Apple Supplier Luxshare Hit by Major Cyberattack, Confidential Design Files Stolen

Apple’s Supply Chain Breach: Confidential Design Files Stolen in Major Cyberattack

In a significant cybersecurity incident, Luxshare, a prominent Apple supplier based in China, has fallen victim to a substantial data breach. The cybercriminal group RansomHub claims to have infiltrated Luxshare’s internal systems, exfiltrating over 1 terabyte of sensitive data. This trove reportedly includes confidential files related to Apple products, internal operational workflows, and personal information of employees involved in these projects. The breach spans several years of engineering and manufacturing data, potentially impacting both current and future Apple products.

Details of the Cyberattack

On December 15, 2025, RansomHub announced on its dark web platform that it had successfully accessed Luxshare’s internal networks, extracting a vast amount of data. The group accused Luxshare of attempting to conceal the breach and issued a warning that the stolen files would be publicly released unless the company initiated contact.

> We strongly recommend that you contact us to prevent your confidential data and project documents from being leaked, the group stated.

Scope of the Stolen Data

RansomHub asserts that the pilfered data encompasses a broad spectrum of technical and business materials from Luxshare and its major clients, including Apple, Nvidia, LG, Tesla, and others. The stolen files reportedly consist of:

– 3D CAD product models and geometric design files
– 2D manufacturing drawings and PCB layouts
– Internal engineering documents and PDFs
– Device repair guides and logistics workflows
– Shipping timelines and partner coordination records

The group indicates that the data spans from 2019 through 2025, raising concerns that information pertaining to yet-to-be-announced products may be included.

Verification of the Breach

Cybernews researchers have examined sample files provided by RansomHub as evidence of the breach. Their analysis suggests that the documents are authentic internal Luxshare files associated with Apple projects. The samples include detailed repair procedures, logistics plans, and comprehensive production workflows, illustrating the collaborative processes between Apple and Luxshare.

The samples also contain standard design and manufacturing file types, such as .dwg and Gerber files, which are essential for hardware development and assembly. Alarmingly, some files appear to contain personal information, including full names, job titles, and work email addresses of individuals involved in Apple-related projects.

Potential Implications

Even if the stolen data does not pertain to future Apple products, the ramifications of this breach are profound. Access to complete design files and manufacturing details could enable malicious actors or competitors to replicate hardware, produce counterfeit products, or bypass extensive research and development efforts. The data also reveals intricate details about device construction, component placement, and interactions between power systems and chips.

This level of detail poses significant cybersecurity risks. Attackers could analyze the layouts to identify vulnerabilities in hardware or firmware. Additionally, the leaked contact information and internal workflows could be exploited to conduct targeted phishing attacks or orchestrate further intrusions within Apple’s supply chain.

Lack of Public Response

As of now, neither Apple nor Luxshare has publicly acknowledged the attack. Luxshare is integral to the production of key Apple products, including the iPhone, Apple Watch, and AirPods. Consequently, this breach transcends a localized issue, evolving into a supply chain concern that affects one of the world’s leading technology companies and its global customer base.

The industry is closely monitoring the situation to determine the extent of the data release and to observe how Apple and Luxshare will respond. Given the magnitude of the claimed data theft, the repercussions could extend well beyond this singular incident.