Daixin is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 21 public victims claimed by this operator between August 3, 2022 and September 11, 2025. Daixin is a ransomware group that emerged in August 2022, operating with primarily financial motivations and demonstrating a particular focus on critical infrastructure sectors. The group's origin and specific affiliations remain unclear from publicly documented sources, though their targeting patterns suggest sophisticated operational capabilities and potential access to healthcare sector vulnerabilities. Daixin employs typical ransomware attack methodologies including data exfiltration prior to encryption, implementing double extortion tactics to pressure victims into payment by threatening to release stolen sensitive information alongside system encryption. The group has demonstrated a pronounced targeting preference for healthcare organizations, which represents a significant portion of their documented victims, alongside government entities and financial services organizations. Their geographic focus centers heavily on the United States while also targeting victims across Indonesia, the United Arab Emirates, Germany, and Canada, indicating either broad operational reach or collaboration with regional affiliates. With 21 documented victims since their emergence, Daixin represents a relatively newer but active threat actor in the ransomware landscape. Current intelligence suggests the group remains operationally active as of recent assessments, continuing to pose threats to critical infrastructure sectors, particularly healthcare organizations that may be viewed as high-value targets due to the sensitive nature of their data and operational dependencies.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.