Received: from exim by stodi.digitalkingdom.org with local (Exim 4.92) id 1jA9xF-0008PP-DN for lojban@lojban.org; Fri, 06 Mar 2020 02:11:41 -0800 X-Failed-Recipients: comcaresvcs@gmail.com Auto-Submitted: auto-replied From: Mail Delivery System To: lojban@lojban.org Content-Type: multipart/report; report-type=delivery-status; boundary=1583489501-eximdsn-1275214393 MIME-Version: 1.0 Subject: Mail delivery failed: returning message to sender Message-Id: Date: Fri, 06 Mar 2020 02:11:41 -0800 --1583489501-eximdsn-1275214393 Content-type: text/plain; charset=us-ascii This message was created automatically by mail delivery software. A message that you sent could not be delivered to one or more of its recipients. This is a permanent error. The following address(es) failed: comcaresvcs@gmail.com (generated from lojban@lojban.org) host gmail-smtp-in.l.google.com [108.177.98.27] SMTP error from remote mail server after pipelined end of data: 552-5.7.0 This message was blocked because its content presents a potential 552-5.7.0 security issue. Please visit 552-5.7.0 https://support.google.com/mail/?p=BlockedMessage to review our 552 5.7.0 message content and attachment content guidelines. x13si1959639pgj.280 - gsmtp --1583489501-eximdsn-1275214393 Content-type: message/delivery-status Reporting-MTA: dns; stodi.digitalkingdom.org Action: failed Final-Recipient: rfc822;comcaresvcs@gmail.com Status: 5.0.0 Remote-MTA: dns; gmail-smtp-in.l.google.com Diagnostic-Code: smtp; 552-5.7.0 This message was blocked because its content presents a potential 552-5.7.0 security issue. Please visit 552-5.7.0 https://support.google.com/mail/?p=BlockedMessage to review our 552 5.7.0 message content and attachment content guidelines. x13si1959639pgj.280 - gsmtp --1583489501-eximdsn-1275214393 Content-type: message/rfc822 Return-path: Received: from [223.101.93.131] (port=13519 helo=[0.0.0.0]) by stodi.digitalkingdom.org with esmtp (Exim 4.92) (envelope-from ) id 1jA9wz-0008O0-G3 for lojban@lojban.org; Fri, 06 Mar 2020 02:11:33 -0800 Received: from nzhgksr ([224.235.82.209]) by 78407.com with MailEnable ESMTP; Fri, 6 Mar 2020 18:11:28 +0800 Received: (qmail 79752 invoked by uid 797); 6 Mar 2020 18:11:26 +0800 From: lojban@lojban.org To: lojban@lojban.org Subject: YOU GOT RECORDED! Date: Fri, 6 Mar 2020 18:11:28 +0800 Message-ID: <797523.797523@78407.com> Mime-Version: 1.0 Content-type: text/plain; charset=utf-8; X-Spam-Flag: YES X-Spam-Score: 9.9 (+++++++++) X-Spam_score: 9.9 X-Spam_score_int: 99 X-Spam_bar: +++++++++ X-Spam-Report: Spam detection software, running on the system "stodi.digitalkingdom.org", has identified this incoming email as possible spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: Hey! Check the sender of this email (From:), I sent this email from your account! Your computer was infected with my malware, RAT (Remote Administration Tool), your browser wasn't updated / patched, in such case it's enough to just visit some website where my iframe is placed to ge [...] Content analysis details: (9.9 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: coinbase.com] -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1% [score: 0.0000] 1.3 RCVD_ILLEGAL_IP Received: contains illegal IP address 0.0 HK_RCVD_IP_MULTICAST No description available. 0.5 SUBJ_ALL_CAPS Subject is all capitals 0.0 SPF_NONE SPF: sender does not publish an SPF Record 0.8 RDNS_NONE Delivered to internal network by a host with no rDNS 0.5 PDS_BTC_ID FP reduced Bitcoin ID 2.2 BITCOIN_EXTORT_01 Extortion spam, pay via BitCoin 3.0 GB_BITCOIN_CP Localized Bitcoin scam 3.5 BITCOIN_SPAM_07 BitCoin spam pattern 07 0.0 HELO_MISC_IP Looking for more Dynamic IP Relays Hey! Check the sender of this email (From:), I sent this email from your account! Your computer was infected with my malware, RAT (Remote Administration Tool), your browser wasn't updated / patched, in such case it's enough to just visit some website where my iframe is placed to get automatically infected, if you want to find out more - Google: "Drive-by exploit". My malware gave me full access and control over your computer, I got access to all your accounts (that's how I sent this email) and it was possible to see everything on your screen, turn on your camera or microphone and you won't even notice about it. I was spying on you and I RECORDED YOU SATISFYING YOURSELF! After that I removed my malware to not leave any traces. I can send the video to all your contacts, friends, post it on social network, publish it on the whole web! But, you can stop me! Transfer exactly 1200$ with the current bitcoin (BTC) price to my bitcoin address. You can easily buy bitcoin here: www.coingate.com , www.coinbase.com , or Google for other exchanger. You can send the bitcoin directly to my address, or create your own wallet first here: www.login.blockchain.com/en/#/signup/ , then receive and send to mine. My bitcoin address is: 19DNX7dsEMzeuZU8RfaAoNNVVUDJPc6KCU Copy and paste my address, it's (cAsE-sEnSEtiVE) I give you 3 days time to transfer the bitcoin. As I got access to this email account, I will know if this email has already been read. If you get this email multiple times, it's to make sure you read it and after payment you can ignore it. After receiving the payment, I will remove the video. Next time update your browser before browsing the web! Mail-Client-ID: 7975234189 --1583489501-eximdsn-1275214393--