Ransomware victim disclosure
← All victimsCasino Gaming Commission
Claimed by genesis · listed 9 days ago
Status timeline
- Listed
May 11, 2026
- Data leaked
At a glance
- Group
- genesis
- Status
- Data leaked
- Country
- JM
- Sector
- Public Sector
- Listed on leak site
- May 11, 2026
About the victim
AI dossier — public-source company profileThe Casino Gaming Commission (CGC) is a Jamaican government regulatory body responsible for overseeing and licensing casino and gaming operations in Jamaica. It operates under public sector authority and manages regulatory, operational, and financial aspects of the gaming industry in the country. The commission's official domain is cgc.gov.jm.
- Industry
- Gaming & Casino Regulation (Public Sector)
- Address
- Jamaica
Attack summary
Severity: high — A confirmed 100 GB exfiltration from a government regulatory body with data already published. The data includes financial and operational records from a public sector entity, representing significant regulatory and governmental sensitivity, though no confirmed large-scale PII or medical data is explicitly stated.The group 'genesis' claims to have exfiltrated approximately 100 GB of data from the Casino Gaming Commission of Jamaica, encompassing racing data, casino data, project data, operational data, financial data, and files from the company's fileserver. The data has been published, with a file list made available via a Tor onion link.
Data the group says was taken
AI dossier — extracted from the leak post- Racing data
- Casino data
- Project data
- Operational data
- Financial data
- Fileserver contents
The group's post references roughly 1 proof file.
What the group claims
Official Casino Gaming Commission of Jamaica.
The leak post
captured from the group's siteOfficial Casino Gaming Commission of Jamaica ``` - 100 Gb of accessible data. - Racing Data. - Casino Data. - Project Data. - Operational Data. - Financial Data. - Data from company fileserver. ``` [Download The List of Company Files](http://genesis6ixpb5mcy4kudybtw5op2wqlrkocfogbnenz3c647ibqixiad.onion/download/d37982cb248dfd3939cc.txt)
Screenshot of the leak post

Sources
Source
Indexed 9 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
