Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Matrix Botnet

Daixin Ransomware – Threat Actor

February 10, 2025
Reading Time: 5 mins read
in Threat Actors
Daixin Ransomware – Threat Actor

Daixin Ransomware

Other Names

Daixin Team

Date of Initial Activity

2022

Location

Unknown

Suspected Attribution 

Ransomware Group

Motivation

Data Theft
Financial Gain

Software

Windows
Database

Overview

The Daixin ransomware group is a financially motivated cybercrime organization that has rapidly emerged as a significant threat since its inception in June 2022. Known for its sophisticated tactics and targeted attacks, Daixin has predominantly focused on sectors with critical operational dependencies, most notably the US Healthcare and Public Health (HPH) sector. This group’s activities have led to the compromise of electronic health records (EHRs), personally identifiable information (PII), patient health information (PHI), and the disruption of essential healthcare services. By leveraging double extortion techniques, Daixin encrypts critical files while threatening to release stolen data, placing immense pressure on victims to comply with their demands. Although healthcare has been a primary target, Daixin has demonstrated its ability to attack diverse industries. Notable incidents include the 2022 breach of Malaysia’s AirAsia Group, which exposed the personal data of over five million passengers and employees, and the 2023 compromise of B&G Foods, a multibillion-dollar conglomerate. In both cases, the victims refused to pay the ransom, prompting Daixin to publicly release sensitive data on its leak site. These attacks underscore the group’s capacity to cause widespread operational and reputational harm. Daixin’s technical sophistication is another hallmark of its operations. The group typically gains initial access to networks through vulnerabilities in virtual private network (VPN) servers or by exploiting weak credentials obtained via phishing campaigns. Once inside, Daixin uses advanced lateral movement techniques to infiltrate systems and exfiltrate sensitive data. Its encryption methods, based on the Babuk Locker strain, target critical systems, including VMware ESXi servers, rendering virtual machines and databases inoperable. These multi-layered attack strategies make Daixin a formidable adversary for cybersecurity teams.

Common targets

Health Care and Social Assistance

Transportation and Warehousing – United States

Malaysia

Attack Vectors

Software Vulnerabilities

Remote Desktop Protocol (RDP)

How they operate

Initial access is a cornerstone of Daixin’s strategy. The group predominantly targets virtual private network (VPN) servers, exploiting misconfigurations and vulnerabilities to penetrate enterprise defenses. In cases where software flaws are unavailable, they turn to phishing campaigns aimed at extracting login credentials from unsuspecting employees. By compromising VPN access points, Daixin bypasses perimeter defenses and establishes a foothold in the victim’s environment, from which they stage their multi-pronged attack. Once inside the network, Daixin focuses on reconnaissance and lateral movement. The group conducts a thorough exploration of the compromised environment, using advanced tools to harvest credentials and map the internal network. Stolen credentials often facilitate lateral movement via Secure Shell (SSH) and Remote Desktop Protocol (RDP), enabling Daixin to navigate through critical systems. Their choice of utilities, including Rclone for cloud storage management and Ngrok for establishing reverse proxies, underscores their technical acumen in securely exfiltrating data while avoiding detection. Data encryption and exfiltration represent the final stages of Daixin’s attack lifecycle. Leveraging a ransomware module based on the Babuk Locker strain, they encrypt files using ChaCha8 algorithms, rendering them inaccessible to victims. For larger files, Daixin employs segmented encryption techniques to optimize performance while ensuring file integrity is irreversibly compromised. They also target VMware ESXi servers, resetting administrative credentials and encrypting virtual machine files, further crippling victim operations. Stolen data is then used as leverage in double-extortion schemes, where organizations are pressured to pay ransom demands under the threat of public exposure. The Daixin ransomware group exemplifies the evolving complexity of modern ransomware campaigns. Their blend of technical sophistication and psychological manipulation poses significant challenges to organizations and cybersecurity teams. By understanding their operational methods, enterprises can better prepare to defend against this persistent threat, emphasizing proactive measures such as patch management, credential security, and network segmentation.

MITRE Tactics and Techniques

1. Initial Access
Technique: Exploit Public-Facing Application (T1190) Daixin Team exploits vulnerabilities in virtual private network (VPN) servers to gain initial access to target networks. Technique: Phishing (T1566) They use phishing campaigns to harvest VPN credentials from employees of targeted organizations.
2. Execution
Technique: Command and Scripting Interpreter (T1059) The group uses scripts and commands for deploying ransomware and lateral movement.
3. Persistence
Technique: Valid Accounts (T1078) Stolen credentials allow Daixin Team to maintain access to compromised networks.
4. Privilege Escalation
Technique: Valid Accounts (T1078) Leveraging stolen credentials with elevated privileges for further actions within the network.
5. Defense Evasion
Technique: Obfuscated Files or Information (T1027) The group employs obfuscation techniques to bypass detection mechanisms. Technique: Indicator Removal on Host (T1070) They delete logs or other traces of their activities to avoid detection.
6. Credential Access
Technique: Credential Dumping (T1003) Daixin extracts credentials stored within systems to facilitate lateral movement.
7. Discovery
Technique: System Network Configuration Discovery (T1016) Conducts reconnaissance to map out the target network and identify key systems. Technique: Remote System Discovery (T1018) Identifies accessible systems for lateral movement.
8. Lateral Movement
Technique: Remote Services (T1021) Uses protocols like SSH and RDP for lateral movement within the network.
9. Collection
Technique: Data from Information Repositories (T1213) Targets databases and shared drives containing sensitive information.
10. Exfiltration
Technique: Exfiltration Over Alternative Protocol (T1048) Utilizes tools like Rclone and Ngrok to transfer stolen data to external servers.
11. Impact
Technique: Data Encrypted for Impact (T1486) Deploys ransomware to encrypt critical files and systems, including VMware ESXi servers. Technique: Service Stop (T1489) Terminates services to facilitate encryption of files in use.  
References:
  • Daixin Team
Tags: DaixinDaixin RansomwareDaixin TeamHealthcareMalaysiaRansomwareThreat ActorsUnited StatesVPNVulnerabilities
ADVERTISEMENT

Related Posts

Storm-1811 (Cybercriminal) – Threat Actor

Storm-1811 (Cybercriminal) – Threat Actor

March 2, 2025
CopyCop (State-Sponsored) – Threat Actor

CopyCop (State-Sponsored) – Threat Actor

March 2, 2025
Storm-0539 – Threat Actor

Storm-0539 – Threat Actor

March 2, 2025
Void Manticore (Storm-0842) – Threat Actor

Void Manticore (Storm-0842) – Threat Actor

March 2, 2025
Unfading Sea Haze – Threat Actor

Unfading Sea Haze – Threat Actor

March 2, 2025
Ikaruz Red Team – Threat Actor

Ikaruz Red Team – Threat Actor

March 2, 2025

Latest Alerts

CoGUI Targets Consumer and Finance Brands

COLDRIVER Hackers Target Sensitive Data

Cisco Fixes Flaw in IOS Wireless Controller

New OttoKit Flaw Targets WordPress Sites

Mirai Botnet Exploits Vulnerabilities in IoT

Critical Kibana Flaws Allows Code Execution

Subscribe to our newsletter

    Latest Incidents

    Masimo Cyberattack Disrupts Manufacturing

    Cyberattack Targets Tepotzotlán Facebook

    West Lothian Schools Hit by Ransomware

    UK Legal Aid Agency Faces Cyber Incident

    South African Airways Hit by Cyberattack

    Coweta County School System Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial