Received: from exim by stodi.digitalkingdom.org with local (Exim 4.92) id 1jBrmX-0002Q8-9H for lojban@lojban.org; Tue, 10 Mar 2020 20:11:41 -0700 X-Failed-Recipients: comcaresvcs@gmail.com Auto-Submitted: auto-replied From: Mail Delivery System To: lojban@lojban.org Content-Type: multipart/report; report-type=delivery-status; boundary=1583896301-eximdsn-13406891 MIME-Version: 1.0 Subject: Mail delivery failed: returning message to sender Message-Id: Date: Tue, 10 Mar 2020 20:11:41 -0700 --1583896301-eximdsn-13406891 Content-type: text/plain; charset=us-ascii This message was created automatically by mail delivery software. A message that you sent could not be delivered to one or more of its recipients. This is a permanent error. The following address(es) failed: comcaresvcs@gmail.com (generated from lojban@lojban.org) host gmail-smtp-in.l.google.com [74.125.20.26] SMTP error from remote mail server after pipelined end of data: 552-5.7.0 This message was blocked because its content presents a potential 552-5.7.0 security issue. Please visit 552-5.7.0 https://support.google.com/mail/?p=BlockedMessage to review our 552 5.7.0 message content and attachment content guidelines. t66si499800pfc.243 - gsmtp --1583896301-eximdsn-13406891 Content-type: message/delivery-status Reporting-MTA: dns; stodi.digitalkingdom.org Action: failed Final-Recipient: rfc822;comcaresvcs@gmail.com Status: 5.0.0 Remote-MTA: dns; gmail-smtp-in.l.google.com Diagnostic-Code: smtp; 552-5.7.0 This message was blocked because its content presents a potential 552-5.7.0 security issue. Please visit 552-5.7.0 https://support.google.com/mail/?p=BlockedMessage to review our 552 5.7.0 message content and attachment content guidelines. t66si499800pfc.243 - gsmtp --1583896301-eximdsn-13406891 Content-type: message/rfc822 Return-path: Received: from [213.157.33.67] (port=51589) by stodi.digitalkingdom.org with esmtp (Exim 4.92) (envelope-from ) id 1jBrmR-0002PV-IK for lojban@lojban.org; Tue, 10 Mar 2020 20:11:39 -0700 Received: from syqwtrz ([158.169.58.142]) by 94569.com with MailEnable ESMTP; Wed, 11 Mar 2020 09:11:38 +0600 Received: (qmail 21162 invoked by uid 211); 11 Mar 2020 09:11:36 +0600 From: lojban@lojban.org To: lojban@lojban.org Subject: Video of you! Date: Wed, 11 Mar 2020 09:11:38 +0600 Message-ID: <211629.211629@94569.com> Mime-Version: 1.0 Content-type: text/plain; charset=utf-8; X-Spam-Flag: YES X-Spam-Score: 9.8 (+++++++++) X-Spam_score: 9.8 X-Spam_score_int: 98 X-Spam_bar: +++++++++ X-Spam-Report: Spam detection software, running on the system "stodi.digitalkingdom.org", has identified this incoming email as possible spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: Hey! Check the sender of this email (From:), I sent this email from your email account! Your computer was infected with my malware, RAT (Remote Administration Tool), your browser wasn't updated / patched, in such case it's enough to just visit some website where my iframe is placed to ge [...] Content analysis details: (9.8 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1% [score: 0.0000] 0.4 RCVD_IN_XBL RBL: Received via a relay in Spamhaus XBL [213.157.33.67 listed in zen.spamhaus.org] 0.0 SPF_NONE SPF: sender does not publish an SPF Record 1.3 RCVD_IN_RP_RNBL RBL: Relay in RNBL, https://senderscore.org/blacklistlookup/ [213.157.33.67 listed in bl.score.senderscore.com] 0.8 RDNS_NONE Delivered to internal network by a host with no rDNS 0.5 PDS_BTC_ID FP reduced Bitcoin ID 2.2 BITCOIN_EXTORT_01 Extortion spam, pay via BitCoin 3.0 GB_BITCOIN_CP Localized Bitcoin scam 3.5 BITCOIN_SPAM_07 BitCoin spam pattern 07 Hey! Check the sender of this email (From:), I sent this email from your email account! Your computer was infected with my malware, RAT (Remote Administration Tool), your browser wasn't updated / patched, in such case it's enough to just visit some website where my iframe is placed to get automatically infected, if you want to find out more - Google: "Drive-by exploit". My malware gave me full access and control over your computer, I got access to all your accounts (see password above) and it was possible to see everything on your screen, turn on your camera or microphone and you won't even notice about it. I was spying on you and I RECORDED YOU SATISFYING YOURSELF! After that I removed my malware. I can send the video to all your contacts, friends, post it on social network, publish it on the whole web! But, you can stop me! Transfer exactly 800$ with the current bitcoin (BTC) price to my bitcoin address. You can easily buy bitcoin here: www.coingate.com , www.coinbase.com , or Google for other exchanger. You can send the bitcoin directly to my address, or create your own wallet first here: www.login.blockchain.com/en/#/signup/ , then receive and send to mine. My bitcoin address is: 1NK7SRTwq5EwtLNrcBY3yuZXiaTDdooQ9J Copy and paste my address, it's (cAsE-sEnSEtiVE) I give you 2 days time to transfer the bitcoin. As I got access to this email account, I will know if this email has already been read. If you get this email multiple times, it's to make sure you read it and after payment you can ignore it. After receiving the payment, I will remove the video. Next time update your browser before browsing the web! Mail-Client-ID: 2116291903 --1583896301-eximdsn-13406891--