Ransomware victim disclosure
← All victimsVan Atta Engineering
Claimed by genesis · listed 12 days ago
Status timeline
- Listed
May 9, 2026
- Data leaked
At a glance
- Group
- genesis
- Status
- Data leaked
- Country
- US
- Sector
- Manufacturing
- Listed on leak site
- May 9, 2026
About the victim
AI dossier — public-source company profileVan Atta Engineering (VAE) is a civil engineering and surveying firm based in Dayton, Ohio. The company operates under the domain vae.cc and is involved in project-based engineering and surveying work. No additional public site content was available to further characterize their scale or service offerings.
- Industry
- Civil Engineering & Surveying
- Address
- 570 Congress Park Dr, Dayton, Ohio
Attack summary
Severity: high — 300 GB of confirmed exfiltrated data has been published, encompassing financial records, email archives, project data, and user folder contents — representing significant business and potentially client-sensitive data disclosure at meaningful scale.The Genesis ransomware group claims to have exfiltrated approximately 300 GB of data from Van Atta Engineering, including project data, operational data, financial data, email archives, file server contents, and network user folders. The data is described as published/accessible, with a file listing available via a Tor-hosted download link.
Data the group says was taken
AI dossier — extracted from the leak post- Project data
- Operational data
- Financial data
- Company file server data
- Email archives
- Network user folders
The group's post references roughly 1 proof file.
What the group claims
A civil engineering and surveying firm located at 570 Congress Park Dr, Dayton, Ohio.
The leak post
captured from the group's siteVan Atta Engineering is a civil engineering and surveying firm located at 570 Congress Park Dr, Dayton, Ohio. . ``` - 300 Gb of accessible data. - Project Data - Operational Data. - Financial Data. - Data from company fileserver. - Email archives. - Folders of network users. ``` [Download The List of Company Files](http://genesis6ixpb5mcy4kudybtw5op2wqlrkocfogbnenz3c647ibqixiad.onion/download/1735d195ab2ec136fe65.txt)
Screenshot of the leak post

Sources
Source
Indexed 12 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
