Genesis is a recently emerged ransomware group that was first observed in October 2025, operating with apparent financial motivations based on their targeting patterns across multiple high-value sectors. The group has demonstrated a relatively aggressive operational tempo since emergence, accumulating 54 documented victims within a short timeframe. Given the limited public documentation available from established threat intelligence sources regarding this newly identified group, specific details about their country of origin, organizational structure, and precise attack methodologies remain under investigation by security researchers. The group's targeting patterns indicate a preference for victims in the United States and United Kingdom, with additional activity observed in Malaysia and Spain, suggesting either a broad operational scope or the use of automated targeting tools that do not discriminate by geography. Their sector targeting reveals a focus on healthcare, manufacturing, business services, and financial services organizations, indicating they may prioritize entities with both high revenue potential and critical operational dependencies that increase pressure for ransom payment. Due to the group's recent emergence and limited reporting from major threat intelligence organizations such as Mandiant, CISA, or FBI, comprehensive details regarding their specific encryption methods, initial access vectors, data exfiltration practices, or notable high-profile campaigns have not yet been publicly documented. Genesis remains an active threat as of current reporting, though their operational longevity and potential connections to established ransomware ecosystems continue to be assessed by the cybersecurity community. The group has been linked to 83 public disclosures across our corpus. First observed on a leak site on October 21, 2025; most recent post May 22, 2026. The operation is currently active.
Sector and geography
This disclosure adds to ransomware activity in the Not Found sector, which has 4,859 disclosures indexed across all operators we track. Geographically, **** & ******** is reported in US, a country with 2,713 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.