■ ■ ■ ■ ■ ■
chilelocker/readme_for_unlock.txt
| 1 | + | |
| 2 | + | -+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- |
| 3 | + | HELLO! |
| 4 | + | -+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- |
| 5 | + | |
| 6 | + | ----> Attention <---- |
| 7 | + | |
| 8 | + | DO NOT: |
| 9 | + | --Modify, rename, copy or move any files or you can DAMAGE them and decryption will be impossible. |
| 10 | + | --Use any third-party or public Decryption software, it also may DAMAGE files. |
| 11 | + | --Shutdown or Reset your system, it can DAMAGE files. |
| 12 | + | --Hire any third-party negotiators (recovery/police and etc). |
| 13 | + | -+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- |
| 14 | + | |
| 15 | + | Your security perimeter was BREACHED. |
| 16 | + | Critically important servers and hosts were completely ENCRYPTED. |
| 17 | + | This README-FILE here for you to show you our presence in your's network and avoid any silence about hacking and leakage. |
| 18 | + | Also, we has DOWNLOADED your most SENSITIVE Data just in case if you will NOT PAY, |
| 19 | + | than everything will be PUBLISHED in Media and/or SOLD to any third-party. |
| 20 | + | |
| 21 | + | |
| 22 | + | 1) WHAT SHOULD YOU DO: |
| 23 | + | ---> You have to contact us as soon as possible (you can find contacts below) |
| 24 | + | ---> You should purchase our decryption tool, so will be able to restore your files. Without our Decryption keys it's impossible |
| 25 | + | ---> You should make a Deal with us, to avoid your Data leakage |
| 26 | + | |
| 27 | + | 2) YOUR OPTIONS: |
| 28 | + | ---> IF NO CONTACT OR DEAL MADE IN 3 DAYS: |
| 29 | + | Decryption key will be deleted permanently and recovery will be impossible. |
| 30 | + | All your Data will be Published and/or Sold to any third-parties |
| 31 | + | Information regarding vulnerabilities of your network also can be published and/or shared |
| 32 | + | |
| 33 | + | ---> IF WE MAKE A DEAL: |
| 34 | + | We will provide you with the Decryption Key and Manual how-to-use. |
| 35 | + | We will remove all your files from our file-storage with proof of Deletion |
| 36 | + | We guarantee to avoid sharing any details with third-parties |
| 37 | + | We will provide you the penetration report and list of security-recommendations |
| 38 | + | |
| 39 | + | -+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- |
| 40 | + | !!!!Instructions for contacting our team!!!! |
| 41 | + | -+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- |
| 42 | + | ---> Download and install TOR browser from this site : https://torproject.org |
| 43 | + | ---> For contact us via LIVE CHAT open our website : http://z6vidveub2ypo3d3x7omsmcxqwxkkmvn5y3paoufyd2tt4bfbkg33kid.onion |
| 44 | + | Password:[snip] |
| 45 | + | ---> If Tor is restricted in your area, use VPN |
| 46 | + | ---> All your Data will be published in 3 Days if NO contact made |
| 47 | + | ---> Your Decryption keys will be permanently destroyed in 3 Days if no contact made |
| 48 | + | ---> Your Data will be published if you will hire third-party negotiators to contact us |
| 49 | + | |
| 50 | + | |
| 51 | + | |
| 52 | + | |
| 53 | + | |
| 54 | + | |
| 55 | + | |
| 56 | + | |
| 57 | + | |
| 58 | + | |
| 59 | + | |
| 60 | + | |
| 61 | + | |