CISA Warns of Daxin Team Ransomware Group Targeting the Healthcare and Public Health Sector via VPNs



Ransomware Group TargetThis new group makes the case that – as with any market – cybercriminals will focus on a niche sector they are experts on in order to improve their chances of success.

Haven’t heard of Daxin Team? That’s probably because they’re doing what most new businesses do in a saturated market: focus on a subset of that market. In Daxin Team’s case, it’s a two-pronged definition, according to a recent alert from the Cybersecurity & Infrastructure Security Agency:

  • They are targeting the Healthcare and Public Health (HPH) Sector
  • They are focused on gaining initial access to victims through unpatched vulnerabilities in virtual private network (VPN) servers

The targeting of the HPH sector isn’t the interesting part; the initial access is. Historically, RDP compromise and phishing-based attacks have been flip-flopping 1st position as the most-used initial attack vector since 2018, according to ransomware response vendor Coveware. What’s fascinating is that the Coveware data shows a steady incline in the use of software vulnerabilities – something that includes vulnerabilities on VPN servers. The Daxin Team gang is a great practical example of that – and why organizations need to ensure every system that is externally accessible in any way possible is kept completely up to date.

But with phishing still the dominant leader in initial attack vectors, it’s equally necessary to make certain users aren’t engaging with potentially malicious content in email and on the web – something taught using continual Security Awareness Training.


RanSim

Free downloadable software tool

Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

RanSim gives you a quick look at the effectiveness of your existing network protection. RanSim will test 24 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

RansIm-Monitor3Here's how it works:

  • 100% harmless simulation of real ransomware and cryptomining infections
  • Does not use any of your own files
  • Tests 25 types of infection scenarios
  • Just download the installer and run it
  • Results in a few minutes!

Get RanSim!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

https://www.knowbe4.com/ransim

Topics: Ransomware



Subscribe to Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews