[SINOBI] – Ransomware Victim: Phoenix Village Dental
![[SINOBI] - Ransomware Victim: Phoenix Village Dental 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the SINOBI Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
Phoenix Village Dental, a US-based healthcare provider operating as a family dentistry practice, is listed as a ransomware leak victim in the post attributed to the Sinobi threat group. The leak entry carries the timestamp 2025-10-20 18:40:24.260000; because no compromise date is provided, this timestamp should be treated as the post date. The available data does not specify whether the attack resulted in encryption of systems or a data leak, nor is any ransom amount indicated. The page notes a claim URL is present (defanged) as a mechanism to verify claims or obtain additional information; however, the summary does not show the actual link. The record shows no media on the page—images_count is 0 and there are no downloadable items. The textual content appears to be limited to a generic public-facing description of the dental practice rather than breach-specific messaging.
From a sanitization perspective, the entry preserves the victim name Phoenix Village Dental and omits other potential company references in this record. There is no non-English content in the data, and no emails, phone numbers, or addresses are presented. There are no screenshots or internal documents disclosed on the leak page, and no attachments are described. The lack of explicit impact classification or ransom figures means the post date remains the primary temporal reference for this entry. URLs have been defanged in this summary; no direct links are included.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.