[SINOBI] – Ransomware Victim: Middlesex Endodontics

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the SINOBI Onion Dark Web Tor Blog page.

Ransomware group:
SINOBI
Victim name:
MIDDLESEX ENDODONTICS

AI Generated Summary of the Ransomware Leak Page

On November 9, 2025, a leak post attributed to the Sinobi ransomware group identified Middlesex Endodontics as a victim. The entry labels the clinic by name and presents a general profile of the healthcare practice rather than technical breach details. Middlesex Endodontics is described as an established provider offering a range of endodontic services, including root canal therapy, pediatric endodontics, retreatment, endodontic surgery, and implants, with same-day emergency appointments and extended hours. The post notes the practice operates at two locations in Massachusetts, but exact street addresses are redacted to protect PII. The data does not clearly indicate whether encryption occurred or data exfiltration took place, and no ransom amount is disclosed. A claim URL is present on the leak page, though the linked content is not detailed in the provided data. The post date is the publication date: November 9, 2025.

From the available data, there are no images, screenshots, or downloadable files accompanying the leak entry (no media is listed). The page language appears in English, and any emails, phone numbers, or street addresses have been redacted, while the victim name remains intact. The text centers on the clinic’s services, history, and business profile rather than technical breach specifics, with the attacker label (Sinobi) noted and a claim URL present for further information. No explicit ransom figure or encryption status is disclosed in the supplied data. The post date, used as the reference point for the leak, is November 9, 2025.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features