Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- --------------------------------------------------------------------------
- HELLO [redacted]
- If you are reading this message, means that:
- - your network infrastructures have been compromised,
- - critical data has leaked,
- - files are encrypted
- â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”┓
- ┃ Welcome to the Ransom House ┃
- ┃ You are locked by ┃
- ┃ W H I T E R A B B I T ┃
- ┃ Knock, Knock. Follow the White Rabbit... ┃
- ┃ ┃
- ┃ (\(\ ┃
- ┃ (-.-) ┃
- ┃ (")(") ┃
- ┃ ┃
- â”—â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”â”›
- The best and only thing you can do is to contact us
- to settle the matter before any losses occurs.
- --------------------------------------------------------------------------
- 1. THE FOLLOWING IS STRICTLY FORBIDDEN
- 1.1 DELETION THIS NOTE.
- Each note carries the encryption key
- needed to decrypt the data,
- don't lose it
- 1.2 EDITING FILES OR HDD.
- Renaming, copying or moving any files
- could DAMAGE the cypher and
- decryption will be impossible.
- 1.3 USING THIRD-PARTY SOFTWARE.
- Trying to recover with any software
- can also break the cipher and
- file recovery will become a problem.
- 1.4 SHUTDOWN OR RESTART THE PC.
- Boot and recovery errors can also damage the cipher.
- Sorry about that, but doing so is entirely at your own risk.
- 1.5 HIRING THE FBI AND OTHERS
- Cooperating with the FBI|CIA and so on
- and involving their officers in negotiations
- will end our communication with you
- and we will share all the leaked data for free.
- --------------------------------------------------------------------------------------------------
- 2. EXPLANATION OF THE SITUATION
- 2.1 HOW DID THIS HAPPEN
- The security of your IT perimeter has been compromised (it's not perfect at all).
- We encrypted your workstations and servers to make the fact of the intrusion visible and to prevent you from hiding critical data leaks.
- We spent a lot of time for researching and finding out the most important directories of your business, your weak points.
- We have already downloaded a huge amount of critical data and analyzed it. Now it's fate is up to you, it will either be deleted or sold, or shared with the media.
- 2.2 VALUABLE DATA WE USUALLY STEAL:
- - Databases, legal documents, billings, clients personal information, SSN...
- - Audit reports
- - Any financial documents (Statements, invoices, accounting, transfers etc.)
- - work files and corporate correspondence
- - Any backups
- 2.3 TO DO LIST (best practies)
- - Contact us as soon as possible
- - Contact us only in our chat, otherwise you can run into scammers.
- - Purchase our decryption tool and decrypt your files. There is no other way to do this.
- - Realize that dealing with us is the shortest way to the success and secrecy.
- - Give up the idea of using decryption help programs, otherwise you will destroy the system permanently
- - Avoid any third-party negotiators and recovery groups. They can allow the event to leak.
- --------------------------------------------------------------------------------------------------
- 3. POSSIBLE DECISIONS
- 3.1 NOT MAKING THE DEAL
- - After 4 days starting tomorrow your leaked data will be published or sold.
- - We will also send the data to all interested supervisory organizations and the media.
- - Decryption key will be deleted permanently and recovery will be impossible.
- - Losses from the situation will be measured based on your annual budget
- 3.2 MAKING THE WIN-WIN DEAL
- - You will get the Decryption Tool and the Manual how-to-use.
- - You will get our guarantee and log of non-recovarable deletion of all your data.
- - You will get the guarantee of secrecy and deletion of all traces of the deal in internet.
- - You will get the security report on how to fix your security breaches.
- --------------------------------------------------------------------------------------------------
- 4. EVIDENCE OF THE LEAKAGE
- 4.1 SCREENSHOTS:
- [redacted]
- [redacted]
- [redacted]
- [redacted]
- [redacted]
- 4.2 DB sample: https://file.io/[redacted]
- https://file.io/[redacted]
- Password:[redacted]
- --------------------------------------------------------------------------------------------------
- 5. HOW TO CONTACT US
- 5.1 Download and install TOR Browser https://torproject.org
- 5.2 Open our live-chat website at [redacted]
- 5.3 To review leaked data at temporarily server get the ftp access in our live chat
- 5.4 If the TOR Browser is restricted in your area then use VPN services
- 5.5 All your Data will be published in 4 Days in the case of silence on your side
- 5.6 Your Decryption keys will be permanently destroyed synchronous 5.5
- 5.7 Your Data will be published if you will hire third-party negotiators to contact us
- --------------------------------------------------------------------------------------------------
- 6. RESPONSIBILITY
- 6.1 The breaking of critical points of this offer will cause:
- - deletion of your decryption keys
- - immediate selling of your data
- - in the case of non-selling we will publish your data for free
- - notification of government supervision agencies, your competitors and clients
- --------------------------------------------------------------------------------------------------
- 7. Encryption Key
- ---BEGIN KEY---
- [redacted 256 bytes base64]
- ---END KEY---
Add Comment
Please, Sign In to add comment