Also, the hackers weren’t after info regarding working conditions

Feb 9, 2012 08:09 GMT  ·  By

As you may have already heard, a hacker group going by the name of SwaggSec has released a dump of Foxconn’s user names and passwords for various partners, including Apple. Even Foxconn’s CEO, Terry Gou, saw his information compromised.

In a statement released after the attack, the hackers clarified that they didn’t do it to get information about the upcoming iPhone (which Foxconn could be assembling already), or things about the practices enforced by Foxconn on its suicidal workers.

No. They did it for the pure joy of bringing down such a huge infrastructure. Here’s what they had to say about their nefarious actions (emphasis ours):

“Now as a first impression Swagg Security would rather not deceive the public of our intentions,” the hackers wrote.

“Although we are considerably disappointed of the conditions of Foxconn, we are not hacking a corporation for such a reason and although we are slightly interested in the existence of an Iphone 5, we are not hacking for this reason,” they noted.

“We hack for the cyberspace who share a few common viewpoints and philosophies. We enjoy exposing governments and corporations, but the more prominent reason, is the hilarity that ensues when compromising and destroying an infrastructure. How unethical right?”, reads the SwaggSec statement.

“Perhaps for the layman who has conformed to a society raised by the government that actively seeks to maintain power and quell threats to their ventures,” SwaggSec continued.

They concluded, saying, “….to us and many others, the destruction of an infrastructure, the act of destruction that does not affect an individual, brings a sense of newfound content, a unique feeling, along with a new chance to start your own venture.”

The Foxconn server was immediately closed following the leak, but it is still unclear whether any sensitive information managed to get out.

Which is why Swagg encouraged fellow hackers around the world to sift through the dump and see if anything stands out. They even noted that the passwords inside these files could allow them to make fraudulent orders for Apple, Microsoft, IBM, and other big companies.