cl0p Ransomware Victim: genesisnet-com

NOTE: The information on this page is fully automated and scraped directly from the cl0p .onion Dark Web Tor Blog page and reposted here for awareness.

SCREENSHOTS, PII and LINKS have been automatically removed before posting here. If you want to see that content you can visit the tor url located here:
hXXp://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad[.]onion/genesisnet-com

cl0p
FILES PART1 – EXTRACTED EMAILS



FILES PART2 – EXTRACTED EMAILS



FILES PART3 – – EXTRACTED EMAILS

















FILES PART4 – SALES

















FILES PART5 – CONTRACTS, EXECUTIVES, MARKETING















































FILES PART6 – 10.0.70.121\ATS_FILESHARE\IT_Engineering\Project Documents



























FILES PART7








FILES PART8




























FILES PART9











































FILES PART10








FILES PART11 – 10.0.70.121\ATS_FILESHARE\Project_Management\VERIZON\ADM 18-9001






























FILES PART12 – 10.0.70.121\ATS_FILESHARE\Project_Management\VERIZON\ADM 18-9001 VOICE





























































FILES PART13 – 10.0.70.121\ATS_FILESHARE\Project_Management\VERIZON\AHOLD\SERVICES & ACTIVITIES

























FILES PART14


























































FILES PART15 – Projects, Gravetti, Datacomm, Accounting









































































FILES PART16 – HR_Restricted, HR, HR2018

















































To get additional information, please download the Tor Browser and then visit the onion site located here: (to defang, remove the [.] and replace with . Also change hXXp to http) You can then copy and paste it into the Tor browser to get updates regarding this victim of cl0p Ransomware