DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Exclusive: Daixin Team claims responsibility for attacks affecting Canadian hospitals, starts leaking data

Posted on November 1, 2023 by Dissent

 

On November 1, Daixin Team announced the leak of data from Bluewater Health and other entities. Image: DataBreaches.net

Daixin Team is now claiming responsibility for — and leaking data from — an attack that has significantly impacted five Canadian hospitals in Ontario.

TransForm Shared Service Organization provides IT, supply chain, and accounts payable services to Bluewater Health, Windsor Regional Hospital, Hotel Dieu Grace, Erie Shores Healthcare, Hospice of Windsor-Essex, and the Chatham-Kent Health Alliance.  According to media coverage and news releases by TransForm, a ransomware attack disrupted the hospitals’ access to Wi-Fi, email, and patient information systems.  Surgeries and appointments have reportedly been canceled or rescheduled in some cases, and patients could not be reached by phone to alert them to the interrupted services. Yesterday, CBC reported that radiation treatment for cancer patients was being transferred from Windsor and to other hospitals.

“We continue to work around the clock to restore systems, and we expect to have updates related to the restoration of our systems in the upcoming week,” TransForm said in a statement yesterday, noting that patient and employee data had been taken and were at risk of being exposed or leaked by the threat actors.

Details of the Attack Emerge

DataBreaches can now reveal more details of the attack, as shared with this site by Daixin.

As an overview: the stolen data includes database tables dump of 5.6 million+ records with personally identifiable information (PII) and protected health information (PHI). The dump includes 160 GB of sensitive documents (scan copies) from internal servers.  A filelist provides a more detailed picture of what’s in the to-be-leaked data. The first tranche of data leaked tonight on Daixin Teams’ dark web leak site involves scans of patient information that include patient records and claims information.

Here’s what DataBreaches can also report so far (some of which has been confirmed by the victims):

  • The attack was on October 23, 2023. As part of the attack, Daixin destroyed backups.
  • On October 24,  a negotiator entered the negotiation chat room. They were given a list of files and then a few files of their choosing were decrypted as proof that Daixin could decrypt them.

“They knew from the beginning that we had quite a bit of critical data from their internal resources and we weren’t bluffing,” Daixin told DataBreaches. “After much deliberation, they wrote that they were not going to pay.”

In media coverage of the incident, Ann Cavoukian had been quoted as asking a relevant question:

“Sensitive medical data is extremely problematic in the hands of the wrong people. Where I would start is, what is the strength of the security measures these hospitals had employed to begin with?,” said Ann Cavoukian, the former privacy commissioner of Ontario.

“I’m guessing, and I’m saying I’m guessing, I haven’t examined it [but] I’m guessing they weren’t very strong.”

DataBreaches put the question about TransForm’s security to Daixin, who replied:

They purchased rather expensive software to detect intruders. The chief system administrator watched the system on 6 monitors.
At first glance very good all round.

But… the administrators used the same passwords – everywhere! (possibly also on home computers, alarm, phones, etc. )

The mouse cursor on the administrator’s workstation didn’t come to life until an hour later, after all systems had been shut down and encrypted, but not for long – the monitors were switched off and the workstation’s operating system wiped.

We could have been in their system for a very long time and destroyed almost everything – down to the last device (including medical ).

We didn’t do that, we just left.

If paid, they could have all systems back up and running within a few hours.

Daixin declined to tell DataBreaches exactly how they gained access but did state that they gained access a week before they deployed the ransomware and it took them a few hours to take over the system. Given the data theft, they were in the system for several days, during which time they weren’t detected.

When DataBreaches asked them if they were still in TransForm’s system, they replied, “We’ll check it out when they fully restore their system.”

And when asked whether they were directly in the hospitals’ networks, they replied, “The networks were completely transparent – we could go anywhere.”  When DataBreaches asked if that was because of password re-use or failure to segment, or some other reason, Daixin answered, “Maybe they had some kind of segmentation, but the fact that even the wifi in the hospitals disappeared after we attacked can speak to its level. The passwords for some administrator accounts across all hospital domains were the same.”

DataBreaches asked Daixin how many files they had encrypted. They replied, “I’m assuming we’re talking about thousands of hosts.”

So how much would Transform have had to pay to get a decryptor and a report on their security to help them identify vulnerabilities that could be exploited again?  Daixin didn’t reveal the amount to DataBreaches, but stated that TransForm learned of the financial demands on the second day of the attack. There was some negotiation with BlueHealth, but Daixin’s spokesperson said they didn’t make any counteroffers. “They didn’t bargain. We’ll probably settle for $4 million,” the spokesperson said, and speculated that they might have been banned from paying.  When DataBreaches told Daixin that this site was not aware of any law that would ban payment in this situation, they replied, “If they haven’t been banned from paying then they are just really stupid and greedy. In this case, I really feel sorry for their patients.”

“Their costs will far exceed what we demanded,” Daixin added.

DataBreaches has interacted with Daixin in the past when reporting on other attacks of theirs in the medical sector such as Fitzgibbon Hospital, Columbus Regional Healthcare System, and OakBend Medical Center, DataBreaches has also reported on their attacks in other sectors. In October 2022, CISA issued an advisory on Daixin. From past exchanges with Daixin,  DataBreaches knew that they would not feel guilty about surgeries or patient care being impacted, although they would not knowingly lock any life-saving devices. Attempts to get Daixin to feel pity or remorse of any kind will totally fail.

In light of the impact the TransForm incident has had on patient care, and despite Daixin saying they really feel sorry for the patients in this case, DataBreaches was not surprised to see that the “Bluewater Health and Others” negotiator had pleaded with them to no avail, writing:

We have strongly considered your demands, but we cannot pay. We have to use our money, all of our money, for our patients. We understand that this will upset you. But please know this: cancer treatment is being cancelled. Surgeries are being postponed. Our patients are hurting. We are doing our best to restore our operations, and we will recover. But this attack has resulted in actual pain and suffering. We cannot pay, and we are asking you to delete the data and leave us alone. Our patients and staff have endured enough.

Daixin answered them, in part, by challenging their claims about costs, but then added:

Either way – we’re not upset, we’ll pour your data into our leak site after the timer expires.
We understand that money is more important to you than patients – we’re alike in that.

A screencap of part of the negotiation chat of October 31. Provided by Daixin Team to DataBreaches.net.

Daixin is leaking the data, they say, to make this situation a bad example for their next targets.  But they add,  “Perhaps we’ll move on to targeted attacks if this https://themessenger.com/tech/ransomware-us-international-hacking-ransom-pledge  is real.”

The attempt to get more governments to pledge to ban ransom payments is real but what would it involve and what would happen with hospitals where lives might be lost? Should ransom payments by government hospitals be banned, too, if governments sign a pledge?

There are a number of issues to be considered and worked out, but there is growing support for banning ransom payments, and when asked about the current incident, Brett Callow of Emsisoft commented:

“Ransomware attacks on hospitals have the potential to impact medical outcomes and represent a threat to life – and, unfortunately, we’re seeing as many attacks now as we ever did. I believe that governments need to seriously consider either banning the payment of ransom demands or at least restricting the circumstances in which they can be paid. As current counter-ransomware strategies are very clearly not working, new approaches are needed.”

Category: Breach IncidentsCommentaries and AnalysesHealth DataMalwareNon-U.S.Of Note

Post navigation

← Toronto Public Library outages caused by Black Basta ransomware attack
Town of Iowa in Louisiana victim of ransomware attack: ALPHV publishes a portion of the exfiltrated documents →

9 thoughts on “Exclusive: Daixin Team claims responsibility for attacks affecting Canadian hospitals, starts leaking data”

  1. Fuck Daixin says:
    November 2, 2023 at 7:00 pm

    Fuck Daixin. May they get exactly what is coming to them … and literally no punishment is too severe for them.

    1. Anonymous says:
      November 11, 2023 at 1:10 am

      Good luck finding them as they are professionals with roofless intentions to collect data for money. Secured and untraceable connections were used, disposable virtual Private Servers to carry out the attacks. Sorry to say “All your data belongs to us”.

  2. john doe says:
    November 3, 2023 at 3:57 pm

    Hope these losers get caught and sent to prison for a long time. Hacking private companies is one thing, but leaking hospital data that can include patient information is special level of fucked up.

  3. Anonymous says:
    November 11, 2023 at 1:15 am

    Trust me we got the story straight. It is what it is the data is our and there is nothing you can do to take it back and fix what has already been done.

    1. Dissent says:
      November 18, 2023 at 4:46 pm

      The above was not posted by the Daixin Team. It’s a fake.

  4. Daixin Team says:
    November 11, 2023 at 1:22 am

    You want to know the best secret about this story is that the warning was handed out to these organization about there security flaws but did they ever listen to us? No cause they doubted our abilities to be able to obtain the right information to make the breach possible. Simple little scan of their entire network gave us all the Mac address of each and every device in the hospitals including cellphones of patients and employees. A MAC address is a unique identifier assigned to a network interface controller for use as a network address in communications within a network segment. This use is common in most IEEE 802 networking technologies, including Ethernet, Wi-Fi, and Bluetooth. From there we can craft the packets needed to access different points of the network to a gain full access to operating systems.

    1. Dissent says:
      November 18, 2023 at 4:46 pm

      The above was not posted by the Daixin Team. It’s a fake.

  5. Daixin Team says:
    November 11, 2023 at 1:24 am

    You really want to contact us? Reach us at our disposable email for further discussion 😉

    1. Dissent says:
      November 18, 2023 at 4:46 pm

      The above was not posted by the Daixin Team. It’s a fake.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Dutch Government: More forms of espionage to be a criminal offence from 15 May onwards
  • B.C. health authority faces class-action lawsuit over 2009 data breach (1)
  • Private Industry Notification: Silent Ransom Group Targeting Law Firms
  • Data Breach Lawsuits Against Chord Specialty Dental Partners Consolidated
  • PA: York County alerts residents of potential data breach
  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Period Tracking App Users Win Class Status in Google, Meta Suit
  • AI: the Italian Supervisory Authority fines Luka, the U.S. company behind chatbot “Replika,” 5 Million €
  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.