime: Website shut down

Operational Impact: 20-30 TB of backups deleted

Incident : espionage PEGFOXWISAPP1767108955

Data Compromised: Potential compromise of product details, manufacturing processes, or sensitive Apple-related information

Downtime: Possible production halt

Operational Impact: Potential delays in Apple's production timeline

Brand Reputation Impact: Potential reputational damage to Apple and its subcontractor

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Product Details, Manufacturing Processes and .

Which entities were affected by each incident ?

Incident : Ransomware FOX2064622

Entity Name: Foxconn

Entity Type: Manufacturing

Industry: Electronics

Location: North America

Incident : espionage PEGFOXWISAPP1767108955

Entity Type: Subcontractor

Industry: Manufacturing/Electronics

Location: China

Customers Affected: Potentially Apple and its customers

Data Breach Information

What type of data was compromised in each breach ?

Incident : Ransomware FOX2064622

Data Exfiltration: 100 GB of unencrypted files

Incident : espionage PEGFOXWISAPP1767108955

Type of Data Compromised: Product details, Manufacturing processes

Sensitivity of Data: High (potentially proprietary or confidential)

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Ransomware FOX2064622

Ransom Demanded: 1804.0955 BTC (approximately $34,686,000)

Ransomware Strain: DoppelPaymer

Data Encryption: 1,200 servers encrypted

Data Exfiltration: 100 GB of unencrypted files

References

Where can I find more information about each incident ?

Incident : espionage PEGFOXWISAPP1767108955

Source: Clubic

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Clubic.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : espionage PEGFOXWISAPP1767108955

Investigation Status: Ongoing

Additional Questions

General Information

What was the amount of the last ransom demanded ?

Last Ransom Demanded: The amount of the last ransom demanded was 1804.0955 BTC (approximately $34,686,000).

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident were an DoppelPaymer ransomware group and Unknown (potentially Chinese hackers).

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on November 2020.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on mid-December 2023.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were 100 GB of unencrypted files, Potential compromise of product details, manufacturing processes and or sensitive Apple-related information.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were 100 GB of unencrypted files, Potential compromise of product details, manufacturing processes and or sensitive Apple-related information.

Ransomware Information

What was the highest ransom demanded in a ransomware incident ?

Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was 1804.0955 BTC (approximately $34,686,000).

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is Clubic.

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.

cve

Latest Global CVEs (Not Company-Specific)

Description

Hirschmann EagleSDV version 05.4.01 prior to 05.4.02 contains a denial-of-service vulnerability that causes the device to crash during session establishment when using TLS 1.0 or TLS 1.1. Attackers can trigger a crash by initiating TLS connections with these protocol versions to disrupt service availability.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

The stored API keys in temporary browser client is not marked as protected allowing for JavScript console or other errors to allow for extraction of the encryption credentials.

Description

XSS vulnerability in cveInterface.js allows for inject HTML to be passed to display, as cveInterface trusts input from CVE API services

Description

Multiple reflected cross-site scripting (XSS) vulnerabilities in the login.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda and red_url parameters.

Description

A reflected cross-site scripting (XSS) vulnerability in the login_newpwd.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda parameter.

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=ingrasys' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge