Ransomware victim disclosure
← All victimsPindrop Hearing
listed as pindrophearing.co.uk · Claimed by apt73 · listed 24 days ago
Status timeline
- Listed
Apr 27, 2026
- Data leaked
At a glance
- Group
- apt73
- Status
- Data leaked
- Country
- GB
- Sector
- Healthcare
- Listed on leak site
- Apr 27, 2026
About the victim
AI dossier — public-source company profilePindrop Hearing is a CQC-registered independent audiology practice based in London, UK, operating multiple clinics including Harley Street, Winchmore Hill, Chelsea, and Spire Bushey Hospital. The practice offers comprehensive hearing assessments, hearing aid fitting, ear wax removal, paediatric audiology, tinnitus rehabilitation, and vestibular assessments. It holds over 900 Google reviews averaging 4.9/5 and has over 20 years of clinical experience.
- Industry
- Audiology & Hearing Healthcare
- Address
- 41 Harley Street, London W1G 8QH
Attack summary
Severity: critical — Pindrop Hearing is a CQC-regulated healthcare provider handling sensitive patient medical and audiological data including minors (paediatric audiology). Data publication by the threat actor confirms exfiltration of regulated health information (special category data under UK GDPR/NHS frameworks), meeting the critical threshold.The ransomware group APT73 claims to have attacked Pindrop Hearing and has published data (disclosed status: data_published), asserting access to information held by this CQC-registered audiology provider. The specific data exfiltrated or encrypted is not detailed in the truncated leak post.
Data the group says was taken
AI dossier — extracted from the leak post- Patient health records
- Audiological assessment data
- Personal contact information
- Referral and clinical correspondence
- Financial/payment records
What the group claims
We’re specialists in the diagnosis and treatment of hearing conditions, but just as important i...
Sources
Source
Indexed 24 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
