Hi [REDACTED],

I need your services.
Last week, we infiltrated the network of the huge international bank [REDACTED].
When analyzing the network traffic, our compromised workstation discovered a suspicious API thath seems to be the endpoint of a support application.
Since we are listening the network, it was used only once. I need you to recover the ticket content.

We are forwarding all the requests to the API for you at challenges.42ctf.org:2001.

Regards,

[REDACTED]