Ransomware victim disclosure
← All victimsKent District Library
Claimed by interlock · listed 10 days ago
Status timeline
- Listed
May 11, 2026
- Data leaked
At a glance
- Group
- interlock
- Status
- Data leaked
- Country
- US
- Sector
- Public Sector
- Listed on leak site
- May 11, 2026
About the victim
AI dossier — public-source company profileKent District Library (KDL) is a public library system serving Kent County, Michigan, operating multiple branch locations throughout the region. It provides library services including lending, digital resources, and community programming to residents of the greater Grand Rapids area. KDL is a publicly funded institution governed by a board of trustees.
- Industry
- Public Library System
- Address
- 814 West River Center Drive NE, Comstock Park, MI 49321
- Employees
- 201-500
- Founded
- 1937
Attack summary
Severity: high — Confirmed exfiltration and publication of PII for both customers and employees of a public institution, combined with sensitive operational data (building plans, incident reports) and financial records; the public-sector nature and scale of patron data elevates severity to high.The Interlock ransomware group claims to have exfiltrated confidential data from Kent District Library, including financial documents, organizational contact information, personal data on customers and employees, building plans and blueprints, and information about concealed incidents; the data has been published as disclosed status indicates.
Data the group says was taken
AI dossier — extracted from the leak post- Confidential financial documents
- Organizational contact information
- Customer personal data
- Employee personal data
- Building plans and blueprints
- Incident reports
What the group claims
Kent District Library (KDL) is a public library system that owns and operates libraries throughout Michigan. However, it does not manage its own security, which is damaging its reputation. We are providing you with confidential financial documents, contact information for organizations, personal data on customers and employees, building plans and blueprints, as well as information about various incidents that they are concealing.
Sources
Source
Indexed 10 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
