■ ■ ■ ■ ■ ■
medusa/!!!READ_ME_MEDUSA!!!.txt
| 1 | + | $$\ $$\ $$$$$$$$\ $$$$$$$\ $$\ $$\ $$$$$$\ $$$$$$\ |
| 2 | + | $$$\ $$$ |$$ _____|$$ __$$\ $$ | $$ |$$ __$$\ $$ __$$\ |
| 3 | + | $$$$\ $$$$ |$$ | $$ | $$ |$$ | $$ |$$ / \__|$$ / $$ | |
| 4 | + | $$\$$\$$ $$ |$$$$$\ $$ | $$ |$$ | $$ |\$$$$$$\ $$$$$$$$ | |
| 5 | + | $$ \$$$ $$ |$$ __| $$ | $$ |$$ | $$ | \____$$\ $$ __$$ | |
| 6 | + | $$ |\$ /$$ |$$ | $$ | $$ |$$ | $$ |$$\ $$ |$$ | $$ | |
| 7 | + | $$ | \_/ $$ |$$$$$$$$\ $$$$$$$ |\$$$$$$ |\$$$$$$ |$$ | $$ | |
| 8 | + | \__| \__|\________|\_______/ \______/ \______/ \__| \__| |
| 9 | + | -----------------------------[ Hello, [snip] !!! ]-------------------------- |
| 10 | + | |
| 11 | + | WHAT HAPPEND? |
| 12 | + | ------------------------------------------------------------ |
| 13 | + | 1. We have PENETRATE your network and COPIED data. |
| 14 | + | * We have penetrated entire network including backup system and researched all about your data. |
| 15 | + | * And we have extracted all of your networks including sub offices and your service clients networks valuable data and copied them to private cloud storage. |
| 16 | + | |
| 17 | + | 2. We have ENCRYPTED some your files. |
| 18 | + | While you are reading this message, it means you found your files and data has been ENCRYPTED by world's strongest ransomware. |
| 19 | + | We have access to all of your sub offices and client service networks but didn't lock them all for your brand and privacy. |
| 20 | + | We can solve this issue sliently and smoothly without 3rd parties and we decided lock only some of your main network only. |
| 21 | + | But don't worry, we can restore everything to the original without harming your business. |
| 22 | + | |
| 23 | + | There is only one possible way to get back your systems and business - CONTACT us via LIVE CHAT and pay for the special |
| 24 | + | MEDUSA DECRYPTOR and DECRYPTION KEYs, Data deletion, Keep silent in media. |
| 25 | + | This MEDUSA DECRYPTOR will restore your entire network, This will take less than 1 business day. |
| 26 | + | |
| 27 | + | |
| 28 | + | WHAT GUARANTEES? |
| 29 | + | --------------------------------------------------------------- |
| 30 | + | We can post your data to the public and send emails to your customers. |
| 31 | + | We have professional OSINTs and media team for leak data to telegram, facebook, twitter channels and top news websites. Have a look about us on twitter. |
| 32 | + | |
| 33 | + | You can suffer significant problems due disastrous consequences, leading to loss of valuable intellectual property and other sensitive information, |
| 34 | + | costly incident response efforts, information misuse/abuse, loss of customer trust, brand and reputational damage, legal and regulatory issues. |
| 35 | + | After paying for the data breach and decryption, we guarantee that your data will never be leaked and this is also for our reputation. |
| 36 | + | |
| 37 | + | YOU should be AWARE! |
| 38 | + | --------------------------------------------------------------- |
| 39 | + | If you're not in main chile office, inform your supervisors and stay calm! |
| 40 | + | We will speak only with an authorized person. It can be the CEO, top management, etc. |
| 41 | + | In case you are not such a person - DON'T CONTACT US! Your decisions and action can result in serious harm to your company! |
| 42 | + | |
| 43 | + | |
| 44 | + | If you do not contact us within 3 days, We will start publish your case to our official blog and everybody will start notice your incident! |
| 45 | + | If you do not contact us within 5 days, We will start publish your case and leak video on all social channels and send emails to your customers! |
| 46 | + | --------------------[ Official blog tor address ]-------------------- |
| 47 | + | Using TOR Browser(https://www.torproject.org/download/): |
| 48 | + | |
| 49 | + | http://medusaxko7jxtrojdkxo66j7ck4q5tgktf7uqsqyfry4ebnxlcbkccyd.onion/ |
| 50 | + | |
| 51 | + | |
| 52 | + | CONTACT US! |
| 53 | + | ----------------------[ Your company live chat address ]--------------------------- |
| 54 | + | Using TOR Browser(https://www.torproject.org/download/): |
| 55 | + | |
| 56 | + | http://medusakxxtp3uo7vusntvubnytaph4d3amxivbggl3hnhpk2nmus34yd.onion/[snip] |
| 57 | + | |
| 58 | + | Or Use Tox Chat Program(https://qtox.github.io/) |
| 59 | + | Add user with our tox ID and wait 24h : 4AE245548F2A225882951FB14E9BF87EE01A0C10AE159B99D1EA62620D91A372205227254A9F |
| 60 | + | |
| 61 | + | Our support email: ( [email protected] ) |
| 62 | + | |
| 63 | + | Company identification hash: |
| 64 | + | [snip] |
| 65 | + | |