Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

Ransom Note: BlackField-ReadMe.txt

Group: Blackfield

We are the BlackField.

Your company Servers are locked and Data has been taken to our servers. This is serious.

Whatever who you are and what your title is if you're reading this it means the internal infrastructure of your company is fully or partially
dead, all your backups - virtual, physical - everything that we managed to reach - are completely removed. Moreover,
we have taken a great amount of your corporate data prior to encryption.

Well, for now let's keep all the tears and resentment to ourselves and try to build a constructive dialogue.
We're fully aware of what damage we caused by locking your internal sources. At the moment, you have to know

1. Dealing with us you will save A LOT due to we are not interested in ruining your financially. We will study in depth your finance,
bank & income statements, your savings, investments etc. and present our reasonable demand to you. If you have an active cyber insurance,
let us know and we will guide you how to properly use it. Also, dragging out the negotiation process will lead to failing of a deal.

2. Paying us you save your TIME, MONEY, EFFORTS and be back on track within 24 hours approximately.
Our decryptor works properly on any files or systems,
so you will be able to check it by requesting a test decryption service from the beginning of our conversation. If you decide to recover on your own,
keep in mind that you can permanently lose access to some files or accidently corrupt them - in this case we won't be able to help.

3. The security report or the exclusive first-hand information that you will receive upon reaching an agreement is of a great value,
since NO full audit of your network will show you the vulnerabilities that we've managed to detect and used in order to get into,
identify backup solutions and upload your data.

4. As for your data, if we fail to agree, we will try to sell personal information/trade secrets/databases/source codes - generally speaking,
everything that has a value on the darkmarket - to multiple threat actors at ones. Then all of this will be published in our blog -

5. We're more than negotiable and will definitely find the way to settle this quickly and reach an agreement which will satisfy both of us.

6. Do not share the ReadME file with any intermediaries or third parties who are not trusted by you.
If you choose to cooperate with middleman websites or third-party individuals and your files become damaged or you are scammed, we bear no responsibility whatsoever.

7.Dont hire recovery companies. Without the key, they cannot decrypt your files, and all they will do is make you waste more time and money.
They do not care about your business. They may claim to be good negotiators, but that's not true and they usually fail. So, handle the negotiations yourself.

8.Dont trust YouTube videos, individuals, or software that claim they can decrypt your files.
They are scammers and may cause the permanent loss of your data. However, if you want to be sure, you can try their methods on files that are not important to you,
or make backups before testing. But rest assured, we are the only ones who can fully restore all your files.

Failure to Negotiate:
If you refuse to negotiate with us and ignore our goodwill and honesty, you will bear full responsibility for all the consequences that follow.

A: Initially, we will publish all of your important and confidential data (including projects, customer information, confidential documents
and financial records) for sale or even for free on our blog

B: We will continue attacking your network at different times in the future. Additionally,
we will offer your login credentials and discovered vulnerabilities for sale.

C: We will email all your customers to inform them that their personal information has been leaked and published online
and they will have the right to take legal action against you for exposing their private data. In addition,
we will spread the news of your hack and the leak of your data on social media to destroy your reputation


If you're indeed interested in our assistance and the services we provide you can reach out to us following simple instructions:


Primary email: yagamuchi@mailum.com

use this as the title of your email: [snip]

Secondary email (backup email in case we didn't answer you in 24h): blackflsupp@atomicmail.io

Keep in mind that the faster you will get in touch, the less damage we cause.

We only have the two contact methods listed above. If you contact anyone else besides these two,
we do not accept any responsibility under any circumstances.

Keep in mind that negotiating with us is much less costly and much less troublesome than not negotiating,
so be brave and reach out to us as soon as possible to avoid further losses.

#OUR TOR LEAK BLOG :

1 - Download tor browser https://www.torproject.org/download

2 - Go to one of the links below:

http://xcou7t6a4qlecsr7ipmxlwsseghxbebqltnxwaurxx3bbsbts7ljacqd.onion

Only managers or those authorized by the organization to conduct a negotiation should contact*

Indicators of Compromise
Type IOC
email yagamuchi@mailum.com
email blackflsupp@atomicmail.io
onion url http://xcou7t6a4qlecsr7ipmxlwsseghxbebqltnxwaurxx3bbsbts7ljacqd.onion