| 1 | + | Dear Management, |
| 2 | + | |
| 3 | + | If you are reading this message, it means that: |
| 4 | + | - your network infrastructure has been compromised, |
| 5 | + | - critical data was leaked, |
| 6 | + | - files are encrypted |
| 7 | + | -------------------------------------------------------------------------- |
| 8 | + | The best and only thing you can do is to contact us |
| 9 | + | to settle the matter before any losses occurs. |
| 10 | + | |
| 11 | + | Onion Site: |
| 12 | + | http://basemmnnqwxevlymli5bs36o5ynti55xojzvn246spahniugwkff2pad.onion/ |
| 13 | + | Telegram Channel: |
| 14 | + | https://t.me/eightbase |
| 15 | + | -------------------------------------------------------------------------- |
| 16 | + | |
| 17 | + | 1. THE FOLLOWING IS STRICTLY FORBIDDEN |
| 18 | + | |
| 19 | + | |
| 20 | + | 1.1 EDITING FILES ON HDD. |
| 21 | + | Renaming, copying or moving any files |
| 22 | + | could DAMAGE the cipher and |
| 23 | + | decryption will be impossible. |
| 24 | + | |
| 25 | + | 1.2 USING THIRD-PARTY SOFTWARE. |
| 26 | + | Trying to recover with any software |
| 27 | + | can also break the cipher and |
| 28 | + | file recovery will become a problem. |
| 29 | + | |
| 30 | + | 1.3 SHUTDOWN OR RESTART THE PC. |
| 31 | + | Boot and recovery errors can also damage the cipher. |
| 32 | + | Sorry about that, but doing so is entirely at your own risk. |
| 33 | + | |
| 34 | + | |
| 35 | + | -------------------------------------------------------------------------------------------------- |
| 36 | + | |
| 37 | + | 2. EXPLANATION OF THE SITUATION |
| 38 | + | 2.1 HOW DID THIS HAPPEN |
| 39 | + | |
| 40 | + | The security of your IT perimeter has been compromised (it's not perfect at all). |
| 41 | + | We encrypted your workstations and servers to make the fact of the intrusion visible and to prevent you from hiding critical data leaks. |
| 42 | + | We spent a lot of time researching and finding out the most important directories of your business, your weak points. |
| 43 | + | We have already downloaded a huge amount of critical data and analyzed it. Now its fate is up to you, it will either be deleted or sold, or shared with the media. |
| 44 | + | |
| 45 | + | 2.2 VALUABLE DATA WE USUALLY STEAL: |
| 46 | + | - Databases, legal documents, personal information. |
| 47 | + | - Audit reports. |
| 48 | + | - Audit SQL database |
| 49 | + | - Any financial documents (Statements, invoices, accounting, transfers etc.). |
| 50 | + | - Work files and corporate correspondence. |
| 51 | + | - Any backups. |
| 52 | + | - Confidential documents. |
| 53 | + | 2.3 TO DO LIST (best practies) |
| 54 | + | - Contact us as soon as possible. |
| 55 | + | - Contact us only in our live chat, otherwise you can run into scammers. |
| 56 | + | - Purchase our decryption tool and decrypt your files. There is no other way to do this. |
| 57 | + | - Realize that dealing with us is the shortest way to success and secrecy. |
| 58 | + | - Give up the idea of using decryption help programs, otherwise you will destroy the system permanently. |
| 59 | + | - Avoid any third-party negotiators and recovery groups. They can become the source of leaks. |
| 60 | + | |
| 61 | + | -------------------------------------------------------------------------------------------------- |
| 62 | + | |
| 63 | + | 3. POSSIBLE DECISIONS |
| 64 | + | 3.1 NOT MAKING THE DEAL |
| 65 | + | - After 4 days starting tomorrow your leaked data will be Disclosed or sold. |
| 66 | + | - We will also send the data to all interested supervisory organizations and the media. |
| 67 | + | - Decryption key will be deleted permanently and recovery will be impossible. |
| 68 | + | - Losses from the situation can be measured based on your annual budget. |
| 69 | + | |
| 70 | + | 3.2 MAKING THE WIN-WIN DEAL |
| 71 | + | - You will get the only working Decryption Tool and the how-to-use Manual. |
| 72 | + | - You will get our guarantees (with log provided) of non-recovarable deletion of all your leaked data. |
| 73 | + | - You will get our guarantees of secrecy and removal of all traces related to the deal in the Internet. |
| 74 | + | - You will get our security report on how to fix your security breaches. |
| 75 | + | |
| 76 | + | -------------------------------------------------------------------------------------------------- |
| 77 | + | |
| 78 | + | 4. EVIDENCE OF THE LEAKAGE |
| 79 | + | |
| 80 | + | In our contact form or mail: |
| 81 | + | http://basemmnnqwxevlymli5bs36o5ynti55xojzvn246spahniugwkff2pad.onion/contact |
| 82 | + | [email protected] |
| 83 | + | [email protected] |
| 84 | + | -------------------------------------------------------------------------------------------------- |
| 85 | + | |
| 86 | + | 5. HOW TO CONTACT US |
| 87 | + | |
| 88 | + | 5.1 Download and install TOR Browser https://torproject.org |
| 89 | + | 5.2 Go to our contact form website at http://basemmnnqwxevlymli5bs36o5ynti55xojzvn246spahniugwkff2pad.onion/contact |
| 90 | + | 5.3 You can request sample files chat to review leaked data samples. |
| 91 | + | 5.4 In case TOR Browser is restricted in your area use VPN services. |
| 92 | + | 5.5 All leaked Data samples will be Disclosed in 4 Days if you remain silent. |
| 93 | + | 5.6 Your Decryption keys will be permanently destroyed at the moment the leaked Data is Disclosed. |
| 94 | + | |
| 95 | + | -------------------------------------------------------------------------------------------------- |
| 96 | + | |
| 97 | + | 6. RESPONSIBILITY |
| 98 | + | |
| 99 | + | 6.1 Breaking critical points of this offer will cause: |
| 100 | + | - Deletion of your decryption keys. |
| 101 | + | - Immediate sale or complete Disclosure of your leaked data. |
| 102 | + | - Notification of government supervision agencies, your competitors and clients. |
| 103 | + | -------------------------------------------------------------------------------------------------- |