このページはThe Chronicles of Ryzhyのまとめとして使用します。
|15-10-2012||B5GBD_15.10.2012||ceasar||NOTE||B5GBD (BSGBD) EOD Key From Mr Kermen - BASE64|
|10-10-2015||(INV-15)ARRS_NODE_14-4_10.10.2015.log||rook||FILE||Log file with Errors reading file|
|15-10-2015||(INV-15)ARRS_NODE_14-4_15.10.2015.log||rook||FILE||Log file with Errors reading file|
|27-10-2015||(INV-15)ARRS_NODE_14-4_27.10.2015.log||rook||FILE||Log file with Invalid Password attempts on user: ceasar. Automated password update by the system|
|17-09-2019||HW629_17.09.2019||defaultuser||NOTE||Dev/Staff venting about how hard the process is to build (xxx). Claiming it was still unstable|
|27-10-2019||ZB2SA_27.10.2019||defaultuser||NOTE||Same user as HW629 note saying "thank god we released it....clients happy...it worked at the end...out for sleep for a month or so" [Date was wipe day 0.12.0]|
|13-09-2021||ARRS_NODE_14-4_13.09.2021.log||officer20-28||FILE||Log with corrupted data [give middle of warden password]|
|12-12-2021||NRUJA_12.12.2021||defaultuser||NOTE||Another release of (xxx) "clients very happy...huge chunk of work" [Date was wipe day 0.12.12]|
|23-12-2021||JH692_23.12.2021||rook||NOTE||I’ve collected data for issue investigation as requested. The files are attached to this profile, marked “INV-15”.It does look like a DDoS attack of several hidden ARRS nodes across the globe. Someone knew where to strike and when.|
|05-08-2022||Operation_report_05.08.2022.report||officer20-28||FILE||Current situation can be de8qTibed as Stable. We aLS on the 4WKdule.|
DexFBopment team requests more of C07 and M-58 LEO.
....Sanitar inarb6g to switch test assets to xpRjget assets, for “more rapid progress”.
|07-09-2022||Report_07.09.2022.report||rook||FILE||Extracting a bug guest from the top....to warden...rushed...should be in order...extracting him to Unit J92-020 which is used by officer20-28|
|07-09-2022||Operation_report_07.09.2022.report||officer20-28||FILE||Same day as bug guest extraction [gave warden tail password] encrypted text|
|14-09-2022||2D25U_14.09.2022||defaultuser||NOTE||0c:0d:61:1d:3f:01 first noticed. works kinda wierd, throwing some random requests all over network|
|28-09-2022||ARRS_NODE_14-4_28.09.2022.log||observer14-4||FILE||5 Invalid Password Attempts|
|29-09-2022||ARRS_NODE_14-4_29.09.2022.log||observer14-4||FILE||invalid password attempts log|
|01-10-2022||ARRS_NODE_14-4_01.10.2022.log||observer14-4||FILE||invalid password attempts log|
|01-10-2022||HL692_01.10.2022||observer14-4||NOTE||observer14-4 also shown to be defaultuser, obs14-4 explains his dislike of Petr [rook]|
|01-10-2022||ZACPA_01.10.2022||observer14-4||NOTE||obs14-4 steals rooks mug|
|01-10-2022||GS55F_01.10.2022||observer14-4||NOTE||petr [rook] still trying to find mug, gloating by obs14-4 [grach exposed]|
|01-10-2022||5AL5U_01.10.2022||observer14-4||NOTE||obs in big trouble, "they" found out about the mug|
|02-10-2022||ARRS_NODE_14-4_02.10.2022.log||observer14-4||FILE||invalid password attempts log|
|03-10-2022||ARRS_NODE_14-4_03.10.2022.log||observer14-4||FILE||invalid password attempts log|
|03-10-2022||Report_03.10.2022.report||rook||FILE||random strings [maybe encrypted] last line contained an B64 password|
|03-10-2022||ZBZG2_03.10.2022||rook||NOTE||Petr believes he saw a system rebooting. Everythink looked ok, chalks it up to the lack of coffee due to no mug|
|03-10-2022||UU5GK_03.10.2022||rook||NOTE||This is the third time Eugine forgot his password. I'm trying my best to help him. But He keeps failing.|
|04-10-2022||ARRS_NODE_14-4_04.10.2022.log||observer14-4||FILE||Error log starting with failed login attempts, then memory high issues, then shows the MAC address of the "spy" system|
|04-10-2022||L815U_04.10.2022||rook||NOTE||Petr exposing Eugine (obs14-4, defusr) for taking his mug, calls him dumb. Has no friends|
|05-10-2022||3ND00_05.10.2022||defaultuser||NOTE||Eugine (obs14-4) wondering why no access on this defusr account, confirms his obs14-4 account name, mentions security officers blackmailing for stuff|
|09-10-2022||Operation_report_09.10.2022.report||officer20-28||FILE||"The main concern is the software issue...been for months...cant find the reason"|
Greetings, Mr. "Ryzhy". You don't know me, and I don't know you, but I was greatly touched by your story with your father and TerraGroup. You can consider me an anonymous well-wisher from the network.
Knowing that you do not have sufficient knowledge in the field of computer security, I decided to help you. Together with other equally caring hackers, we managed to crack Mr. Kermen's ciphers, as well as decrypt his d900a70d64.inf file, which contained data about letters in bottles, which I think it will be useful for you to familiarise yourself with.
Admittedly, it was hidden very thoroughly, and the final decryption was like blindly walking through a maze with a bunch of traps, and I definitely would not have coped alone. Therefore, in addition to me, you can also be grateful to Minipickguard, Asilarimtamturk, Stingrey072, Pirat_ttv_youtub, Massyu and Kei7masu, as well as to the group of decryptioners #sonsofsoon
We have collected all the messages, translated them, and I am sending them to you. I think you should show them to Samoilov. He may know what to do next with this information. Good luck finding information about your father.
Best wishes, hackers all over the world.