Daixin is a ransomware group that emerged in August 2022, operating with primarily financial motivations and demonstrating a particular focus on critical infrastructure sectors. The group's origin and specific affiliations remain unclear from publicly documented sources, though their targeting patterns suggest sophisticated operational capabilities and potential access to healthcare sector vulnerabilities. Daixin employs typical ransomware attack methodologies including data exfiltration prior to encryption, implementing double extortion tactics to pressure victims into payment by threatening to release stolen sensitive information alongside system encryption. The group has demonstrated a pronounced targeting preference for healthcare organizations, which represents a significant portion of their documented victims, alongside government entities and financial services organizations. Their geographic focus centers heavily on the United States while also targeting victims across Indonesia, the United Arab Emirates, Germany, and Canada, indicating either broad operational reach or collaboration with regional affiliates. With 21 documented victims since their emergence, Daixin represents a relatively newer but active threat actor in the ransomware landscape. Current intelligence suggests the group remains operationally active as of recent assessments, continuing to pose threats to critical infrastructure sectors, particularly healthcare organizations that may be viewed as high-value targets due to the sensitive nature of their data and operational dependencies. The group has been linked to 21 public disclosures across our corpus. First observed on a leak site on August 3, 2022; most recent post September 11, 2025. The operation is currently inactive.
Sector and geography
This disclosure adds to ransomware activity in the Healthcare and Public Health sector, which has 52 disclosures indexed across all operators we track. Geographically, OakBend Medical Center is reported in United States, a country with 7,392 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.