• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

CISA Warns Against Ransomware Group Daixin Team Targeting Health Organizations

You are here: Home / General Cyber Security News / CISA Warns Against Ransomware Group Daixin Team Targeting Health Organizations
October 24, 2022

The Cybersecurity and Infrastructure Security Agency (CISA) has released a new joint Cybersecurity Advisory (CSA) warning corporations from the ransomware and information extortion group Daixin Crew.

Posted in conjunction with the Federal Bureau of Investigation (FBI) and the Division of Wellness and Human Solutions (HHS), the CSA said Daixin Staff is actively focusing on US organizations, primarily in the Health care and Public Wellbeing (HPH) Sector.

“The Daixin Crew is a ransomware and data extortion team that has focused the HPH Sector with ransomware and facts extortion functions considering the fact that at the very least June 2022,” reads the advisory. 

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“Due to the fact then, Daixin Crew cybercrime actors have prompted ransomware incidents at many HPH Sector companies.”

According to CISA, these functions saw the deployment of ransomware to encrypt servers liable for healthcare expert services as perfectly as the exfiltration of individually identifiable details (PII) and guarded wellness information and facts (PHI), which was then threatened to be launched if a ransom was not paid.

“Of the several significant-profile cyber-attacks to make headlines in the previous handful of decades, few provoke a sensation of worry like ransomware attacks on hospitals and healthcare establishments,” Dr. Darren Williams, Blackfog CEO, informed Infosecurity. “With patients’ life on the line and a prosperity of amazingly delicate information, these organizations present a persuasive goal for ruthless cyber-criminals.”

The advisory explains that Daixin actors usually acquired first entry to victims by way of digital private network (VPN) servers, then moved laterally through Protected Shell (SSH) and Remote Desktop Protocol (RDP).

“In accordance to third-party reporting, the Daixin Team’s ransomware is primarily based on leaked Babuk Locker supply code,” CISA stated. “In addition to deploying ransomware, Daixin actors have exfiltrated facts […] from target methods. In 1 verified compromise, the actors utilized Rclone.”

To secure from Daixin and connected malicious action, FBI, CISA and HHS urged HPH Sector businesses to install updates for functioning systems, software and firmware as shortly as they come to be available.

“Prioritize patching VPN servers, distant access software package, digital machine software, and recognized exploited vulnerabilities. Think about leveraging a centralized patch management process to automate and expedite the method,” CISA wrote.

The agency has also prompt the use of phishing-resistant multi-factor authentication (MFA) for as many services as feasible.

A entire list of mitigations, together with prevention actions, is available in the advisory’s unique textual content. Its publication comes around a month right after a report from Proofpoint joined cyber-attacks in opposition to healthcare corporations with larger increased mortality rates for patients.


Some pieces of this short article are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News Multiple RCE Vulnerabilities Discovered in Veeam Backup & Replication App
Next Post: Download eBook: Top virtual CISOs share 7 tips for vCISO service providers download ebook: top virtual cisos share 7 tips for vciso»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections

Copyright © TheCyberSecurity.News, All Rights Reserved.