Demonslay335

RECOVER-FILES.txt

Sep 18th, 2020 (edited)
6,646
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.70 KB | None | 0 0
  1. ��
  2.  
  3. ------------------
  4.  
  5. | What happened? |
  6.  
  7. ------------------
  8.  
  9.  
  10.  
  11. Your network was ATTACKED, your computers and servers were LOCKED,
  12.  
  13. Your private data was DOWNLOADED.
  14.  
  15.  
  16.  
  17. ----------------------
  18.  
  19. | What does it mean? |
  20.  
  21. ----------------------
  22.  
  23.  
  24.  
  25. It means that soon mass media, your partners and clients WILL KNOW about your PROBLEM.
  26.  
  27.  
  28.  
  29. --------------------------
  30.  
  31. | How it can be avoided? |
  32.  
  33. --------------------------
  34.  
  35.  
  36.  
  37. In order to avoid this,
  38.  
  39. To avoid this issue you are to COME IN TOUCH WITH US no later than within 3 DAYS and conclude the data recovery and breach fixing AGREEMENT.
  40.  
  41.  
  42.  
  43. -------------------------------------------
  44.  
  45. | What if I do not contact you in 3 days? |
  46.  
  47. -------------------------------------------
  48.  
  49.  
  50.  
  51. If you do not contact us in the next 3 DAYS we will begin DATA publication.
  52.  
  53.  
  54.  
  55. -----------------------------
  56.  
  57. | I can handle it by myself |
  58.  
  59. -----------------------------
  60.  
  61.  
  62.  
  63. It is your RIGHT, but in this case all your data will be published for public USAGE.
  64.  
  65.  
  66.  
  67. -------------------------------
  68.  
  69. | I do not fear your threats! |
  70.  
  71. -------------------------------
  72.  
  73.  
  74.  
  75. That is not the threat, but the algorithm of our actions.
  76.  
  77. If you have hundreds of millions of UNWANTED dollars, there is nothing to FEAR for you.
  78.  
  79. That is the EXACT AMOUNT of money you will spend for recovery and payouts because of PUBLICATION.
  80.  
  81.  
  82.  
  83. --------------------------
  84.  
  85. | You have convinced me! |
  86.  
  87. --------------------------
  88.  
  89.  
  90.  
  91. Then you need to CONTACT US, there is few ways to DO that.
  92.  
  93.  
  94.  
  95. I. Recommended (the most secure method)
  96.  
  97.  
  98.  
  99. a) Download a special TOR browser: https://www.torproject.org/
  100.  
  101. b) Install the TOR browser
  102.  
  103. c) Open our website with LIVE CHAT in the TOR browser: http://egregor[redacted].onion/[redacted]
  104.  
  105. d) Follow the instructions on this page.
  106.  
  107.  
  108.  
  109. II. If the first method is not suitable for you
  110.  
  111.  
  112.  
  113. a) Open our website with LIVE CHAT: https://[redacted].top/[redacted]
  114.  
  115. b) Follow the instructions on this page.
  116.  
  117.  
  118.  
  119. Our LIVE SUPPORT is ready to ASSIST YOU on this website.
  120.  
  121.  
  122.  
  123. ----------------------------------------
  124.  
  125. | What will I get in case of agreement |
  126.  
  127. ----------------------------------------
  128.  
  129.  
  130.  
  131. You WILL GET full DECRYPTION of your machines in the network, FULL FILE LISTING of downloaded data,
  132.  
  133. confirmation of downloaded data DELETION from our servers, RECOMMENDATIONS for securing your network perimeter.
  134.  
  135.  
  136.  
  137. And the FULL CONFIDENTIALITY ABOUT INCIDENT.
  138.  
  139.  
  140.  
  141. ----------------------------------------------------------------------------------
  142.  
  143. Do not redact this special technical block, we need this to authorize you.
  144.  
  145. ---EGREGOR---
  146.  
  147. [redacted base64]
  148.  
  149. ---EGREGOR---
Add Comment
Please, Sign In to add comment