DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Update: Daixin leaks more data from Bluewater Health and other hospitals; databases yet to be leaked

Posted on November 3, 2023 by Dissent

As some will likely have already noticed, Daixin Team released the second part of the data leak from five hospitals in Ontario that have IT services provided by TransForm SSO. The first leak, containing many patient records, was previously reported by DataBreaches on November 1.

Skimming the second tranche,  DataBreaches noted a lot of internal hospital files such as forms and administrative matters. There were some files with employee information, and in that regard, DataBreaches was pleased to observe that some files that likely had sensitive employee-related information like disciplinary matters were password-protected.

DataBreaches also noted that this tranche also contained patient data, but not the kinds of scanned files as in the first tranche. This tranche included records concerning COVID-19 vaccinations with patients’ names, dates, and in some cases, a bit of their reactions or history to vaccinations.  Other patient-related files that DataBreaches noted involved named patients’ medications and suggestions for medications. Those files, in the form of worksheets and suggestion documents included the patients’ names, diagnoses, dates, names and doses of medications, and comments related to the medication regimen for the patient.

DataBreaches did not go through all the files so there may be other files with patient information or employee information in addition to what is described above.

According to Daixin’s listing for this incident, there are more data to be leaked. Unlike some ransomware groups that threaten to leak immediately and then do not,  Daixin Team has been extremely consistent — once they start to leak — and they start to leak as soon as a deadline passes —  they don’t wait a long time between the leaks. Based on their pattern, DataBreaches expects to see the third leak and then the databases dump within days.  As they say, the full leak will be soon.

But that said, DataBreaches notes that the “full leak” may not actually include all of the data they acquired. According to statements made to DataBreaches today by their spokesperson, they have been considering different strategies for dealing with victims who do not pay, and they may be selling some of the data rather than leaking it. When asked whether they would sell the data on a forum or market, they indicated that it would be a bulk sale to data brokers who can resell it to scammers and other groups.

“Where the data will be sold to, I don’t know,” they told DataBreaches. “Brokers will receive it directly from us, and then it is no longer our concern.”

Whether Daixin will actually follow through on this is unknown to DataBreaches, and from their description, DataBreaches would likely have no way to verify any such sale unless someone later provided this site with data or proof of sale.

Would Daixin just say that to try to pressure victims into paying? Perhaps, but that ship has already sailed for TransForm and these hospitals. Perhaps it’s being said now for the benefit of future victims to consider. DataBreaches really doesn’t know, but will continue to monitor this situation.

Category: Health DataNon-U.S.Subcontractor

Post navigation

← United States Recovers $2.4 Million Obtained In Business Email Compromise
Summit Health has hundreds of locations. Were they victims of a cyberattack by LockBit3.0? →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Mysterious leaker GangExposed outs Conti kingpins in massive ransomware data dump
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • Class action settlement following ransomware attack will cost Fred Hutchinson Cancer Center about $52 million
  • Comstar LLC agrees to corrective action plan and fine to settle HHS OCR charges
  • Australian ransomware victims now must tell the government if they pay up
  • U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
  • Victoria’s Secret takes down website after security incident
  • U.S. Government Employee Arrested for Attempting to Provide Classified Information to Foreign Government
  • St. Cloud Provides Update on Ransomware Attack in 2024
  • Bradford Health Systems detected abnormal network activity in December 2023. They first sent out breach notices this week.

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.
  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare
  • Nebraska Bans Minor Social Media Accounts Without Parental Consent
  • Trump Taps Palantir to Compile Data on Americans
  • The US Is Storing Migrant Children’s DNA in a Criminal Database

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.