Ransomware victim disclosure
← All victimscuredentalbeltontx.com
Claimed by threeam · listed 20 days ago
Status timeline
- Listed
May 1, 2026
- Data leaked
At a glance
- Group
- threeam
- Status
- Data leaked
- Country
- US
- Sector
- Healthcare
- Listed on leak site
- May 1, 2026
About the victim
AI dossier — public-source company profileCure Dental is a family and general dentistry practice located in Belton, Texas (ZIP 76513). The clinic offers a broad range of dental services including general, restorative, cosmetic, oral surgery, periodontics, Invisalign, and sedation dentistry for patients of all ages. It is a small practice with 10–19 employees and estimated annual revenue of $1M–$5M.
- Industry
- Dental Offices
- Address
- Belton, Texas 76513, US
- Employees
- 10-19
Attack summary
Severity: high — The disclosure status is 'data_published', meaning data has been actively released. As a dental office, the likely data includes protected health information (PHI) and PII of patients, which is regulated under HIPAA. Even at a small scale (10–19 employees), healthcare data exfiltration with confirmed publication warrants a high severity rating, approaching critical given the regulated nature of dental/medical records.The ThreeAM ransomware group claims to have attacked Cure Dental and has published data (disclosed status: data_published), indicating exfiltration of company and potentially patient data. No specific ransom amount or data size was stated in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Patient records
- Employee records
- Business financial data
- Personal health information (PHI)
What the group claims
Cure Dental is a company that operates in the Dental Offices industry. It employs 10to19 people and has 1Mto5M of revenue. The company is headquartered in Belton, Texas.
Sources
Source
Indexed 20 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
