All of your important files, servers, backups and databases have been encrypted with military-grade algorithms. Do not attempt to recover them yourself.
We control your systems now. Nothing moves without our key. Any attempt to restore, rebuild or involve “experts” will be detected and may result in permanent data loss.
Your IT security was… insufficient. We entered your network, escalated privileges, extracted credentials, and encrypted your assets. This is not personal — just business.
You must contact us using the identifier below. Only we can restore your systems. Panic, delays, or “investigations” will not help you.
We can demonstrate the ability to decrypt one small file. Contact us with your Victim ID.
Failure to cooperate will result in permanent loss of your data.