Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business
TENGU.README.txt TENGU Locker
████████╗███████╗███╗░░██╗░██████╗░██╗░░░██╗
╚══██╔══╝██╔════╝████╗░██║██╔════╝░██║░░░██║
░░░██║░░░█████╗░░██╔██╗██║██║░░██╗░██║░░░██║
░░░██║░░░██╔══╝░░██║╚████║██║░░╚██╗██║░░░██║
░░░██║░░░███████╗██║░╚███║╚██████╔╝╚██████╔╝
░░░╚═╝░░░╚══════╝╚═╝░░╚══╝░╚═════╝░░╚═════╝░
Blog:http://longcc4fqrfcqt5lzceutylaxir6h66fp6df3oin6mvwvz6pfdbxc6qd.onion/
We've hacked your network and copied your data.
We've hacked your entire network and searched all your data.
We've copied all your confidential data and uploaded it to a private storage device.
You run a high-value business, and your data is critical.
We've encrypted your files.
As you're reading this message, your files and data have been encrypted by the world's most powerful ransomware.
Your files have been encrypted with a new military-grade encryption algorithm, and you can't decrypt them.
But don't worry, we can decrypt your files.
There's only one way to recover your computers and servers and maintain your privacy: contact us via live chat and pay for the TENGU DECRYPTOR device and private decryption keys.
The TENGU DECRYPTOR will restore your entire network in less than 5 hours. What are the guarantees?
------------------
We can make all your important data public and send emails to your competitors.
We have a dedicated Open Network Intelligence (OSINT) team and a media team specializing in data leaks across Telegram, Facebook, Twitter, and major news sites. You can easily reach us.
You could face major problems with serious consequences, including the loss of valuable intellectual property and other sensitive information, increased incident response costs, misuse of information, loss of customer trust, damage to your brand and reputation, and legal and regulatory issues. After paying the costs of a data breach and decryption, we guarantee that your data will never be leaked, and we remain completely silent to protect our reputation. Be careful!
------------------
We will only speak with authorized individuals. This could be your CEO, senior management, or others.
If you're not one of these people, don't contact us! Your decisions and actions could seriously damage your company!
Inform your superiors and stay calm! If you don't hear from us within 48 hours, we'll start posting your status on our official blog, and everyone will start noticing!
Your Next Steps
└─ Contact us via live chat to start the process and request a decryption test.
1) Download Tor Browser: https://www.torproject.org/download/
2) Chat:http://longcc4fqrfcqt5lzceutylaxir6h66fp6df3oin6mvwvz6pfdbxc6qd.onion/ID
3) Use this code— id —to log in to the chat
| Type | IOC |
|---|---|
onion url
|
http://longcc4fqrfcqt5lzceutylaxir6h66fp6df3oin6mvwvz6pfdbxc6qd.onion/ |
onion url
|
http://longcc4fqrfcqt5lzceutylaxir6h66fp6df3oin6mvwvz6pfdbxc6qd.onion/ID |