NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the DAIXIN Onion Dark Web Tor Blog page.
More information on the DAIXIN TEAM can be found here on the CISA website:
#StopRansomware: Daixin Team | CISA
|Astra Daihatsu Motor (ID)
|PT Astra Daihatsu Motor is an automobile manufacturing company located in Jakarta, Indonesia. It’s a joint venture between Daihatsu, Astra International, and Toyota Tsusho. The company is the largest car manufacturer in Indonesia by production output and installed capacity, and has been the second best-selling car brand behind Toyota.
|AI-Generated Additional Information
|Based on the leaked post description, the following types of data or information have been compromised: 1. Internal user data – 4149 records containing internal users’ passwords (example of a “good” password policy). 2. Hiring data – 16291 records containing personal information (PII) and other sensitive information. 3. Employee personal data – 28038 records containing PII and other sensitive information. 4. Business information and emails dumps – ADM_IWS.dbo.7z, ADM_IWS.dbo.MS_VENDOR.zip, DocIncident.zip, TB_TRX_EmailHistory.7z, tx_email.7z. It is important to note that this analysis does not include any personally identifiable information (PII) or personal details, and no attempt has been made to access or analyze the contents of the leaked files. Additionally, it is not possible to determine whether the leaked data contains any sensitive information without further context. It is recommended that the affected organization takes appropriate measures to investigate and address the incident, including assessing the scope of the leak and notifying potentially impacted individuals.
|Victim Website (if available)
All descriptions are generated by a Large Language Model (LM) and are automatically generated based on the content of the leaked post descriptions. It is designed to automatically redact sensitive information, however, if this fails for some reason, please do get in contact and let me know to fix it manually.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.