pandazheng

filename.ext.scrypt.txt

Dec 14th, 2021
104
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. https://pastebin.com/waLqSHCh
  2. --------------------------------------------------------------------------
  3.  
  4. HELLO [redacted]
  5.  
  6. If you are reading this message, means that:
  7. - your network infrastructures have been compromised,
  8. - critical data has leaked,
  9. - files are encrypted
  10.  
  11. ┏━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┓
  12. ┃ Welcome to the Ransom House ┃
  13. ┃ You are locked by ┃
  14. ┃ W H I T E R A B B I T ┃
  15. ┃ Knock, Knock. Follow the White Rabbit... ┃
  16. ┃ ┃
  17. ┃ (\(\ ┃
  18. ┃ (-.-) ┃
  19. ┃ (")(") ┃
  20. ┃ ┃
  21. ┗━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┛
  22.  
  23. The best and only thing you can do is to contact us
  24. to settle the matter before any losses occurs.
  25.  
  26. --------------------------------------------------------------------------
  27.  
  28. 1. THE FOLLOWING IS STRICTLY FORBIDDEN
  29.  
  30. 1.1 DELETION THIS NOTE.
  31. Each note carries the encryption key
  32. needed to decrypt the data,
  33. don't lose it
  34.  
  35. 1.2 EDITING FILES OR HDD.
  36. Renaming, copying or moving any files
  37. could DAMAGE the cypher and
  38. decryption will be impossible.
  39.  
  40. 1.3 USING THIRD-PARTY SOFTWARE.
  41. Trying to recover with any software
  42. can also break the cipher and
  43. file recovery will become a problem.
  44.  
  45. 1.4 SHUTDOWN OR RESTART THE PC.
  46. Boot and recovery errors can also damage the cipher.
  47. Sorry about that, but doing so is entirely at your own risk.
  48.  
  49. 1.5 HIRING THE FBI AND OTHERS
  50. Cooperating with the FBI|CIA and so on
  51. and involving their officers in negotiations
  52. will end our communication with you
  53. and we will share all the leaked data for free.
  54.  
  55. --------------------------------------------------------------------------------------------------
  56.  
  57. 2. EXPLANATION OF THE SITUATION
  58. 2.1 HOW DID THIS HAPPEN
  59.  
  60. The security of your IT perimeter has been compromised (it's not perfect at all).
  61. We encrypted your workstations and servers to make the fact of the intrusion visible and to prevent you from hiding critical data leaks.
  62. We spent a lot of time for researching and finding out the most important directories of your business, your weak points.
  63. We have already downloaded a huge amount of critical data and analyzed it. Now it's fate is up to you, it will either be deleted or sold, or shared with the media.
  64.  
  65. 2.2 VALUABLE DATA WE USUALLY STEAL:
  66. - Databases, legal documents, billings, clients personal information, SSN...
  67. - Audit reports
  68. - Any financial documents (Statements, invoices, accounting, transfers etc.)
  69. - work files and corporate correspondence
  70. - Any backups
  71.  
  72. 2.3 TO DO LIST (best practies)
  73. - Contact us as soon as possible
  74. - Contact us only in our chat, otherwise you can run into scammers.
  75. - Purchase our decryption tool and decrypt your files. There is no other way to do this.
  76. - Realize that dealing with us is the shortest way to the success and secrecy.
  77. - Give up the idea of using decryption help programs, otherwise you will destroy the system permanently
  78. - Avoid any third-party negotiators and recovery groups. They can allow the event to leak.
  79.  
  80. --------------------------------------------------------------------------------------------------
  81.  
  82. 3. POSSIBLE DECISIONS
  83. 3.1 NOT MAKING THE DEAL
  84. - After 4 days starting tomorrow your leaked data will be published or sold.
  85. - We will also send the data to all interested supervisory organizations and the media.
  86. - Decryption key will be deleted permanently and recovery will be impossible.
  87. - Losses from the situation will be measured based on your annual budget
  88.  
  89. 3.2 MAKING THE WIN-WIN DEAL
  90. - You will get the Decryption Tool and the Manual how-to-use.
  91. - You will get our guarantee and log of non-recovarable deletion of all your data.
  92. - You will get the guarantee of secrecy and deletion of all traces of the deal in internet.
  93. - You will get the security report on how to fix your security breaches.
  94.  
  95. --------------------------------------------------------------------------------------------------
  96.  
  97. 4. EVIDENCE OF THE LEAKAGE
  98. 4.1 SCREENSHOTS:
  99. [redacted]
  100. [redacted]
  101. [redacted]
  102. [redacted]
  103. [redacted]
  104.  
  105. 4.2 DB sample: https://file.io/[redacted]
  106. https://file.io/[redacted]
  107. Password:[redacted]
  108. --------------------------------------------------------------------------------------------------
  109.  
  110. 5. HOW TO CONTACT US
  111.  
  112. 5.1 Download and install TOR Browser https://torproject.org
  113. 5.2 Open our live-chat website at [redacted]
  114. 5.3 To review leaked data at temporarily server get the ftp access in our live chat
  115. 5.4 If the TOR Browser is restricted in your area then use VPN services
  116. 5.5 All your Data will be published in 4 Days in the case of silence on your side
  117. 5.6 Your Decryption keys will be permanently destroyed synchronous 5.5
  118. 5.7 Your Data will be published if you will hire third-party negotiators to contact us
  119.  
  120. --------------------------------------------------------------------------------------------------
  121.  
  122. 6. RESPONSIBILITY
  123.  
  124. 6.1 The breaking of critical points of this offer will cause:
  125. - deletion of your decryption keys
  126. - immediate selling of your data
  127. - in the case of non-selling we will publish your data for free
  128. - notification of government supervision agencies, your competitors and clients
  129. --------------------------------------------------------------------------------------------------
  130. 7. Encryption Key
  131.  
  132.  
  133. ---BEGIN KEY---
  134. [redacted 256 bytes base64]
  135. ---END KEY---
Add Comment
Please, Sign In to add comment