Ransomware victim disclosure
← All victimsUnknown
Claimed by genesis · listed 4 days ago
Status timeline
- Listed
May 17, 2026
- Data leaked
At a glance
- Group
- genesis
- Status
- Data leaked
- Listed on leak site
- May 17, 2026
- Data size
- 370 GB
About the victim
AI dossier — public-source company profileThe victim company operates in print and digital workflows, offering subscription models, custom implementations, and security services. No further identifying details such as company name, location, or scale are available from the leak post or public sources. The company appears to serve business clients based on the reference to client folders and NDAs.
- Industry
- Print and Digital Workflows / Subscription Services
Attack summary
Severity: high — 370 GB of data confirmed exfiltrated and fully published, including financial data, NDAs, contracts, and client folders; constitutes significant confirmed exfiltration of business-sensitive data, though no clearly regulated PII (medical/government) is explicitly identified.The Genesis ransomware group claims to have exfiltrated 370 GB of data from the victim's file server and network, including client folders, operational data, contracts, NDAs, and financial data, with the full dataset published across 17 downloadable archive parts.
Data the group says was taken
AI dossier — extracted from the leak post- Client folders repository
- Operational data
- Contracts
- NDAs
- Financial data
- File server data
- Network user folders
The group's post references roughly 17 proof files.
What the group claims
Company provides tailored offerings in print and digital workflows, subscription models, custom implementations, and robust security.
The leak post
captured from the group's siteCompany provides tailored offerings in print and digital workflows, subscription models, custom implementations, and robust security. ``` - 370 Gb of accessible data. - Repository of Clients folders. - Operational Data. - Contracts and NDA - Financial Data. - Data from company fileserver. - Folders of network users. ``` [Download The List of Company Files](http://genesis6ixpb5mcy4kudybtw5op2wqlrkocfogbnenz3c647ibqixiad.onion/download/3723a40c32f5dbf7531e.7z) [Download The List of Archive Contents](http://genesis6ixpb5mcy4kudybtw5op2wqlrkocfogbnenz3c647ibqixiad.onion/download/3723a40c32f5dbf7531e_archive_content.txt) [Download company data archives part 1](http://genesis6ixpb5mcy4kudybtw5op2wqlrkocfogbnenz3c647ibqixiad.onion/download/3723a40c32f5dbf7531e_part1.tar.gz) [Download company data archives part 2](http://genesis6ixpb5mcy4kudybtw5op2wqlrkocfogbnenz3c647ibqixiad.onion/download/3723a40c32f5dbf7531e_part2.tar.gz) [Download company data archives part 3](http://genesis6ixpb5mcy4kudybtw5op2wqlrkocfogbnenz3c647ibqixiad.onion/download/3723a40c32f5dbf7531e_part3.tar.gz) [Download company data archives part 4](http://genesis6ixpb5mcy4kudybtw5op2wqlrkocfogbnenz3c647ibqixiad.onion…
Data the group says was taken
- Client folders
- Operational Data
- Contracts and NDA
- Financial Data
- File server data
- Network user folders
Sources
Source
Indexed 4 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
