■ ■ ■ ■ ■ ■
chilelocker/readme_for_unlock_2.txt
| 1 | + | -+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- |
| 2 | + | HELLO |
| 3 | + | [snip] |
| 4 | + | -+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- |
| 5 | + | |
| 6 | + | ----> Attention <---- |
| 7 | + | |
| 8 | + | DO NOT: |
| 9 | + | ->Modify, rename, copy or move any files or you can DAMAGE them and decryption will be impossible |
| 10 | + | ->Use any third-party or public Decryption software, it also may DAMAGE files |
| 11 | + | ->Shutdown or Reset your system, it can DAMAGE files |
| 12 | + | ->Hire any third-party negotiators (recovery/police and etc) |
| 13 | + | -+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- |
| 14 | + | |
| 15 | + | Your security perimeter was BREACHED. |
| 16 | + | Critically important servers and hosts were completely ENCRYPTED. |
| 17 | + | This README-FILE here for you to show you our presence in your's network and avoid any silence about hacking and leakage. |
| 18 | + | Also, we has DOWNLOADED about 700GB your MOST SENSITIVE Data just in case if you will NOT PAY, |
| 19 | + | than everything will be PUBLISHED in Media and/or SOLD to any third-party. |
| 20 | + | |
| 21 | + | |
| 22 | + | 1) WHAT SHOULD YOU DO: |
| 23 | + | --> You have to contact us as soon as possible (you can find contacts below) |
| 24 | + | --> You should purchase our decryption tool, so will be able to restore your files. Without our Decryption keys it's impossible |
| 25 | + | --> You should make a Deal with us, to avoid your Data leakage |
| 26 | + | |
| 27 | + | 2) YOUR OPTIONS: |
| 28 | + | --> IF NO CONTACT OR DEAL MADE IN 3 DAYS: |
| 29 | + | Decryption key will be deleted permanently and recovery will be impossible |
| 30 | + | All your Data will be Published and/or Sold to any third-parties |
| 31 | + | Information regarding vulnerabilities of your network also can be published and/or shared |
| 32 | + | |
| 33 | + | --> IF WE MAKE A DEAL: |
| 34 | + | We will provide you with the Decryption Key and Manual how-to-use |
| 35 | + | We will remove all your files from our file-storage with proof of Deletion |
| 36 | + | We guarantee to avoid sharing any details with third-parties |
| 37 | + | We will provide you the penetration report and list of security-recommendations |
| 38 | + | |
| 39 | + | 3) WE HAS COLLECTED SUCH DATA AS: |
| 40 | + | --> Confidential files and documents, Passports, HR directories, Employees personal info |
| 41 | + | --> Detailed company information, Projects, Sales files and reports, Accountant files |
| 42 | + | --> Financial documents, Commercial info, Internal correspondence |
| 43 | + | --> Contracts, Agreements, Clients Data |
| 44 | + | --> Outlook dumps, SQL dumps and a lot of other sensitive data |
| 45 | + | -+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- |
| 46 | + | !!!Instructions for contacting our Team!!! |
| 47 | + | -+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- |
| 48 | + | --> Download and install TOR browser from this site : https://torproject.org |
| 49 | + | --> For contact us via LIVE CHAT open our website : http://ebljej7okwfnx5hdfikqqt2uqehihqv3yns3ziij5clqpklwb3i2cxad.onion/r/[snip] |
| 50 | + | Your password:[snip] |
| 51 | + | Your username:[snip] |
| 52 | + | Recovery contact:for[snip][email protected] |
| 53 | + | --> If Tor is restricted in your area, use VPN |
| 54 | + | --> All your Data will be published in 5 Days if NO contact made |
| 55 | + | --> Your Decryption keys will be permanently destroyed in 3 Days if no contact made |
| 56 | + | --> Your Data will be published if you will hire third-party negotiators to contact us |
| 57 | + | |
| 58 | + | |