Ransomware victim disclosure
← All victimsPark Dental Research
Claimed by interlock · listed 10 days ago
Status timeline
- Listed
May 11, 2026
- Data leaked
At a glance
- Group
- interlock
- Status
- Data leaked
- Country
- US
- Sector
- Healthcare
- Listed on leak site
- May 11, 2026
About the victim
AI dossier — public-source company profilePark Dental Research (pdrus.com) is a US-based supplier of technologies and materials for dental laboratories and orthodontic clinics. The company serves partners and customers in the dental and orthodontic sector. No additional detail on scale or founding date is available from the provided sources.
- Industry
- Dental Laboratory & Orthodontic Supplies
Attack summary
Severity: high — Data has been published (disclosed status: data_published), including customer PII, financial documents, and credentials. The healthcare-adjacent sector and confirmed exfiltration of sensitive business and customer data warrant a high severity rating; it falls short of critical only because the scale of PII and presence of regulated medical data (e.g., HIPAA-covered records) is not explicitly confirmed.The Interlock ransomware group claims to have exfiltrated partner and customer data, financial documents, and login credentials for various web resources, and states that this data has been made publicly available on the internet.
Data the group says was taken
AI dossier — extracted from the leak post- Partner and customer data
- Financial documents
- Login credentials for web resources
What the group claims
Park Dental Research is a supplier of technologies and materials for dental laboratories and orthodontic clinics; however, when it comes to security, it has proven to be an unreliable partner. As a result of its negligence, partner and customer data, financial documents, and login credentials for various web resources were compromised and made publicly available on the Internet.
Sources
Source
Indexed 10 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
