Skip to content

Guangdong Medical University Affiliated Hospital Database Allegedly for Sale with 1.4GB of Patient and Clinical Data

Dark Web Informer - Cyber Threat Intelligence

Guangdong Medical University Affiliated Hospital Database Allegedly for Sale with 1.4GB of Patient and Clinical Data

China
Healthcare / Education

🧩 Standalone API Access Now Available

Access high-volume threat-intelligence data, automated ingestion endpoints, ransomware feeds, IOC data, and more.

View API Access

Unlock Exclusive Cyber Threat Intelligence

Powered by DarkWebInformer.com

Foundational access to breach intelligence. Track breaches, leaks, and threats in real time with high quality screenshots and concise expert summaries.

📚
5,100+ Blog Posts (PRO/ELITE)
Continuously updated breach reports and threat summaries.
📢
52,200+ Alerts (PRO/ELITE)
Daily breach, leak, and DDoS alerts.
📤
Unredacted Threat Feed
Live tracking with JSON export.
🔍
Leak and Breach Coverage
Direct access to claims and posts.
📡
Snippets and Quick Facts
Concise summaries of DDoS, defacements, and breaches.
🌐
500+ Onion and Clearnet Resources
Verified index of dark web sites and services.
📊
Real Time Uptime Dashboard
Live status of 500+ sites.
🤖
Whiteintel.io API
Integrated checks inside breach posts.
🖼️
High Resolution Images
Uncompressed, watermark free evidence.
🔑
Keyword Notifications
Browser alerts for tracked terms.

Quick Facts

Date and Time of Alert
2026-01-20 13:16:22 UTC
Threat Actor
aming
Victim Country
China (Guangdong Province)
Industry
Healthcare / Education
Victim Org.
Guangdong Medical University Affiliated Hospital (广东医科大学附属医院)
Victim Site
en.gdmu.edu.cn
Category
Data Breach (For Sale)
Severity
Medium
Network
Clear Web
Database Size
1.4 GB
Data Period
May 21, 2025 → December 15, 2025
Database Backup Date
December 23, 2025

Incident Overview

A threat actor operating under the handle "aming" claims to be selling a MySQL database backup from Guangdong Medical University Affiliated Hospital (广东医科大学附属医院), a major comprehensive tertiary Grade A hospital (三级甲等医院) located in Zhanjiang, Guangdong Province, China. The hospital serves as a primary medical, teaching, and research center in the region and includes a comprehensive hemodialysis center.

According to the detailed "Database Institution Ownership Analysis Report" posted by the threat actor, the database file is named `mysql_full_20251223_012617.sql`, is 1.4GB in size, uses MySQL version 5.7.36, and was created using mysqldump 10.13. The data period spans May 21, 2025 to December 15, 2025 with a backup date of December 23, 2025. The database supports a Hemodialysis Clinical Management System with capabilities including real-time patient monitoring during dialysis sessions, medication order management, clinical communication and alerts, medical record keeping, and compliance reporting. Key identifiers include Tenant ID 20071, Hospital ID 20071001. The post includes evidence chain analysis showing 50+ patient records in the `hd_patient_pathway_info` table and 12+ recurring entries in system job logs.

This post is for subscribers on the Plus, Pro and Elite tiers

Subscribe

Already have an account? Sign In

Latest