[GENESIS] – Ransomware Victim: Healthy Living Market and Café

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the GENESIS Onion Dark Web Tor Blog page.

Ransomware group:
GENESIS
Victim name:
HEALTHY LIVING MARKET AND CAFÉ

AI Generated Summary of the Ransomware Leak Page

Healthy Living Market and Café, a US‑based consumer services company established in 1986 and headquartered in South Burlington, Vermont, is presented as a ransomware victim in a leak post attributed to the GENESIS group. The post frames the business as a marketplace focused on locally sourced organic foods and holistic health and wellness products, with a defanged link to the company’s site (hxxp://healthylivingmarket[.]com/). The leak page provides a brief company profile, including an estimate of USD 104.5 million in revenue. It lists three downloadable items under the downloads section—a text file titled “The List of Company Files” and two tar[.]gz archives described as “company data archives”—and notes that there are no accompanying screenshots or images on the page. The post is dated 2025-10-09, which should be treated as the post date; there is no explicit compromise date present in the excerpt, reinforcing a data-leak narrative rather than an encryption event.

The content indicates an exfiltration-oriented leak rather than immediate system encryption. The three downloadable items—covering a list of company files and two data archives—suggest the attackers claim access to internal documents and datasets that they may release or monetize. No ransom amount is stated in the excerpt, and there is no explicit reference to encryption within the leak description. The victim is identified as operating in the US consumer services space, with the post dated 2025-10-09, consistent with a data-leak release rather than a fully encrypted environment. The absence of images or screenshots on the page further underscores a focus on file disclosure and data access rather than visual proof of compromised systems.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features