Daixin Ransomware Victim: OakBend Medical (USA)
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the DAIXIN Onion Dark Web Tor Blog page.
More information on the DAIXIN TEAM can be found here on the CISA website:
#StopRansomware: Daixin Team | CISA
Victim Name | OakBend Medical (USA) |
AI-Generated Description | OakBend Medical is a healthcare provider focused on patient-centered medicine. They have over 450 physicians on staff and over 1,200 employees. They operate out of 274 beds across 50+ locations and serve around 8,500 inpatients and 100,000 outpatients annually, with 40,000 emergency room visits per year. |
AI-Generated Additional Information | Based on the leaked post description, the following types of data or information have been disclosed: * Database tables dump containing over 1 million records with potentially sensitive information such as Personal Identifiable Information (PII) and Protected Health Information (PHI). * Sensitive documents from internal servers. It is important to note that the provided URL seems to be associated with a Tor hidden service, which suggests that the leak may be intentionally shared by someone who wants to remain anonymous. Additionally, the file lists included in the zip file are not explicitly stated to contain PII or PHI, but it’s essential to exercise caution when handling and storing such files. |
Victim Website (if available) | hXXps://www[.]oakbendmedcenter[.]org |
All descriptions are generated by a Large Language Model (LM) and are automatically generated based on the content of the leaked post descriptions. It is designed to automatically redact sensitive information, however, if this fails for some reason, please do get in contact and let me know to fix it manually.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.