genesis is a ransomware operator currently active on public leak sites. Darkfield has indexed 82 public victims claimed by this operator between October 21, 2025 and May 19, 2026. Genesis is a recently emerged ransomware group that was first observed in October 2025, operating with apparent financial motivations based on their targeting patterns across multiple high-value sectors. The group has demonstrated a relatively aggressive operational tempo since emergence, accumulating 54 documented victims within a short timeframe. Given the limited public documentation available from established threat intelligence sources regarding this newly identified group, specific details about their country of origin, organizational structure, and precise attack methodologies remain under investigation by security researchers. The group's targeting patterns indicate a preference for victims in the United States and United Kingdom, with additional activity observed in Malaysia and Spain, suggesting either a broad operational scope or the use of automated targeting tools that do not discriminate by geography. Their sector targeting reveals a focus on healthcare, manufacturing, business services, and financial services organizations, indicating they may prioritize entities with both high revenue potential and critical operational dependencies that increase pressure for ransom payment. Due to the group's recent emergence and limited reporting from major threat intelligence organizations such as Mandiant, CISA, or FBI, comprehensive details regarding their specific encryption methods, initial access vectors, data exfiltration practices, or notable high-profile campaigns have not yet been publicly documented. Genesis remains an active threat as of current reporting, though their operational longevity and potential connections to established ransomware ecosystems continue to be assessed by the cybersecurity community.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.