“Is Oxygen Saturation Normal?”: The Most Bizarre Ransomware Chat You’ll Read
Most ransomware negotiations follow a corporate script: the attacker demands millions, the victim pleads poverty, and they meet somewhere in the middle.
But this negotiation is different.
It isn’t just a clash of numbers; it is a clash of realities. On one side, LockBit, cybercriminal cartel demanding $1.4 million. On the other, a French IT administrator who isn't just battling a locked network—they are battling a fever.
Throughout the chat, the victim weaponizes their own illness to stall the attackers, dismantling the high-pressure sales tactics of the ransomware gang with a simple, biological excuse:
“I'm sorry i'm sick i have the covid”
What follows is one of the most surreal exchanges in cybercrime history, where death threats mix with medical advice, and "blood oxygen saturation" becomes part of the negotiation strategy.
The $1.4 Million Opening
The chat begins with the standard LockBit aggression. The attacker lays out a binary choice: pay up, or watch your customer database leak.
“You have 2 options... start cooperating with us, pay the amount we need... Either you keep silent and refuse us and we will start publishing the personal data of your customers.”
They open with a massive anchor: $1,400,000.
Usually, this is where the panic sets in. The victim is expected to beg for a discount or ask for more time. Instead, the victim pivots to technical skepticism. They check the sample files provided by LockBit and shrug them off.
“In fact the files that i've downloaded is an old files, if you don't have a fresher sample, I wouldn't buy it at this price..”
The attacker tries to regain control, insisting the data is relevant and threatening to publish it gradually to cause the most damage. They tell the victim to "think about your reputation."
But the victim has a card that LockBit’s playbook doesn’t account for.
The Sick Note Defense
When the attacker pushes for a quick resolution, the victim stops the clock.
“See you later .. i'm sorry i'm sick i have the covid”
The mood changes instantly. The criminal, who just threatened to destroy the company's reputation, suddenly switches to a polite bedside manner.
“Good luck. Get well.”
This is the "customer service" mask of modern ransomware. They want to be seen as reasonable business partners. But the victim uses this goodwill as a shield. When LockBit tries to force a meeting with the decision-makers ("I will go to your meeting..."), the victim simply refuses.
“I can't go to a meeting I have covid, but I already know their answer..”
It is a brilliant tactical move. You cannot bully someone who is physically incapable of attending the negotiation. The attacker is forced to bid against themselves, unilaterally dropping the price from $1.4 million to $600,000 just to keep the conversation alive.
“If I Have Marbles”
As the price drops, the victim continues to plead powerlessness. They paint a picture of a paralyzed organization where "decision-making circuits are very very long."
To illustrate their lack of leverage, the victim uses a French idiom that clearly gets lost in translation, baffling the Russian operators.
“Ok if I have marbles I can negotiate without marbles I cannot .. it"s a french expression”
The attacker, perhaps amused or just confused, decides to roll with it.
“I will definitely remember this expression. By the way, do not forget about another marbles called the decoder program”
It’s a moment of dark comedy. The attacker is trying to be witty, but they are clearly losing control of the pace. They send more proof—Excel sheets of client history and box contents—hoping to prove they have the "marbles" to destroy the company.
The victim’s response? A casual dismissal.
“You don't have more crunchy?”
The Doctor Is In
The strangest moment of the entire log happens when the conversation drifts away from money entirely.
The attacker, perhaps trying to build rapport or genuinely curious, circles back to the victim’s health.
“How are you feeling? Is oxygen saturation in the blood normal?”
It is a stunning glimpse into the human side of the operator. For a split second, they aren't a cyber-extortionist; they are just another person who lived through the pandemic.
The victim plays it straight:
“It's good for the moment, I have a fever and I cough”
This shared humanity, however, doesn't stop the crime. Immediately after discussing oxygen levels, the victim asks for a Bitcoin wallet to "prepare the ground," and the Attacker snaps back into business mode, warning that wallets are "valid for a limited time."
“Is It A Good Business?”
Emboldened by the stalled talks, the victim starts asking meta-questions about the ransomware industry itself.
“Is it a good business ransomware?”
The attacker’s answer is surprisingly candid, revealing the psychological toll of their trade:
“The returns are certainly good, but you have to evaluate the consequences and live with it. This business does not forgive mistakes.”
The victim replies with a philosophical acceptance of their respective roles: “I understand, each his cross ;-)”
This banter serves a strategic purpose. It eats up time. It keeps the attacker engaged without promising a single dollar. And while they chat about the weather in Russia (“is it sunny in russia?”), the victim’s organization is likely restoring backups or consulting legal counsel.
The $150k Floor and The Walkaway
Eventually, the "management" returns with a verdict. The victim, playing the role of the helpless messenger, delivers the bad news.
“Sorry management won't go over $100,000... up to you.”
The attacker is furious. They have already dropped from $1.4M to $600k. Now they are being offered 7% of their initial demand.
“No, it's up to you... 300.000$, our last offer to you.”
They threaten to publish everything. They send links to the blog post where the data is staged. They set a 4-hour timer.
The victim offers a final nudge to $150,000, but when LockBit refuses to budge from $300,000, the victim’s demeanor shifts from "sick and helpful" to "done."
“Management doesn’t want to pay anymore, not even $100,000, it has reconsidered its decision ... i finished my work .. bye”
There is no panic. No final plea. Just a simple “thanks” when the attacker sends the link to the published leak.
Why This Negotiation Stands Out
This transcript is a masterclass in passive resistance.
- The "Sick" Leverage: By claiming COVID, the victim removed themselves as a decision-maker. You can't pressure a fever. This forced the attacker to negotiate with a ghost ("management") while the person in the chat was just a sick messenger.
- Shrinking the Ransom: The attacker started at $1.4 million. By delaying, stalling, and claiming poverty, the victim dragged them down to $300,000—a 78% drop—without ever actually intending to pay.
- Humanizing the Enemy: The "oxygen saturation" and "weather in Russia" talk disrupted the attacker’s rhythm. It is hard to be terrifying when you are discussing medical symptoms.
- The Clean Break: Most victims linger, terrified of the leak. This victim realized that if the price wasn't right ($100k), the data leak was inevitable. Once that decision was made, they cut the cord instantly.
In the end, LockBit posted the data. But they didn't get a cent, They wanted a business deal; they got a patient with a fever. It serves as a reminder that against the sophisticated machinery of modern cybercrime, the most effective weapon isn't always a decryptor. Sometimes, it is a sick note, a lack of "marbles," and the confidence to simply say bye.