Greetings! Your corporate network was attacked by SafePay team.
Your IT specialists made a number of mistakes in setting up the security of your corporate network, so we were able to spend quite a long period of time in it and compromise you.
It was the misconfiguration of your network that allowed our experts to attack you, so treat this situation as simply as a paid training session for your system administrators.
We ve spent the time analyzing your data, including all the sensitive and confidential information. As a result, all files of importance have been encrypted and the ones of most interest to us have been stolen and are now stored on a secure server for further exploitation and publication on the Web with an open access.
Now we are in possession of your files such as: financial statements, intellectual property, accounting records, lawsuits and complaints, personnel and customer files, as well as files containing information on bank details, transactions and other internal documentation.
Furthermore we successfully blocked most of the servers that are of vital importance to you, however upon reaching an agreement, we will unlock them as soon as possible and your employees will be able to resume their daily duties.
We are suggesting a mutually beneficial solution to that issue. You submit a payment to us and we keep the fact that your network has been compromised a secret, delete all your data and provide you with the key to decrypt all your data. WE ARE THE ONES WHO CAN CORRECTLY DECRYPT YOUR DATA AND RESTORE YOUR INFRASTRUCTURE IN A SHORT TIME. DO NOT TRY TO DECRYPT YOUR FILES YOURSELF, YOU WILL NOT BE ABLE TO DO THIS, YOU WILL ONLY DAMAGE THEM AND WE WILL NOT BE ABLE TO RESTORE THEM.
In the event of an agreement, our reputation is a guarantee that all conditions will be fulfilled. No one will ever negotiate with us later on if we don't fulfill our part and we recognise that clearly! We are not a politically motivated group and want nothing more than money. Provided you pay, we will honour all the terms we agreed to during the negotiation process.
In order to contact us, please use chat below, you have 10 days to contact us, after this time a blog post will be made with a timer for 3 days before the data is published and you will no longer be able to contact us.
To contact us follow the instructions:
Install and run Tor Browser from https://www.torproject.org/download/
Go to http://dgcg5ncjab6scb7fnk7gx5php4lbpxjy2jjnu3apnkxyippqf6yhw3ad.onion
Reserve Link: http://oxly5vxvvhi5fv5vsvj3kvlqeprbijitycqisylaxzf324bn7e4qr2ad.onion
Log in with ID: [snip]
Contact and wait for a reply, we guarantee that we will reply as soon as possible, and we will explain everything to you once again in more detail.
Our blog:
http://j3dp6okmaklajrsk6zljl5sfa2vpui7j2w6cwmhmmqhab6frdfbphhid.onion
http://nz4z6ruzcekriti5cjjiiylzvrmysyqwibxztk6voem4trtx7gstpjid.onion
Our TON blog:
tonsite://safepay.ton
You can connect through your Telegramm account.
readme_safepay.txt
G r e e t i n g s ! Y o u r c o r p o r a t e n e t w o r k w a s a t t a c k e d b y S a f e P a y t e a m .
Y o u r I T s p e c i a l i s t s m a d e a n u m b e r o f m i s t a k e s i n s e t t i n g u p t h e s e c u r i t y o f y o u r c o r p o r a t e n e t w o r k , s o w e w e r e a b l e t o s p e n d q u i t e a l o n g p e r i o d o f t i m e i n i t a n d c o m p r o m i s e y o u .
I t w a s t h e m i s c o n f i g u r a t i o n o f y o u r n e t w o r k t h a t a l l o w e d o u r e x p e r t s t o a t t a c k y o u , s o t r e a t t h i s s i t u a t i o n a s s i m p l y a s a p a i d t r a i n i n g s e s s i o n f o r y o u r s y s t e m a d m i n i s t r a t o r s .
W e v e s p e n t t h e t i m e a n a l y z i n g y o u r d a t a , i n c l u d i n g a l l t h e s e n s i t i v e a n d c o n f i d e n t i a l i n f o r m a t i o n . A s a r e s u l t , a l l f i l e s o f i m p o r t a n c e h a v e b e e n e n c r y p t e d a n d t h e o n e s o f m o s t i n t e r e s t t o u s h a v e b e e n s t o l e n a n d a r e n o w s t o r e d o n a s e c u r e s e r v e r f o r f u r t h e r e x p l o i t a t i o n a n d p u b l i c a t i o n o n t h e W e b w i t h a n o p e n a c c e s s .
N o w w e a r e i n p o s s e s s i o n o f y o u r f i l e s s u c h a s : f i n a n c i a l s t a t e m e n t s , i n t e l l e c t u a l p r o p e r t y , a c c o u n t i n g r e c o r d s , l a w s u i t s a n d c o m p l a i n t s , p e r s o n n e l a n d c u s t o m e r f i l e s , a s w e l l a s f i l e s c o n t a i n i n g i n f o r m a t i o n o n b a n k d e t a i l s , t r a n s a c t i o n s a n d o t h e r i n t e r n a l d o c u m e n t a t i o n .
F u r t h e r m o r e w e s u c c e s s f u l l y b l o c k e d m o s t o f t h e s e r v e r s t h a t a r e o f v i t a l i m p o r t a n c e t o y o u , h o w e v e r u p o n r e a c h i n g a n a g r e e m e n t , w e w i l l u n l o c k t h e m a s s o o n a s p o s s i b l e a n d y o u r e m p l o y e e s w i l l b e a b l e t o r e s u m e t h e i r d a i l y d u t i e s .
W e a r e s u g g e s t i n g a m u t u a l l y b e n e f i c i a l s o l u t i o n t o t h a t i s s u e . Y o u s u b m i t a p a y m e n t t o u s a n d w e k e e p t h e f a c t t h a t y o u r n e t w o r k h a s b e e n c o m p r o m i s e d a s e c r e t , d e l e t e a l l y o u r d a t a a n d p r o v i d e y o u w i t h t h e k e y t o d e c r y p t a l l y o u r d a t a . W E A R E T H E O N E S W H O C A N C O R R E C T L Y D E C R Y P T Y O U R D A T A A N D R E S T O R E Y O U R I N F R A S T R U C T U R E I N A S H O R T T I M E . D O N O T T R Y T O D E C R Y P T Y O U R F I L E S Y O U R S E L F , Y O U W I L L N O T B E A B L E T O D O T H I S , Y O U W I L L O N L Y D A M A G E T H E M A N D W E W I L L N O T B E A B L E T O R E S T O R E T H E M .
I n t h e e v e n t o f a n a g r e e m e n t , o u r r e p u t a t i o n i s a g u a r a n t e e t h a t a l l c o n d i t i o n s w i l l b e f u l f i l l e d . N o o n e w i l l e v e r n e g o t i a t e w i t h u s l a t e r o n i f w e d o n '