mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-26 16:57:18 +00:00
[threat-actors] Add Daixin Team
This commit is contained in:
parent
44c270e9dc
commit
0391d3f3a5
1 changed files with 14 additions and 0 deletions
|
@ -13625,6 +13625,20 @@
|
|||
},
|
||||
"uuid": "dae45b1c-f957-4242-aa5b-f36b08994bad",
|
||||
"value": "ScamClub"
|
||||
},
|
||||
{
|
||||
"description": "Daixin is a threat actor group that has been active since at least June 2022. They primarily target the healthcare and public health sector with ransomware attacks, stealing sensitive data and threatening to release it if a ransom is not paid. They have successfully targeted various industries, including healthcare, aerospace, automotive, and packaged foods. Daixin gains initial access through VPN servers and exploits vulnerabilities or uses phishing attacks to obtain credentials. They have been responsible for cyberattacks on organizations such as the North Texas Municipal Water District and TransForm Shared Service Org, impacting their networks and stealing customer and patient information.",
|
||||
"meta": {
|
||||
"refs": [
|
||||
"https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-294a",
|
||||
"https://www.mycert.org.my/portal/details?menu=431fab9c-d24c-4a27-ba93-e92edafdefa5&id=467c2374-9c18-4fb0-b5a7-155dfca4d611",
|
||||
"https://www.databreaches.net/b-files-leaked/",
|
||||
"https://titaniam.io/ransomware-prevention-daixin-team-ransomware-group/",
|
||||
"https://www.databreaches.net/update-daixin-leaks-more-data-from-bluewater-health-and-other-hospitals-databases-yet-to-be-leaked/"
|
||||
]
|
||||
},
|
||||
"uuid": "5e32baed-f4b5-4149-8540-7515ad8c4dc0",
|
||||
"value": "Daixin Team"
|
||||
}
|
||||
],
|
||||
"version": 295
|
||||
|
|
Loading…
Reference in a new issue