• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Smart Buses flaws expose vehicles to tracking, control, and spying

 | 

MedusaLocker ransomware group is looking for pentesters

 | 

Google confirms Salesforce CRM breach, faces extortion threat

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 57

 | 

Security Affairs newsletter Round 536 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Embargo Ransomware nets $34.2M in crypto since April 2024

 | 

Germany limits police spyware use to serious crimes

 | 

Phishing attacks exploit WinRAR flaw CVE-2025-8088 to install RomCom

 | 

French firm Bouygues Telecom suffered a data breach impacting 6.4M customers

 | 

Columbia University data breach impacted 868,969 people

 | 

SonicWall dismisses zero-day fears after Ransomware probe

 | 

Air France and KLM disclosed data breaches following the hack of a third-party platform

 | 

CISA, Microsoft warn of critical Exchange hybrid flaw CVE-2025-53786

 | 

Microsoft unveils Project Ire: AI that autonomously detects malware

 | 

CERT-UA warns of UAC-0099 phishing attacks targeting Ukraine’s defense sector

 | 

Over 100 Dell models exposed to critical ControlVault3 firmware bugs

 | 

How CTEM Boosts Visibility and Shrinks Attack Surfaces in Hybrid and Cloud Environments

 | 

WhatsApp cracks down on 6.8M scam accounts in global takedown

 | 

Trend Micro fixes two actively exploited Apex One RCE flaws

 | 

U.S. CISA adds D-Link cameras and Network Video Recorder flaws to its Known Exploited Vulnerabilities catalog

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Cyber Crime
  • Hacking
  • Malware
  • Five Canadian Hospitals impacted by a ransomware attack on TransForm provider

Five Canadian Hospitals impacted by a ransomware attack on TransForm provider

Pierluigi Paganini November 08, 2023

Five Canadian hospitals were victims of a ransomware attack, threat actors claim to have stolen data from them and leaked them.

Five Canadian hospitals revealed they were victims of ransomware attacks after threat actors leaked alleged stolen data.

The impacted hospitals are Bluewater Health, Chatham-Kent Health Alliance, Erie Shores HealthCare, Hôtel-Dieu Grace Healthcare, and Windsor Regional Hospital. The hospitals were impacted by the ransomware attack that hit the local service provider TransForm Shared Service Organization in October.

TransForm is a non-profit group that provides IT services to the above hospitals.

The organization has discovered that threat actors breached a file server that hosted employee data and also shared a drive with the impacted hospitals.

TransForm announced that it does not plan to pay the ransom.

“We did not pay a ransom and we are aware that data connected to the cyber incident has been published.”  reads the statement from the company.

The company notified law enforcement authorities, including local police departments, Ontario Provincial Police, Interpol and the FBI, and all relevant regulatory organizations including the Ontario Information and Privacy Commissioner.

The investigation into the incident is still ongoing, the company has yet to determine the scope of the security breach.

Bluewater Health hospital confirmed that threat actors stole a database containing information on 5.6 million patient visits, while the number of impacted patients is approximately 267,000. Chatham-Kent Health Alliance reported that threat actors had access to data belonging to 1446 employees who worked in the hospital as of February 2021. Exposed data Includes names, addresses, social insurance numbers, gender, marital status, date of birth, and rates of pay.

The attackers also stole a “limited set” data from Erie Shoes HealthCare including 352 current and past employee social insurance numbers (SIN).

“Windsor Regional Hospital: Officials say a limited portion of a shared drive used by staff some patients were identified, either by name only or with a brief summary of their medical conditions. The information does not include any patient charts or electronic medical records. Information pertaining to some employees, like staff schedules, was affected, but WRH believes no SINs or banking information was taken.” reported CBC. “Hôtel-Dieu Grace Healthcare in Windsor: The breached shared drive included some patient information the hospital is still analyzing. Some employee information was stolen, but the hospital says that does not include SINs or banking information.”

The extortion group DAIXIN Team claimed responsibility for the attack and started publishing stolen data on its Tor leak site on November 1st, 2023.

Canadian Hospitals ransomware

 A second batch of data, including COVID-19 vaccine records, was published on Friday and on Sunday the group published a third round of data.

In October, CISA, the FBI, and the Department of Health and Human Services (HHS) warned that the Daixin Team cybercrime group is actively targeting U.S. businesses, mainly in the Healthcare and Public Health (HPH) Sector, with ransomware operations.

The Daixin Team is a ransomware and data extortion group that has been active since at least June 2022. The group focused on the HPH Sector with ransomware operations that aimed at deploying ransomware and exfiltrating personal identifiable information (PII) and patient health information (PHI) threatening to release the stolen data if a ransom is not paid.

The Daixin Team group gains initial access to victims through virtual private network (VPN) servers. In one successful attack, the attackers likely exploited an unpatched vulnerability in the organization’s VPN server. In another compromise, the group leveraged on compromised credentials to access a legacy VPN server. The threat actors obtained the VPN credentials through phishing attacks.

After gaining access to the target’s VPN server, Daixin actors move laterally via Secure Shell (SSH) and Remote Desktop Protocol (RDP). 

The alert published by the federal agencies includes indicators of compromise (IOCs) and MITRE ATT&CK tactics and techniques.

​The attackers use to escalate privileges through various methods, such as credential dumping and pass the hash, to deliver the ransomware.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Canadian Hospitals)


facebook linkedin twitter

Canada Cybercrime Daixin Team healthcare hospitals information security news IT Information Security malware Pierluigi Paganini ransomware Security Affairs

you might also like

Pierluigi Paganini August 11, 2025
Smart Buses flaws expose vehicles to tracking, control, and spying
Read more
Pierluigi Paganini August 11, 2025
MedusaLocker ransomware group is looking for pentesters
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Smart Buses flaws expose vehicles to tracking, control, and spying

    Hacking / August 11, 2025

    MedusaLocker ransomware group is looking for pentesters

    Hacking / August 11, 2025

    Google confirms Salesforce CRM breach, faces extortion threat

    Data Breach / August 10, 2025

    SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 57

    Breaking News / August 10, 2025

    Security Affairs newsletter Round 536 by Pierluigi Paganini – INTERNATIONAL EDITION

    Breaking News / August 10, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT