Projects STRLCPY ransomware_notes Commits 2989cfbf
🤬
  • ■ ■ ■ ■ ■ ■
    8base/8base_note.txt
     1 +Dear Management,
     2 +
     3 +If you are reading this message, it means that:
     4 + - your network infrastructure has been compromised,
     5 + - critical data was leaked,
     6 + - files are encrypted
     7 +--------------------------------------------------------------------------
     8 + The best and only thing you can do is to contact us
     9 + to settle the matter before any losses occurs.
     10 +
     11 +Onion Site:
     12 +http://basemmnnqwxevlymli5bs36o5ynti55xojzvn246spahniugwkff2pad.onion/
     13 +Telegram Channel:
     14 +https://t.me/eightbase
     15 +--------------------------------------------------------------------------
     16 +
     17 + 1. THE FOLLOWING IS STRICTLY FORBIDDEN
     18 +
     19 +
     20 +1.1 EDITING FILES ON HDD.
     21 + Renaming, copying or moving any files
     22 + could DAMAGE the cipher and
     23 + decryption will be impossible.
     24 +
     25 +1.2 USING THIRD-PARTY SOFTWARE.
     26 + Trying to recover with any software
     27 + can also break the cipher and
     28 + file recovery will become a problem.
     29 +
     30 +1.3 SHUTDOWN OR RESTART THE PC.
     31 + Boot and recovery errors can also damage the cipher.
     32 + Sorry about that, but doing so is entirely at your own risk.
     33 +
     34 +
     35 +--------------------------------------------------------------------------------------------------
     36 +
     37 + 2. EXPLANATION OF THE SITUATION
     38 +2.1 HOW DID THIS HAPPEN
     39 +
     40 +The security of your IT perimeter has been compromised (it's not perfect at all).
     41 +We encrypted your workstations and servers to make the fact of the intrusion visible and to prevent you from hiding critical data leaks.
     42 +We spent a lot of time researching and finding out the most important directories of your business, your weak points.
     43 +We have already downloaded a huge amount of critical data and analyzed it. Now its fate is up to you, it will either be deleted or sold, or shared with the media.
     44 +
     45 +2.2 VALUABLE DATA WE USUALLY STEAL:
     46 + - Databases, legal documents, personal information.
     47 + - Audit reports.
     48 + - Audit SQL database
     49 + - Any financial documents (Statements, invoices, accounting, transfers etc.).
     50 + - Work files and corporate correspondence.
     51 + - Any backups.
     52 + - Confidential documents.
     53 +2.3 TO DO LIST (best practies)
     54 + - Contact us as soon as possible.
     55 + - Contact us only in our live chat, otherwise you can run into scammers.
     56 + - Purchase our decryption tool and decrypt your files. There is no other way to do this.
     57 + - Realize that dealing with us is the shortest way to success and secrecy.
     58 + - Give up the idea of using decryption help programs, otherwise you will destroy the system permanently.
     59 + - Avoid any third-party negotiators and recovery groups. They can become the source of leaks.
     60 +
     61 +--------------------------------------------------------------------------------------------------
     62 +
     63 + 3. POSSIBLE DECISIONS
     64 +3.1 NOT MAKING THE DEAL
     65 + - After 4 days starting tomorrow your leaked data will be Disclosed or sold.
     66 + - We will also send the data to all interested supervisory organizations and the media.
     67 + - Decryption key will be deleted permanently and recovery will be impossible.
     68 + - Losses from the situation can be measured based on your annual budget.
     69 +
     70 +3.2 MAKING THE WIN-WIN DEAL
     71 + - You will get the only working Decryption Tool and the how-to-use Manual.
     72 + - You will get our guarantees (with log provided) of non-recovarable deletion of all your leaked data.
     73 + - You will get our guarantees of secrecy and removal of all traces related to the deal in the Internet.
     74 + - You will get our security report on how to fix your security breaches.
     75 +
     76 +--------------------------------------------------------------------------------------------------
     77 +
     78 + 4. EVIDENCE OF THE LEAKAGE
     79 +
     80 + In our contact form or mail:
     81 +http://basemmnnqwxevlymli5bs36o5ynti55xojzvn246spahniugwkff2pad.onion/contact
     82 +[email protected]
     83 +[email protected]
     84 +--------------------------------------------------------------------------------------------------
     85 +
     86 + 5. HOW TO CONTACT US
     87 +
     88 +5.1 Download and install TOR Browser https://torproject.org
     89 +5.2 Go to our contact form website at http://basemmnnqwxevlymli5bs36o5ynti55xojzvn246spahniugwkff2pad.onion/contact
     90 +5.3 You can request sample files chat to review leaked data samples.
     91 +5.4 In case TOR Browser is restricted in your area use VPN services.
     92 +5.5 All leaked Data samples will be Disclosed in 4 Days if you remain silent.
     93 +5.6 Your Decryption keys will be permanently destroyed at the moment the leaked Data is Disclosed.
     94 +
     95 +--------------------------------------------------------------------------------------------------
     96 +
     97 + 6. RESPONSIBILITY
     98 +
     99 +6.1 Breaking critical points of this offer will cause:
     100 + - Deletion of your decryption keys.
     101 + - Immediate sale or complete Disclosure of your leaked data.
     102 + - Notification of government supervision agencies, your competitors and clients.
     103 +--------------------------------------------------------------------------------------------------
Please wait...
Page is in error, reload to recover