Ransom Notes for   Eldorado

HOW_RETURN_YOUR_DATA_2.TXT


    Hello! 

Your files have been stolen from your network and encrypted with a strong algorithm. We work for money and are not associated with politics. All you need to do is contact us and pay.

--- Our communication process:

	1. You contact us.
	1. We send you a list of files that were stolen.
	2. We decrypt 1 file to confirm that our decryptor works.
	3. We agree on the amount, which must be paid using BTC.
	4. We delete your files, we give you a decryptor.
	5. We give you a detailed report on how we compromised your company, and recommendations on how to avoid such situations in the future.
   
--- Client area (use this site to contact us):

	Link for Tor Browser: http://panela3eefdzfzxzxcshfnbustdprtlhlbe3x2fqomdz7t33iqtzvjyd.onion/Url=[snip]
	>>> to begin the recovery process.
	
	* In order to access the site, you will need Tor Browser, 
	  you can download it from this link: https://www.torproject.org/

--- Recommendations: 

	DO NOT RESET OR SHUTDOWN - files may be damaged.
	DO NOT RENAME OR MOVE the encrypted and readme files.
	DO NOT DELETE readme files.

--- Important:

	If you refuse to pay or do not get in touch with us, we start publishing your files.


	Еhe decryptor will be destroyed and the files will be published on our blog.
	
	Blog: http://dataleakypypu7uwblm5kttv726l3iripago6p336xjnbstkjwrlnlid.onion

Sincerely!

    

HOW_RETURN_YOUR_DATA.TXT


    To the board of directors.

Your network has been attacked through various vulnerabilities found in your system.
We have gained full access to the entire network infrastructure.

All your confidential information about all employees and all partners and developments has been downloaded to our servers and is located with us.

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

Our team has an extensive background in legal and so called white hat hacking.
However, clients usually considered the found vulnerabilities to be minor and poorlyr\n
paid for our services.
So we decided to change our business model. Now you understand how important it isr\n

to allocate a good budget for IT security.
This is serious business for us and we really don't want to ruin your privacy,r\n
reputation and a company.
We just want to get paid for our work whist finding vulnerabilities in various networks.

Your files are currently encrypted with our tailor made state of the art algorithm.
Don't try to terminate unknown processes, don't shutdown the servers, do not unplug drives,
all this can lead to partial or complete data loss.

We have also managed to download a large amount of various, crucial data from your network.
A complete list of files and samples will be provided upon request.

We can decrypt a couple of files for free. The size of each file must be no more than 5 megabytes.

All your data will be successfully decrypted immediately after your payment.
You will also receive a detailed list of vulnerabilities used to gain access to your network.
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

If you refuse to cooperate with us, it will lead to the following consequences for your company:
1. All data downloaded from your network will be published for free or even sold
2. Your system will be re-attacked continuously, now that we know all your weak spotsr

3. We will also attack your partners and suppliers using info obtained from your network
4. It can lead to legal actions against you for data breaches

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
                   !!!!Instructions for contacting our team!!!!
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
  ---> Download and install TOR browser from this site : https://torproject.org
  ---> For contact us via LIVE CHAT open our website : http://panelqbinglxczi2gqkwderfvgq6bcv5cbjwxrksjtvr5xv7ozh5wqad.onion/Url=[snip]
  ---> If Tor is restricted in your area, use VPN
  ---> All your Data will be published in 7 Days if NO contact made
  ---> Your Decryption keys will be permanently destroyed in 3 Days if no contact made
  ---> Your Data will be published if you will hire third-party negotiators to contact us