Created
November 8, 2024 16:38
-
-
Save gleeda/988da614e6740fac66dbaa6d92121302 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Greetings! Your corporate network was attacked by SafePay team. | |
| Your IT specialists made a number of mistakes in setting up the security of your corporate network, so we were able to spend quite a long period of time in it and compromise you. | |
| It was the misconfiguration of your network that allowed our experts to attack you, so treat this situation as simply as a paid training session for your system administrators. | |
| ve spent the time analyzing your data, including all the sensitive and confidential information. As a result, all files of importance have been encrypted and the ones of most interest to us have been stolen and are now stored on a secure server for further exploitation and publication on the Web with an open access. | |
| Now we are in possession of your files such as: financial statements, intellectual property, accounting records, lawsuits and complaints, personnel and customer files, as well as files containing information on bank details, transactions and other internal documentation. | |
| Furthermore we successfully blocked most of the servers that are of vital importance to you, however upon reaching an agreement, we will unlock them as soon as possible and your employees will be able to resume their daily duties. | |
| We are suggesting a mutually beneficial solution to that issue. You submit a payment to us and we keep the fact that your network has been compromised a secret, delete all your data and provide you with the key to decrypt all your data. | |
| In the event of an agreement, our reputation is a guarantee that all conditions will be fulfilled. No one will ever negotiate with us later on if we don't fulfill our part and we recognise that clearly! We are not a politically motivated group and want nothing more than money. Provided you pay, we will honour all the terms we agreed to during the negotiation process. | |
| In order to contact us, please use emails below: | |
| 1. [redacted]@protonmail.com | |
| 2. [redacted]@protonmail.com | |
| Our blog: | |
| http://[redacted].onion | |
| Download and install Tor Browser https://www.torproject.org/ | |
| Contact and wait for a reply, we guarantee that we will reply as soon as possible, and we will explain everything to you once again in more detail. | |
| Our TON blog: | |
| tonsite://safepay.ton | |
| You can connect through your Telegramm account. Greetings! Your corporate network was attacked by SafePay team. | |
| Your IT specialists made a number of mistakes in setting up the security of your corporate network, so we were able to spend quite a long period of time in it and compromise you. | |
| It was the misconfiguration of your network that allowed our experts to attack you, so treat this situation as simply as a paid training session for your system administrators. | |
| ve spent the time analyzing your data, including all the sensitive and confidential information. As a result, all files of importance have been encrypted and the ones of most interest to us have been stolen and are now stored on a secure server for further exploitation and publication on the Web with an open access. | |
| Now we are in possession of your files such as: financial statements, intellectual property, accounting records, lawsuits and complaints, personnel and customer files, as well as files containing information on bank details, transactions and other internal documentation. | |
| Furthermore we successfully blocked most of the servers that are of vital importance to you, however upon reaching an agreement, we will unlock them as soon as possible and your employees will be able to resume their daily duties. | |
| We are suggesting a mutually beneficial solution to that issue. You submit a payment to us and we keep the fact that your network has been compromised a secret, delete all your data and provide you with the key to decrypt all your data. | |
| In the event of an agreement, our reputation is a guarantee that all conditions will be fulfilled. No one will ever negotiate with us later on if we don't fulfill our part and we recognise that clearly! We are not a politically motivated group and want nothing more than money. Provided you pay, we will honour all the terms we agreed to during the negotiation process. | |
| In order to contact us, please use emails below: | |
| 1. [redacted]@protonmail.com | |
| 2. [redacted]@protonmail.com | |
| Our blog: | |
| http://[redacted].onion | |
| Download and install Tor Browser https://www.torproject.org/ | |
| Contact and wait for a reply, we guarantee that we will reply as soon as possible, and we will explain everything to you once again in more detail. | |
| Our TON blog: | |
| tonsite://safepay.ton | |
| You can connect through your Telegramm account. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment