Skip to content

Commit

Permalink
[threat-actors] Add Daixin Team
Browse files Browse the repository at this point in the history
  • Loading branch information
Mathieu4141 committed Dec 2, 2023
1 parent 44c270e commit 0391d3f
Showing 1 changed file with 14 additions and 0 deletions.
14 changes: 14 additions & 0 deletions clusters/threat-actor.json
Original file line number Diff line number Diff line change
Expand Up @@ -13625,6 +13625,20 @@
},
"uuid": "dae45b1c-f957-4242-aa5b-f36b08994bad",
"value": "ScamClub"
},
{
"description": "Daixin is a threat actor group that has been active since at least June 2022. They primarily target the healthcare and public health sector with ransomware attacks, stealing sensitive data and threatening to release it if a ransom is not paid. They have successfully targeted various industries, including healthcare, aerospace, automotive, and packaged foods. Daixin gains initial access through VPN servers and exploits vulnerabilities or uses phishing attacks to obtain credentials. They have been responsible for cyberattacks on organizations such as the North Texas Municipal Water District and TransForm Shared Service Org, impacting their networks and stealing customer and patient information.",
"meta": {
"refs": [
"https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-294a",
"https://www.mycert.org.my/portal/details?menu=431fab9c-d24c-4a27-ba93-e92edafdefa5&id=467c2374-9c18-4fb0-b5a7-155dfca4d611",
"https://www.databreaches.net/b-files-leaked/",
"https://titaniam.io/ransomware-prevention-daixin-team-ransomware-group/",
"https://www.databreaches.net/update-daixin-leaks-more-data-from-bluewater-health-and-other-hospitals-databases-yet-to-be-leaked/"
]
},
"uuid": "5e32baed-f4b5-4149-8540-7515ad8c4dc0",
"value": "Daixin Team"
}
],
"version": 295
Expand Down

0 comments on commit 0391d3f

Please sign in to comment.