✖ YOUR NETWORK HAS BEEN COMPROMISED ✖

All of your important files, servers, backups and databases have been encrypted with military-grade algorithms. Do not attempt to recover them yourself.

We control your systems now. Nothing moves without our key. Any attempt to restore, rebuild or involve “experts” will be detected and may result in permanent data loss.

WHAT HAPPENED?

Your IT security was… insufficient. We entered your network, escalated privileges, extracted credentials, and encrypted your assets. This is not personal — just business.

WHAT SHOULD YOU DO?

You must contact us using the identifier below. Only we can restore your systems. Panic, delays, or “investigations” will not help you.

Victim ID: e5bff683-1a70-4f05-bd6a-e624e7131160 Support Portal: http://m4g2xqk6y7j9d0hvn0r5u2s3p8tq4z9y2c1b0f7k3d3e1r5j8j.onion/

PROOF?

We can demonstrate the ability to decrypt one small file. Contact us with your Victim ID.

IMPORTANT WARNINGS

Failure to cooperate will result in permanent loss of your data.