← Back to Gunra profile

Gunra — Ransom Notes

These are the actual ransom notes used by the gunra ransomware group when communicating with victims. Ransom notes are left on compromised systems to inform victims of the attack and provide instructions for payment. Studying these notes helps security professionals understand threat actor tactics and communication patterns.
Disclaimer: These notes are displayed for educational and research purposes only. The URLs and contact methods mentioned in these notes are operated by criminal organizations. Do not interact with them. Source: Ransomware.live
📄 R3ADM3
Your data has been encrypted, and we have taken copies of certain sensitive files. This encryption was carried out for financial reasons, and a payment will be required before we can provide the tools needed to restore your data. You will not be able to restore your data without our assistance. We can ensure full recovery if we work together. To show that we are able to restore your files, we can decrypt a few non-critical files at no cost. If we reach an agreement, we will keep all discussions private and delete the data we took. Please see the contact information below for the next steps. ========================== How to Contact Us ========================== Please download Tor Browser from the URL https://www.torproject.org/ Then install and open it. Then connect to the URL below and log in with the given credentials. Contact URL: http://nsnhzysbntsqdwpys6mhml33muccsvterxewh5rkbmcab7bg2ttevjqd.onion Client ID: [snip] Initial password: [snip]
📄 R3ADM3_2
======================================================================= Gunra Ransomware Group Black Hole LLC ======================================================================= Your data has been encrypted, and we have taken copies of certain sensitive files. This encryption was carried out for financial reasons, and a payment will be required before we can provide the tools needed to restore your data. You will not be able to restore your data without our assistance. We can ensure full recovery if we work together. To show that we are able to restore your files, we can decrypt a few non-critical files at no cost. If we reach an agreement, we will keep all discussions private and delete the data we took. Please see the contact information below for the next steps. ========================== How to Contact Us ========================== Please download Tor Browser from the URL https://www.torproject.org/ Then install and open it. Then connect to the URL below and log in with the given credentials. Contact URL: http://nms.lgiil72vkmdtbc3qv4tyq6wedyjxqr2qd4ze7xl2cxgerdnymxj7soqd.onion Client ID: [snip] Initial password: [snip]