The REvil Negotiation: When Ransom Meets Reality

The REvil Negotiation: When Ransom Meets Reality

Ransomware talks are usually full of pressure and fear. Hackers make demands. Victims panic. Someone pays.

But a recent negotiation with REvil shows something different. The victim’s negotiator didn’t just plead. He pushed back. He argued. And in the end, he cut the ransom down from $7.5 million to about $1.27 million.


Setting the Stage: A Company in Crisis

The negotiator started with honesty. He told REvil the company was already in trouble.

“The amount of XMR requested to my client to get the decryption tool ... is huge and my client cannot afford to fully pay your claims. My client is trying to cope with this difficult situation, since it has been heavily struck by the current economic crisis ... with a dramatic fall of sales in the last months.”

He explained that sales had collapsed during COVID. Workers had been laid off. The business had been losing money for years.

Then he made the first offer: $500,000.


REvil Pushes Back

REvil called the offer a joke. They said it wasn’t serious. They gave a “discount,” but only if payment was fast. Then they warned:

“If no, we start publication data part by part to speed up you.”

This is the usual ransomware script. Deadlines. Leaks. Fear.

But the negotiator didn’t change his story. He kept repeating: the company just couldn’t pay that much.


Turning the Tables

REvil tried to use the company’s stolen financials against them. They uploaded reports and insurance documents, pointing to money they thought was available.

The negotiator flipped it back on them:

“Are you sure you are able to read the numbers? My Client has been losing money since 2010… I think you picked the wrong victim and the financial analysis you have performed prior to undertaking the hacking operations is absolutely wrong.”

Instead of looking weak, he made the hackers look foolish.


A Negotiator’s Boldness

Most victims try to sound scared enough to win mercy. Not here. This negotiator went on the attack.

“Maybe you will be able to understand that economics is not hacking and my client is not [redacted] nor [redacted]nor [redacted]...”

At another point, he told them flat out the stolen data wasn’t worth much:

“My client resells commodities ... with a B2B model, there’s no industrial secret to be protected. And again, please believe me that I’m not bluffing on this point.”

He wasn’t begging. He was lecturing.


The Break-Even Point

Then he introduced something new: a break-even number.

He explained that the company could rebuild its systems from scratch for about $800,000. Anything more than that made no sense.

“If my client pays a dollar more, it won’t be convenient for him.”

This gave REvil a clear choice: take less, or get nothing.


Shifting Ground

The hackers kept pushing. They dropped their demand to $5 million. Then $2.5 million.

The negotiator held firm. He even cited other REvil cases he’d worked on:

“This is the sixth time I bumped into REvil and my client has never paid more than 1 M USD.”

That was a bold thing to admit, but it made his offer look realistic.


The Final Stretch

The victim eventually pulled together $1.27 million. That was all they had.

REvil tried one last move. They asked for $1.5 million. But in the end, they accepted the $1.27 million.

They gave the decryptor, with simple instructions:

“To use a decryptor run it as administrator and turn off antivirus before.”

And in a strange twist, they even explained how they broke in:

“We find a login to https://remote.[redacted].com. After that we made a kerberoasting attack and decrypt admin hash ‘12qwer34’. That’s all. You need to use any 2fa solution for your citrix server.”

Hackers giving security advice—almost surreal.


Why This Case Stands Out

This wasn’t a normal negotiation. A few things made it unique:

  • The negotiator argued hard and kept the story consistent.
  • He used the hackers’ stolen data against them.
  • He set a hard ceiling with the break-even point.
  • He openly challenged their logic and even mocked their assumptions.
  • He relied on history, showing that past REvil victims often paid much less.

REvil still got over a million dollars. But that was far less than what they first demanded.


Conclusion

Ransomware talks aren’t just about numbers. They’re about stories. Hackers assume you can pay. If you change that story—and make it stick—you can shift the outcome.

Here, weakness became a weapon. The negotiator used layoffs, losses, and even COVID as leverage. He made the hackers face reality.

And that’s the lesson: in ransomware, words can be worth millions.


Full Transcript

FULL TRANSCRIPT:

Victim: Hello guys,
I am the person in charge to negotiate with you on behalf of my client. 
The amount of XMR requested to my client to get the decryption tool, the
 files back available and not published in the dark web (I have seen 
some exfiltrated data are published on your blog) is huge and my client 
cannot afford to fully pay your claims. My client is trying to cope with
 this difficult situation, since it has been heavily struck by the 
current economic crisis due to the coronavirus pandemic, with a dramatic
 fall of sales in the last months. My client’s net revenues amount to 
EUR 500.000,00 in the last financial statement (2.5 billion as gross 
revenues, which is a not relevant data if you guys are acquainted with 
economics). The financial situation of my client has been catastrophic 
since 2010, with a substantial decrease y/y in net revenues and gross 
operating profits. The cyberattack you have carried out on my client’s 
systems has blocked the company operation and all its internal 
operations have been shut down including deliveries, and as a 
consequence my client is not able to fulfil the market with its copper 
products and get revenues. My client has already had to make budget cuts
 and fire many of its employees or put them on unemployed insurance, 
with devastating effects on families and children amid the economic 
crisis due to Covid19. Therefore, it is impossible for my client to pay 
you 7.5 million USD. According to my client’s financial condition, I 
think he might be considering paying a certain amount in order to 
protect his business and to obtain the decrypting tool for all the files
 very quickly. However, such amount would be lower than the one you have
 requested, due to the heavy financial situation. In my personal 
opinion, my client has the financial availability to pay you 500.000 USD
 very quickly. A greater amount would be very difficult (almost 
impossible in my very personal opinion) to be paid because of the 
current financial situation. Let me know on this point.

Attacker: Hello. We have deals with many companies every day, our pricing policy 
takes into account the Covid19 crisis. Do not take cover by this, the 
price is affordable for the company. 500k from a company like your is 
not seriously, of course we can give you a discount that will depend on 
the quickness of your payment, but price can't be too low as you ask 
for. We hid the post from our blog for the talks. if we will have a deal
 this information will not be ever published.

Victim: What kind of discount are you guys thinking about? My client is really 
in a dire economic situation as previously said and I will try my best 
to convince him to add few money on the negotiation table. However 
adding money to his last offer would entail more budget cuts and firing 
more employees, leaving families without livelihood in this dramatic 
financial crisis.

Attacker: You have no chances with $500,000 or this level of amounts of money, even don't try bluf by this.
If you pay shortly, we accept $6,75M.
If no, we start publication data part by part to speed up you.

Victim: we are not bluffing and you do not know the financial situation of my 
client. However I will get back to you as soon as my client gives me a 
feedback on your so called "discount"

Attacker: https://www.sendspace.com/file/[redacted]

Attacker: [redacted]_Consolidated Financial Report 310320.pdf

Attacker: if you cant find your insurance manual. Here is it.

Victim: Oh well, so you guys are familiar with economics. Are you sure you are 
able to read the numbers? My Client has been losing money since 2010. In
 the consolidated financial report you exfiltrated you can see that in 
the first three months of 2020 only the financial loss amounts to EUR 
[redacted] M. And take a look at the net financial position as at 31 March 
2020 which is negative by EUR [redacted] M. Moreover, look at bond trading 
level (30% yield) that my client needs to repay: 
[redacted]. The
 financial situation of my client is negative. I think you picked the 
wrong victim and the financial analysis you have performed prior to 
undertaking the hacking operations is absolutely wrong. Look at the 
chart herein attached and maybe you will be able to understand that 
economics is not hacking and my client is not [redacted] nor [redacted] nor 
[redacted] (the latter, just to remain in the [redacted] boundaries and a victim 
you may know).
With regard to the insurance manual you guys have exfiltrated please 
note that the insurance company Chubb does not cover the expenses 
related to a ransom payment but only the expenses my client is is facing
 for business interruption and recovery.
This being said, my client needs to resume normal operations as soon as 
possible minimising financial losses due to inactivity caused by your 
actions. So we need to find a trade-off between your requests and my 
client’s capability to pay. Too much money requested and really my 
client does not have that financial capability. My client understands 
your position and aspirations but can’t reach that amount. Overnight I 
convinced my client to add more money on the table. His offer now 
amounts to 750.000,00 but this will entail more sacrifices in terms of 
employment and debt repayment. People will be fired amid this financial 
crisis but I guess you guys don’t care about people left without 
livelihood.
If you guys don’t accept it, my client will set up the new 
infrastructure without data. It won’t be easy but my client is pretty 
sure to go back on the business within a few weeks. I mean my client is 
making the argument that the cost to restart the new infrastructure 
without data will not be higher than 700-800 k USD. That amount 
represents the break-event point for my client. If my client pays a 
dollar more, it won’t be convenient for him. So accept these 750 k USD 
or set a new affordable price or get nothing. If you accept or if you 
set a price which my client is able to meet, he will start the payment 
process as soon as possible, after finding a trusted exchange. 
Please stop the countdown as usual during the negotiations with your hacking group.

Attacker: Good morning. Sorry, but your offer still isnt interesting for us. 
Companies with revenue like 10kk usually pays us this value. Comeback 
later when you will be able to pay more. We can wait but your client 
doesnt have enough time.

Attacker: If you think its easy to restore for 800k - go and do it. we dont care.
 first dump will be full of your client net passwords, [redacted] email 
dump, phone and password(that he use in many other services than your 
network). next will be with clients info, NDAs, payment infromation and 
technical specification of your production

Victim: Do you mean if we do not strike a deal in 1 day 8 hours and 41 minutes you will double the price requested?

Attacker: sure not

Attacker: i added you 7 days.

Victim: Ok guys. What I am trying to let you understand is that my client is 
not in a good financial position and the financial statement you have 
had to chance to read clearly testifies what I am saying. The production
 plants are on hold and people are put on unemployed insurances and are 
being fired. I know that you guys don’t care because your goal is your 
personal profit. You carried out a perfect and clean job on my client’s 
network I have been told and you clearly deserve to be rewarded for your
 work. The issue is not if my client is willing to pay but how much 
money my client can afford to pay without worsening his financial 
condition and safeguarding jobs and families. This is the main issue. 
You guys are considering the data exfiltrated as valuable data that may 
cause a catastrophic reputational damage to my client if disclosed to 
the general public. Well, this is not the case. My client is not 
interested if you guys disclose [redacted] email dump or NDAs or whatever
 document you have in your hands. The value of the data you guys have 
stolen is irrelevant to my client. My client resells commodities ([redacted]) with a B2B model, there’s no industrial secret to be 
protected. And again, please believe me that I’m not bluffing on this 
point. You have read the documents you have stolen and you guys are 
experienced in the field: I bet you haven’t found any information worth 
USD 6.75 M. Any. So again, my client is interested in a quick restore of
 its network. Analysts have estimated that to restore the systems from 
scratch it will cost around EUR 800 k. Than there is the business 
interruption which is also covered by the insurance policy you have had 
the chance to read. If my client gets the decrypter, the network will be
 restored faster and the business will restart in a matter of days. 
Otherwise it will take longer but the costs incurred by my client will 
be integrally covered by the cybersecurity insurance policy.
This being said, we are at a negotiation table. Your demands (USD 6.75 
M) do not match our last offer (USD 750k ). We are way too far to reach 
an agreement. You guys say that our last offer do not you’re your 
expectations and to come back with a higher offer. But you guys have not
 lowered your request and showed any availability to reach an agreement 
and a win-win solution for both the parties involved. I mean, this is 
not a negotiation. Are you guys willing to get a reward for your team? 
What if I convince my client to put USD 1 M on the table? My client will
 never pay you the amount you have requested, but with some sacrifice he
 might be able to reach the USD 1 M threshold.

Attacker: You write a lot of text but all of this doesnt matter. Why ? [redacted] is ONE
 of the WORLD's LARGEST manufacturers of [redacted]. Your 
client spent some millions on recovery software and hardware for it, but
 admins using passwords like "[weak password redacted]". But sure we cant take your 1M 
offer because this is ridiculous. We are thinking that you are bluffing 
and trying to make price so lower, but I understand it is just your job.
 You working fine, price updated to $5M

Victim: hey, guys, thank for lowering the price.

Victim: I mean that being one of the largest corporations does not imply to be the richest. This is the point

Victim: If my client had the financial resources you think the IT department would be stronger and [redacted] systems would be more secure

Victim: [redacted] IT department has proved to be very very little in terms of 
capacity and you guys have been good to leverage the vulnerabilities in 
[redacted] network. But this is not the point

Victim: You are sure that [redacted] has the financial capability to meet your 
demands. If you look at the reports as well as at the newspaper news you
 can easily see that [redacted] is in deep trouble.

Victim: So I am not bluffing because I have been asked to keep the price as 
lower as possible. I am an experienced negotiator, I undertook many 
negotiations with REvil and I know how to talk with you guys. I know the
 threshold I can or I cannot exceed. This is not the case. My client has
 a very limited financial ability and I am not fooling you around

Victim: So please do reconsider your demands and go for a win-win solution as REvil usually pursue.

Attacker: If you have undertook many negotiations with REvil you have to know that much smaller companies pay more than your offer.

Victim: Well, it hasn't been my case fortunately! Yes, I confirm I have 
undertaken many negotiations with REvil affiliates and I have not bumped
 into a negotiation with a payment of more than 1 M. Two months ago a 
REvil affilate attacked a very famous italian company. The intial 
request was 7.5 M USD, with revenues like [redacted]. The deal was closed at 
USD 750 K. You can ask REvil affiliates if I am not speaking the truth.

Victim: Moreover [redacted] does not give a shit about the data you have stolen, so I 
have been told. So please reconsider you request and maybe we can find 
an agreement.

Attacker: I think there were reasons for that, it is not for nothing that they 
reduce the price to 750k from 7.5m, you are too mistaken in thinking 
that the situation is the same here. I could cite cases when companies 
with ten times less revenue paid 3M, or paids 100k only for one personal
 computer, but it is not create rule, it is just an exception, 
exceptions only confirm the rule.

Victim: I can see your point and I get it. I think I am not mistaken and the 
situation is similar to the one I mentioned. I mean, the price paid 
depends on many factors: 1) financial availability 2) ability to restore
 the network without the decrypter 3) time necessary 4) consistency of 
backups 5) profit loss for buisness interruption and so on. What I am 
saying that this is the sixth time I bumped into REvil and my client has
 never paid more than 1 M USD. But maybe they are exceptions that 
confirm the rule.

Attacker: Other Data Recovery Companies has never clients with paid more $5,000, 
but it is not means we will agree for $5,000 in case like this.

Victim: The situation is the following: 1) [redacted] has a very limited financial 
availability. 2) [redacted] is already working on network restoring (costs will
 be covered by the insurance policy) 3)the time necessary to restore the
 network from scratch will be almost 12 days 4) there are backups 
available on LTO tapes 5) the profit loss for business interruption will
 be limited and covered by the insurance policy

Victim: I get your point but [redacted] offered USD 1 M clean, not 5 k$.

Attacker: In view of this situation, $ 5M is reasonable.

Victim: [redacted] does not have $ 5 M. I can try to convince the client to add more 
money, but there no cash flow to pay the amount you have requested.

Attacker: Of course. Because $1M too low.

Victim: I know that the amount offered does not meet your expectations. What's a
 reasonable amount for you?Take into consideration what I have just told
 you in this talk

Attacker: Our offer $5M

Attacker: Waiting for your...

Victim: Talk to the client and get back to you in a while

Attacker: ok

Attacker: good morning. do you have new information for us?

Victim: Yes. Talked to the client and they shared that profit margins on 
revenue that is generated is tiny, and due to the lack of business 
having actual cash to turn into monero is hard to come by. They 
understand you ask more money, but they wanted me to let you know that 
they are having a hard time coming across more money. Now they have 
access to USD 1.27 M in cash, but it won't be available until Monday 
since they can't send money with the banks closed.

Attacker: We have good news to you, price $2.5M for this deal. We prefer Monero, 
but provide you bitcoin payment method to make it easier for you. But 
there is a nuance, if you pay in bitcoins, the additional commission is 
10%.
After payment we will fulfill all agreements with decryption, will 
provide any supports, delete the data from our servers and will provide 
you short report on how you were hacked, keep in mind we still have 
access to the network and watching for any movements.

Attacker: Refresh the page to see changes

Attacker: hello. are we waiting for your payment today?

Victim: Hi guys. Sorry for being late but my client took his time over the 
weekend to have internal meetings in order to respond to your last 
request. Notwithstanding my client has strived to find more budget to 
pay your claims, there is no more money available to be put on the 
table. The financial condition of my client is terribile and you know it
 and the economic situation of Italy has been catastrophic since a 
decade with impactson [redacted]. My client can't afford to take away anymore 
money from the budget needed to run the company operations and to pay 
employees salaries. It has been a difficult decision and my client is 
fully aware that this decision could stop the negotiation with you guys 
and that consequently he won't get the decrypter. However my client has 
reached the maximum cap and the costs he might face without the 
decrypter are, according to cybersecurity analysts and loss adjusters, 
close to $ 1 M. So this is it. Let me know.

Attacker: If I understand correctly, your last offer is $1.27M, if we will agree, how many time do you need to make the payment?

Victim: Yes, correct. We will need about a day since buying Monero takes time, especially when we use a broker in the USA

Attacker: Okay guys so medium price between your offer and our waiting is 1.5kk. 
price updated for 48h and it is final call. Write a message when you 
will start exchange for lock xmr rate.

Victim: Client again took some time to think about to your last offer. Due to 
the fact that Monero has high transaction rates (around +10%), my client
 is willing to pay you 1.27 M within the next 48 hours. Client is not 
able to fully meet your demands as you know and understand. Let me know 
if this is ok for you and client starts the payment process.

Attacker: ok. price updated.

Victim: Please do confirm that the decrypter is general and works for each and every system you guys have encyrpted

Attacker: Yes. general decryptor works for all system that was affected

Attacker: how much time do you need to make this payment?

Attacker: hello?

Victim: Be patient, we are working on it. Expect the payment very soon, a matter of hours.

Victim: Can you lock the Monero price for us? We are placing our order now.

Attacker: Ok. Freezed

Victim: Payment sent.

Attacker: Waiting for 10 confirmations by Monero network

Attacker: To use a decryptor run it as administrator and turn off antivirus before.
You can use a decryptor as gui application or through cmd.

CMD commands:
dec.exe -full
dec.exe -path "C:\folder"
dec.exe -file "C:\folder\file.txt.random_ext"

* decryptor with -full option will decrypt all with default params.

If you use it as gui application, I recommend you choose "create 
backups" option. If you use decryptor without this option, you should 
not interrupt decryption process, otherwise some files will be 
irreversibly damaged.

How it works with "create backups" option:
1. Decryptor looking for encrypted file
2. creating backup of file
3. decrypting file
4. removing the backup
5. looking for a next file and loop repeating.

You can collect list of extensions, input to the textarea above the chat
 and click "Download" to generate General decryptor to decrypt files 
with these extensions.
But this way is not necessary, because we provide you the universal 
decryptor. It just works little slowest but you don't need collect 
anything, just download it and use on any system with admin rights, 
DOWNLOAD:

Victim: Hi guys, thanks for reciprocating with decryptor. During our talks, you
 told me that in case of ransom payment you would have given my client a
 sort report on how my client was hacked. Can you please provide such 
short report? My client is very interested about it and I think that 
after the successful transaction he deserves to know the entry point and
 how you gained privileged access to the network. Thanks for 
cooperation!

Victim: hello?

Attacker: Hi. We find a login to https://remote.[redacted].com

Attacker: After that we made a kerberoasting attack and decrypt admin hash "12qwer34". That's all.

Attacker: you need to use any 2fa solution for your citrix server.

Victim: Thank you guys. One last question, did you guys buy the citrix server 
credentials on the dark web? Or did you obtain the credentials in 
another way? You know, it is important for my client to understand in 
order to prevent future attacks from other ransomware gangs.

Attacker: yes. we buy it. somebody of your clients employee was infected but not by us.

Attacker: that's why i said to you that your client need to use 2fa on citrix server.

Victim: Thanks. Since you guys have been so available to answer my question, 
can you please tell me which is the account whose credentials you have 
purchased? It is very important for my client to ascertain 
responsibilities of the security incident

Attacker: sorry. i cant give you that information.

Victim: Hello guys, sorry to bother you. But since the chat is still open I 
need one more info from you. It's very important for my client to get 
the full file tree and the list of the files you have exfiltrated, as 
well as the logs of the delete operations of such files. Can you help 
me?

Attacker: Hello. We don't store even list of files of companies which paid, and as log file too