Ransomware victim disclosure
← All victimsHeavenly Dental
listed as heavenly-dental.com · Claimed by obscura · listed 7 months ago
Status timeline
- Listed
Oct 13, 2025
- Data leaked
At a glance
- Group
- obscura
- Status
- Data leaked
- Country
- United States
- Sector
- Healthcare
- Listed on leak site
- Oct 13, 2025
About the victim
AI dossier — public-source company profileHeavenly Dental is a general and family dentistry practice located in San Fernando, California, serving the greater Los Angeles area since 1985. The practice is led by Dr. S. Sean Naffas and Dr. Elham Partovi, both with USC School of Dentistry affiliations, and offers a broad range of services including cosmetic, restorative, preventive, and emergency dentistry. It serves communities across San Fernando, Pacoima, Sylmar, and surrounding areas.
- Industry
- Dental & Oral Health Services
- Address
- 103 N. Maclay Avenue, San Fernando, CA 91340
- Founded
- 1985
Attack summary
Severity: critical — The victim is a healthcare/dental practice whose data is classified as disclosed/published; exfiltrated data almost certainly includes protected health information (PHI) and personal identifiable information (PII) of patients, which constitutes regulated medical data under HIPAA, warranting a critical severity rating.The ransomware group 'obscura' claims to have published data exfiltrated from Heavenly Dental, with the leak post indicating the data has been fully published. The post references a leak of an unspecified number of gigabytes from a business with revenue under $5 million.
Data the group says was taken
AI dossier — extracted from the leak post- Patient records
- Personal health information (PHI)
- Dental treatment records
- Patient insurance and financing information
- Practice administrative data
What the group claims
Revenue: $<5kk | Leak Size: xx GB | Status: Published
Sources
Source
Indexed 7 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
