Tras los reportajes publicados en medios estadounidenses durante la semana pasada en los que se dan pruebas de la explotación de los empleados de Foxconn, varias agrupaciones de protesta han surgido en contra de las actividades de la fábrica taiwanesa.
Un grupo de hackers, SwaggSec, puso en jaque la seguridad de Foxconn durante el día de ayer. Los atacantes publicaron en internet un comunicado demandando las mejoras de las condiciones laborales de Foxconn y revelando nombres de usuarios y contraseñas para acceder a los servidores de la compañía. El ataque llegó a afectar incluso al CEO de Foxconn, cuyos datos quedaron expuestos también.
Foxconn se apresuró a cerrar todos sus servidores en pocos minutos, cuando el equipo informático se dio cuenta de que miles de personas de todo el mundo estaban accediendo a su información.
La cosa no quedará así. Todavía queda por ver si se ha filtrado algún documento de carácter privado y si el grupo de hackers vuelve a atacar a la compañía.
El comunicado completo de SwaggSec en inglés, tras el salto.
Te puede interesar
Users of Cyberspace, So Foxconn thinks they got 'em some swagger because they work with the Big Boys from Intel, Microsoft, IBM, and Apple? Fool, You don't know what swagger is. They say you got your employees all worked up, committing suicide 'n stuff. They say you hire chinese workers 'cause you think the taiwanese are elite. We got somethin' served up good...real good. Your not gonna' know what hit you by the time you finish this release. Your company gonna' crumble, and you deserve it. Upon switching the radio from Nicki Minaj's self-enforcing, lack of content, stereotypical song, "Stupid Hoe"; We switched on BBC Radio, the leading source of unbiased material. A short segment on the manufacturer giant Foxconn, came up reporting on the inhuman conditions the workers experience. A few days later an almost viral rumor about an Iphone 5 with a 4-inch screen being manufactured, as claimed by an employee from the infamous Foxconn. Now as a first impression Swagg Security would rather not deceive the public of our intentions. Although we are considerably disappointed of the conditions of Foxconn, we are not hacking a corporation for such a reason and although we are slightly interested in the existence of an Iphone 5, we are not hacking for this reason. We hack for the cyberspace who share a few common viewpoints and philosophies. We enjoy exposing governments and corporations, but the more prominent reason, is the hilarity that ensues when compromising and destroying an infrastructure. How unethical right? Perhaps for the layman who has conformed to a society raised by the government that actively seeks to maintain power and quell threats to their ventures. But to us and many others, the destruction of an infrastructure, the act of destruction that does not affect an individual, brings a sense of newfound content, a unique feeling, along with a new chance to start your own venture. This is Swagg Security, we aim to to reshape your perspectives, our perspectives, by the inducing of entertainment. A unique approach to spreading a unique philosophy which brings the sought after tranquility. In a way we are "hacktivist", but in our own views we are Greyhats. We believe there is no reality in hacktivism, even with good intentions. We know those who claim to be "hacktivists" that inside of you, a suppressed part of you, enjoys playing a part in the anarchist event of hacking of an infrastructure. One which at the same time presents a challenge, upon completing reveals an almost unknown feeling of a menacing satisfaction. We encourage not to continue quelling such a natural emotion but to embrace it. Only when embracing what society has taught you to hinder, is when you realize your own identity. We encourage media, security experts, and other interested individuals to explore our leaks. Foxconn did have an appropriate firewall, but fortunately to our intent, we were able to bypass it almost flawlessly. Of course with funding ourselves we did have our limitations. But with several hacking techniques employed, and a couple of days in time, we were able to dump most of everything of significance. We now appropriately give consent to other individuals reading this release, to scavenge through the leaks acquiring usernames and passwords; while attempting to find if they use the passwords anywhere else. Remember damage is bliss. Without further undue, the leaks. The Hackers with Swagger, Swagg Security