DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Update: Daixin leaks more data from Bluewater Health and other hospitals; databases yet to be leaked

Posted on November 3, 2023 by Dissent

As some will likely have already noticed, Daixin Team released the second part of the data leak from five hospitals in Ontario that have IT services provided by TransForm SSO. The first leak, containing many patient records, was previously reported by DataBreaches on November 1.

Skimming the second tranche,  DataBreaches noted a lot of internal hospital files such as forms and administrative matters. There were some files with employee information, and in that regard, DataBreaches was pleased to observe that some files that likely had sensitive employee-related information like disciplinary matters were password-protected.

DataBreaches also noted that this tranche also contained patient data, but not the kinds of scanned files as in the first tranche. This tranche included records concerning COVID-19 vaccinations with patients’ names, dates, and in some cases, a bit of their reactions or history to vaccinations.  Other patient-related files that DataBreaches noted involved named patients’ medications and suggestions for medications. Those files, in the form of worksheets and suggestion documents included the patients’ names, diagnoses, dates, names and doses of medications, and comments related to the medication regimen for the patient.

DataBreaches did not go through all the files so there may be other files with patient information or employee information in addition to what is described above.

According to Daixin’s listing for this incident, there are more data to be leaked. Unlike some ransomware groups that threaten to leak immediately and then do not,  Daixin Team has been extremely consistent — once they start to leak — and they start to leak as soon as a deadline passes —  they don’t wait a long time between the leaks. Based on their pattern, DataBreaches expects to see the third leak and then the databases dump within days.  As they say, the full leak will be soon.

But that said, DataBreaches notes that the “full leak” may not actually include all of the data they acquired. According to statements made to DataBreaches today by their spokesperson, they have been considering different strategies for dealing with victims who do not pay, and they may be selling some of the data rather than leaking it. When asked whether they would sell the data on a forum or market, they indicated that it would be a bulk sale to data brokers who can resell it to scammers and other groups.

“Where the data will be sold to, I don’t know,” they told DataBreaches. “Brokers will receive it directly from us, and then it is no longer our concern.”

Whether Daixin will actually follow through on this is unknown to DataBreaches, and from their description, DataBreaches would likely have no way to verify any such sale unless someone later provided this site with data or proof of sale.

Would Daixin just say that to try to pressure victims into paying? Perhaps, but that ship has already sailed for TransForm and these hospitals. Perhaps it’s being said now for the benefit of future victims to consider. DataBreaches really doesn’t know, but will continue to monitor this situation.

Category: Health DataNon-U.S.Subcontractor

Post navigation

← United States Recovers $2.4 Million Obtained In Business Email Compromise
Summit Health has hundreds of locations. Were they victims of a cyberattack by LockBit3.0? →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)
  • Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed
  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim
  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results
  • Missouri Clinic Must Give State AG Minor Trans Care Information

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.