cl0p Ransomware Victim: genesisnet-com
NOTE: The information on this page is fully automated and scraped directly from the cl0p .onion Dark Web Tor Blog page and reposted here for awareness.
SCREENSHOTS, PII and LINKS have been automatically removed before posting here. If you want to see that content you can visit the tor url located here:
hXXp://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad[.]onion/genesisnet-com
FILES PART2 – EXTRACTED EMAILS
FILES PART3 – – EXTRACTED EMAILS
FILES PART4 – SALES
FILES PART5 – CONTRACTS, EXECUTIVES, MARKETING
FILES PART6 – 10.0.70.121\ATS_FILESHARE\IT_Engineering\Project Documents
FILES PART7
FILES PART8
FILES PART9
FILES PART10
FILES PART11 – 10.0.70.121\ATS_FILESHARE\Project_Management\VERIZON\ADM 18-9001
FILES PART12 – 10.0.70.121\ATS_FILESHARE\Project_Management\VERIZON\ADM 18-9001 VOICE
FILES PART13 – 10.0.70.121\ATS_FILESHARE\Project_Management\VERIZON\AHOLD\SERVICES & ACTIVITIES
FILES PART14
FILES PART15 – Projects, Gravetti, Datacomm, Accounting
FILES PART16 – HR_Restricted, HR, HR2018
To get additional information, please download the Tor Browser and then visit the onion site located here: (to defang, remove the [.] and replace with . Also change hXXp to http) You can then copy and paste it into the Tor browser to get updates regarding this victim of cl0p Ransomware