Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

Negotiation Chat – Akira

These negotiation chats are offered to you by Valéry Marchive and Julien Mousqueton.

Chat ID: 20240301

Victim Avatar
> hi
Victim Avatar
> hi
Victim Avatar
> hi
Victim Avatar
> anybody out there?
Victim Avatar
> hello?
> Hello. You've reached an Akira support chat. Currently, we are preparing the list of data we took from your network. For now you have to know that dealing with us is the best possible way to settle this quick and cheap. Keep in touch and be patient with us. We will reach out to you soon. Do you have a permission to conduct a negotiation on behalf of your organization? Once we get a response you will be provided with all the details.
Gang Avatar
Victim Avatar
> nobody seems to be there, we will come back later
> Do you see our messages?
Gang Avatar
Victim Avatar
> hi there, got another tor browser, now I see your messages
Victim Avatar
> yes, I have a permission to negotiate on behalf of my organization
> Please wait for details.
Gang Avatar
Victim Avatar
> hello?
Victim Avatar
> I can't see any message after your "Do you see our messages?"
Victim Avatar
> I will come back to check new messages
Victim Avatar
> hello?
> Can you see my message?
Gang Avatar
Victim Avatar
> yes
Victim Avatar
> now I see "Can you see my message?", but I had to log out and log in again
Victim Avatar
> it seems that I don't get an update in the chat directly
Victim Avatar
> we will come back later as "please wait" seems to be a bit longer
> List.rar // 2.48 MB
Gang Avatar
> These files were taken from your network prior to encryption. You can pick 2-3 random files from the list and we will upload them to this chat as a proof of possession. To prove that we can properly decrypt your data you can upload 2-3 encrypted files to our chat and we will upload decrypted copies back.
Gang Avatar
Victim Avatar
> I got the list and will check which files we want to see as prove of possession
> Standing by.
Gang Avatar
Victim Avatar
> we would like to see the following 3 files:
Victim Avatar
> D:\[redacted].log
Victim Avatar
> D:\[redacted].refs
Victim Avatar
> D:\[redacted].png
> Please wait.
Gang Avatar
Victim Avatar
> Take your time, I will come back on monday
Victim Avatar
> hi there, back again and ready to receive your files
> The files will be uploaded shortly.
Gang Avatar
> files.rar // 19.6 KB
Gang Avatar
> Please review. Give me encrypted files asap, if you want to test our decryption tool.
Gang Avatar
Victim Avatar
> got your files and check them, will come back with encrypted files asap
> We are standing by to the files.
Gang Avatar
Victim Avatar
> abc.akira // 21.6 KB
Victim Avatar
> uploaded the one file to test the decryption tool
> abc // 21.1 KB
Gang Avatar
Victim Avatar
> ok, matches, so: what next?
> So, we've gone through your files to define your financial abilities. We've been looking through your bank statements, net income, cyber liability limits, financial audits - all the info that might help us to calculate our demand to you. We're willing to set a $350,000 price for ALL the services we offer: 1) full decryption assistance; 2) evidence of data removal; 3) security report on vulnerabilities we found; 4) guarantees not to publish or sell your data; 5) guarantees not to attack you in the future. Let me know whether you're interested in a whole deal or in parts. This will affect the final price.
Gang Avatar
Victim Avatar
> We decline and will not pay anything. This conversion is over.
> OK. Thank you for the information.
Gang Avatar