List of notes

readme2.txt

If you are reading this, then you have been the victim of a cyber attack. We call ourselves Fog and we take responsibility for this incident. You can check out our blog where we post company data: xbkv2qey6u3gd3qxcojynrt4h5sgrhkar6whuo74wo63hijnn677jnyd.onion You might appear there if you opt out of our communication.
We are the ones who encrypted your data and also copied some of it to our internal resource. The sooner you contact us, the sooner we can resolve this incident and get you back to work.
To contact us you need to have Tor browser installed:

1. Follow this link: xql562evsy7njcsngacphc2erzjfecwotdkobn3m4uxu2gtqh26newid.onion
2. Enter the code: [snip]
3. Now we can communicate safely.

If you are decision-maker, you will get all the details when you get in touch. We are waiting for you.

readme.txt

If you are reading this, then you have been the victim of a cyber attack. We call ourselves Fog and we take responsibility for this incident. We are the ones who encrypted your data and also copied some of it to our internal resource. The sooner you contact us, the sooner we can resolve this incident and get you back to work.
To contact us you need to have Tor browser installed:

1. Follow this link: xql562evsy7njcsngacphc2erzjfecwotdkobn3m4uxu2gtqh26newid.onion
2. Enter the code: [snip]
3. Now we can communicate safely.

If you are decision-maker, you will get all the details when you get in touch. We are waiting for you.