DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Update: Daixin leaks more data from Bluewater Health and other hospitals; databases yet to be leaked

Posted on November 3, 2023 by Dissent

As some will likely have already noticed, Daixin Team released the second part of the data leak from five hospitals in Ontario that have IT services provided by TransForm SSO. The first leak, containing many patient records, was previously reported by DataBreaches on November 1.

Skimming the second tranche,  DataBreaches noted a lot of internal hospital files such as forms and administrative matters. There were some files with employee information, and in that regard, DataBreaches was pleased to observe that some files that likely had sensitive employee-related information like disciplinary matters were password-protected.

DataBreaches also noted that this tranche also contained patient data, but not the kinds of scanned files as in the first tranche. This tranche included records concerning COVID-19 vaccinations with patients’ names, dates, and in some cases, a bit of their reactions or history to vaccinations.  Other patient-related files that DataBreaches noted involved named patients’ medications and suggestions for medications. Those files, in the form of worksheets and suggestion documents included the patients’ names, diagnoses, dates, names and doses of medications, and comments related to the medication regimen for the patient.

DataBreaches did not go through all the files so there may be other files with patient information or employee information in addition to what is described above.

According to Daixin’s listing for this incident, there are more data to be leaked. Unlike some ransomware groups that threaten to leak immediately and then do not,  Daixin Team has been extremely consistent — once they start to leak — and they start to leak as soon as a deadline passes —  they don’t wait a long time between the leaks. Based on their pattern, DataBreaches expects to see the third leak and then the databases dump within days.  As they say, the full leak will be soon.

But that said, DataBreaches notes that the “full leak” may not actually include all of the data they acquired. According to statements made to DataBreaches today by their spokesperson, they have been considering different strategies for dealing with victims who do not pay, and they may be selling some of the data rather than leaking it. When asked whether they would sell the data on a forum or market, they indicated that it would be a bulk sale to data brokers who can resell it to scammers and other groups.

“Where the data will be sold to, I don’t know,” they told DataBreaches. “Brokers will receive it directly from us, and then it is no longer our concern.”

Whether Daixin will actually follow through on this is unknown to DataBreaches, and from their description, DataBreaches would likely have no way to verify any such sale unless someone later provided this site with data or proof of sale.

Would Daixin just say that to try to pressure victims into paying? Perhaps, but that ship has already sailed for TransForm and these hospitals. Perhaps it’s being said now for the benefit of future victims to consider. DataBreaches really doesn’t know, but will continue to monitor this situation.


Related:

  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • Romanian prisoner hacks prison IT system in plot made for a Netflix movie
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • UK: 'Catastrophic' attack as Russians hack files on EIGHT MoD bases and post them on the dark web
  • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
  • Heritage Provider Network $49.99M Class Action Settlement
Category: Health DataNon-U.S.Subcontractor

Post navigation

← United States Recovers $2.4 Million Obtained In Business Email Compromise
Summit Health has hundreds of locations. Were they victims of a cyberattack by LockBit3.0? →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says
  • The Case for Making EdTech Companies Liable Under FERPA
  • NHS providers reviewing stolen Synnovis data published by cyber criminals

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.