+----------------------------------------------------------------------------------------------------------------------+
+ Dear Customer, +
+ +
+ If you are reading this message, it means that: +
+ - your network infrastructure has been compromised, +
+ - critical data was leaked, +
+ - files are encrypted +
+ +
+----------------------------------------------------------------------------------------------------------------------+
+ +
+ 1. THE FOLLOWING IS STRICTLY FORBIDDEN +
+ +
+ 1.1 EDITING FILES ON HDD. +
+ -Renaming, copying or moving any files could DAMAGE the cipher and decryption will be impossible. +
+ +
+ 1.2 USING THIRD-PARTY SOFTWARE. +
+ -Trying to recover with any software can also break the cipher and file recovery will become a problem. +
+ +
+ 1.3 SHUTDOWN OR RESTART THE PC. +
+ -Boot and recovery errors can also damage the cipher. +
+ Sorry about that, but doing so is entirely at your own risk. +
+ +
+----------------------------------------------------------------------------------------------------------------------+
+ +
+ 2. EXPLANATION OF THE SITUATION +
+ +
+ 2.1 HOW DID THIS HAPPEN +
+ +
+ The security of your IT perimeter has been compromised (it's not perfect at all). +
+ +
+ We encrypted your workstations and servers to make the fact +
+ of the intrusion visible and to prevent you from hiding critical data leaks. +
+ +
+ We spent a lot of time researching and finding out the most important directories +
+ of your business, your weak points. +
+ +
+ We have already downloaded a huge amount of critical data and analyzed it. +
+ Now its fate is up to you, it will either be deleted or sold, or shared with the media. +
+ +
+ As a confirmation of the leak, +
+ we will send you 5 any files from the stolen data list of your choice +
+ +
+ 2.2 VALUABLE DATA WE USUALLY STEAL: +
+ - Databases, legal documents, personal information. +
+ - Audit reports. +
+ - Any financial documents +
+ - Work files and corporate correspondence. +
+ - Any backups. +
+ - Confidential documents. +
+ +
+ 2.3 TO DO LIST (best practies) +
+ - Contact us as soon as possible. +
+ - Purchase our decryption tool and decrypt your files. There is no other way to do this. +
+ - Realize that dealing with us is the shortest way to success and secrecy. +
+ - Give up the idea of using decryption help programs, otherwise you will destroy the system permanently. +
+ - Avoid any third-party negotiators and recovery groups. They can become the source of leaks. +
+ +
+----------------------------------------------------------------------------------------------------------------------+
+ +
+ 3. POSSIBLE DECISIONS +
+ +
+ 3.1 NOT MAKING THE DEAL +
+ - After 3 days starting tomorrow your leaked data will be Disclosed or sold. +
+ - We will also send the data to all interested supervisory organizations and the media. +
+ - Decryption key will be deleted permanently and recovery will be impossible. +
+ - Losses from the situation can be measured based on your annual budget. +
+ +
+ 3.2 MAKING THE WIN-WIN DEAL +
+ - You will get the only working Decryption Tool and the how-to-use Manual. +
+ - You will get our guarantees (with log provided) of non-recovarable deletion of all your leaked data. +
+ - You will get our guarantees of secrecy and removal of all traces related to the deal in the Internet. +
+ - You will get our security report on how to fix your security breaches. +
+ +
+----------------------------------------------------------------------------------------------------------------------+
+ +
+ 4. HOW TO CONTACT US +
+ +
+ 247fastdeal@cryptolab.net +
+ ID:TY90PI +
+----------------------------------------------------------------------------------------------------------------------+
+ +
+ 5. RESPONSIBILITY +
+ +
+ 5.1 Breaking critical points of this offer will cause: +
+ - Deletion of your decryption keys. +
+ - Immediate sale or complete Disclosure of your leaked data. +
+ - Notification of government supervision agencies, your competitors and clients. +
+ +
+----------------------------------------------------------------------------------------------------------------------+