Ransomware victim disclosure
← All victimsBen F. Barcus and associates pllc
Claimed by genesis · listed 9 days ago
Status timeline
- Listed
May 11, 2026
- Data leaked
At a glance
- Group
- genesis
- Status
- Data leaked
- Country
- US
- Sector
- Business Services
- Listed on leak site
- May 11, 2026
About the victim
AI dossier — public-source company profileBen F. Barcus and Associates PLLC is a US-based law firm operating in the legal/business services sector. Based on the leak post context, the firm handles client matters spanning medical, criminal, and financial legal work. No public website content was available to further characterize the firm's size or location.
- Industry
- Legal Services (Law Firm)
Attack summary
Severity: critical — Confirmed exfiltration and publication of ~500 GB of data containing regulated sensitive categories at scale: medical records, criminal case files, personal PII, and financial data belonging to the firm's legal clients.The Genesis ransomware group claims to have exfiltrated approximately 500 GB of data from the firm's file server, including client personal data, medical records, criminal case data, financial data, email archives, and network user folders; data has been published.
Data the group says was taken
AI dossier — extracted from the leak post- Client data
- Personal data
- Medical data
- Legislation data
- Criminal case data
- Operational data
- Financial data
- Company file server data
- Email archives
- Network user folders
The group's post references roughly 1 proof file.
What the group claims
A law firm from Tacoma, WA.
The leak post
captured from the group's siteFounded in 2009, HostBooks is an accounting software provider. The company's software features cloud accounting, expense management, cloud storage, invoicing, reconciliations, inventory management, data import/export, financial reports and a client management portal. For these lawyers, building a website is too complicated. The same goes for protecting their clients' data. ``` - 500 Gb of accessible data. - Clients Data. - Personal Data. - Medical Data. - Legislation Data. - Criminal Data. - Operational Data. - Financial Data. - Data from company fileserver. - Email archives. - Folders of network users. ``` [Download The List of Company Files](http://genesis6ixpb5mcy4kudybtw5op2wqlrkocfogbnenz3c647ibqixiad.onion/download/72daf8151f038f9399f8.txt)
Screenshot of the leak post

Sources
Source
Indexed 9 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
