A group of hackers attack Foxconn servers

Following reports published in the US media during the past week showing evidence of the exploitation of Foxconn employees, several protest groups have emerged against the activities of the Taiwanese factory.

A group of hackers, SwaggSec, jeopardized Foxconn's security yesterday. The attackers published a statement online demanding improvements in Foxconn's working conditions and revealing usernames and passwords to access the company's servers.. The attack even affected the CEO of Foxconn, whose data was also exposed.

Foxconn was quick to shut down all of its servers within minutes, when the IT team realized that thousands of people around the world were accessing their information.

The thing will not be like that. It remains to be seen if any private documents have been leaked and if the group of hackers attacks the company again.

SwaggSec's full release in English, after the jump.

Users of Cyberspace, So Foxconn thinks they got 'em some swagger because they work with the Big Boys from Intel, Microsoft, IBM, and Apple?  Fool, You don't know what swagger is.  They say you got your employees all worked up, committing suicide 'n stuff.  They say you hire Chinese workers' cause you think the Taiwanese are elite.  We got somethin 'served up good ... real good.  Your not gonna 'know what hit you by the time you finish this release.  Your company gonna 'crumble, and you deserve it.
 Upon switching the radio from Nicki Minaj's self-enforcing, lack of content, stereotypical song, "Stupid Hoe"; We switched on BBC Radio, the leading source of unbiased material.  A short segment on the manufacturing giant Foxconn, came up reporting on the inhuman conditions the workers experience.  A few days later an almost viral rumor about an Iphone 5 with a 4-inch screen being manufactured, as claimed by an employee of the infamous Foxconn.  Now as a first impression Swagg Security would rather not deceive the public of our intentions.  Although we are considerably disappointed in the conditions of Foxconn, we are not hacking a corporation for such a reason and although we are slightly interested in the existence of an Iphone 5, we are not hacking for this reason.  We hack for the cyberspace who share a few common views and philosophies.  We enjoy exposing governments and corporations, but the most prominent reason, is the hilarity that ensues when compromising and destroying an infrastructure.  How unethical right?  Perhaps for the layman who has agreed to a society raised by the government that actively seeks to maintain power and quell threats to their ventures.  But to us and many others, the destruction of an infrastructure, the act of destruction that does not affect an individual, brings a sense of newfound content, a unique feeling, along with a new chance to start your own venture.
 This is Swagg Security, we aim to reshape your perspectives, our perspectives, by the inducing of entertainment.  A unique approach to spreading a unique philosophy which brings the sought after tranquility.  In a way we are "hacktivist", but in our own views we are Greyhats.  We believe there is no reality in hacktivism, even with good intentions.  We know those who claim to be "hacktivists" that inside of you, a suppressed part of you, enjoys playing a part in the anarchist event of hacking of an infrastructure.  One which at the same time presents a challenge, upon completion reveals an almost unknown feeling of a threatening satisfaction.  We encourage not to continue quelling such a natural emotion but to embrace it.  Only when embracing what society has taught you to hide, is when you realize your own identity.
 We encourage media, security experts, and other interested individuals to explore our leaks.  Foxconn did have an appropriate firewall, but fortunately to our attempt, we were able to bypass it almost flawlessly.  Of course with funding ourselves we did have our limitations.  But with several hacking techniques employed, and a couple of days in time, we were able to dump most of everything of significance.  We now appropriately give consent to other individuals reading this release, to scavenge through the leaks acquiring usernames and passwords; while attempting to find if they use the passwords anywhere else.  Remember damage is bliss.  Without further damage, the leaks.

Follow us on Google News

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.