Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business

Ransom Notes:

IOC

				--> ATTENTION <--
DO NOT:
	Modify, rename, copy or move any files or you
	can DAMAGE them and decryption will be impossible
	Use any third-party or public Decryption software, it also may DAMAGE files
	Shutdown or Reset your system, it can DAMAGE files
	Hire any third-party negotiators (recovery/police and etc)

	Your security perimeter was BREACHED
	Critically important servers and hosts were completely ENCRYPTED
	This README-FILE here for you to show you our presence
	in your's network and avoid any silence about hacking and leakage
	Also, we has DOWNLOADED your most SENSITIVE Data just in case if you will NOT PAY,
	than everything will be PUBLISHED in Media and/or SOLD to any third-party

1) WHAT SHOULD YOU DO:
	You have to contact us as soon as possible (you can find contacts below)
	You should purchase our decryption tool, so will be able to restore your files
	Without our Decryption keys it's impossible
	You should make a Deal with us, to avoid your Data leakage

2) YOUR OPTIONS:
	IF NO CONTACT OR DEAL MADE IN 3 DAYS:
	Decryption key will be deleted permanently and recovery will be impossible
	All your Data will be Published and/or Sold to any third-parties
	Information regarding vulnerabilities of your network also can be published and/or shared

	IF WE MAKE A DEAL:
	We will provide you with the Decryption Key and Manual how-to-use
	We will remove all your files from our file-storage with proof of Deletion
	We guarantee to avoid sharing any details with third-parties
	We will provide you the penetration report and list of security-recommendations

			Instructions for contacting our team

	Download & Install TOR browser: https://torproject.org
	For contact us via LIVE CHAT open our
	> Website:  xjakumydulag5z65c7kd4agbxfyajpbrj6wfanj3koyhb5asq2x4e7yd.onion
	> Login:    [snip]
	> Password: [snip]
	If Tor is restricted in your area, use VPN
	All your Data will be published in 3 Days if NO contact made
	Your Decryption keys will be permanently destroyed in 3 Days if no contact made
	Your Data will be published if you will hire third-party negotiators to contact us

Indicators of Compromise
Type IOC
onion url http://xjakumydulag5z65c7kd4agbxfyajpbrj6wfanj3koyhb5asq2x4e7yd.onion