Genesis is a recently emerged ransomware group that was first observed in October 2025, operating with apparent financial motivations based on their targeting patterns across multiple high-value sectors. The group has demonstrated a relatively aggressive operational tempo since emergence, accumulating 54 documented victims within a short timeframe. Given the limited public documentation available from established threat intelligence sources regarding this newly identified group, specific details about their country of origin, organizational structure, and precise attack methodologies remain under investigation by security researchers. The group's targeting patterns indicate a preference for victims in the United States and United Kingdom, with additional activity observed in Malaysia and Spain, suggesting either a broad operational scope or the use of automated targeting tools that do not discriminate by geography. Their sector targeting reveals a focus on healthcare, manufacturing, business services, and financial services organizations, indicating they may prioritize entities with both high revenue potential and critical operational dependencies that increase pressure for ransom payment. Due to the group's recent emergence and limited reporting from major threat intelligence organizations such as Mandiant, CISA, or FBI, comprehensive details regarding their specific encryption methods, initial access vectors, data exfiltration practices, or notable high-profile campaigns have not yet been publicly documented. Genesis remains an active threat as of current reporting, though their operational longevity and potential connections to established ransomware ecosystems continue to be assessed by the cybersecurity community. The group has been linked to 82 public disclosures across our corpus. First observed on a leak site on October 21, 2025; most recent post May 19, 2026. The operation is currently active.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.