Received: from [154.160.0.35] (port=57244) by stodi.digitalkingdom.org with esmtp (Exim 4.92) (envelope-from ) id 1jFKGJ-00025H-0H for lojban@lojban.org; Fri, 20 Mar 2020 09:12:46 -0700 Received: from nxbemim ([142.182.252.55]) by 24290.com with MailEnable ESMTP; Fri, 20 Mar 2020 16:12:46 +0000 Received: (qmail 88376 invoked by uid 883); 20 Mar 2020 16:12:44 +0000 From: lojban@lojban.org To: lojban@lojban.org Subject: I GOT EVERYTHING! Date: Fri, 20 Mar 2020 16:12:46 +0000 Message-ID: <883763.883763@24290.com> Mime-Version: 1.0 Content-type: text/plain; charset=utf-8; X-Spam-Score: 0.4 (/) X-Spam_score: 0.4 X-Spam_score_int: 4 X-Spam_bar: / X-Spam-Report: Spam detection software, running on the system "stodi.digitalkingdom.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: Hey, check the sender of this email, I sent this email from your email account. Some time ago your computer was infected with my private malware, RAT (Remote Administration Tool), your browser wasn't updated / patched, so you got automatically infected while browsing the website [...] Content analysis details: (0.4 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1% [score: 0.0062] 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: anycoindirect.eu] 0.5 SUBJ_ALL_CAPS Subject is all capitals 0.0 SPF_NONE SPF: sender does not publish an SPF Record 0.8 RDNS_NONE Delivered to internal network by a host with no rDNS 1.0 MONERO_EXTORT_01 Extortion spam, pay via Monero cryptocurrency Hey, check the sender of this email, I sent this email from your email account. Some time ago your computer was infected with my private malware, RAT (Remote Administration Tool), your browser wasn't updated / patched, so you got automatically infected while browsing the website wich had my iframe placed in the background. My malware gave me access to all your accounts, to all your files and it was possible to spy on you over your webcam. Google: Remote Administration Tool, to see the functions of it. I collected all your files and I recorded few nice moments of you through your webcam, haha! After I collected everything, I removed my malware again. I can publish all your files and the video of you on the whole web, send it to your contacts, social network, hacking forums and the darknet. You can stop me, send exactly 900$ with the cryptocurrency Monero (XMR) to my Monero (XMR) wallet. It's very easy to buy Monero (XMR), for example here: www.binance.com , www.anycoindirect.eu , www.bitnovo.com , or Google for another exchanger. My Monero (XMR) wallet is: 49RD2byfAXfGU4BaZ5mgaQTH8zKowp6V7e88pPkiS1d1iPrJG9RVptDNU1NcHrm5hdKMZzjp2npNzS2CYwy4HjUU3CV52oX Yes that's a long wallet, copy and paste it, it's (CaSE-SEnSetiVE). Send the Monero (XMR) directly to my wallet, or create your wallet first with the software from: www.mymonero.com and then send to mine. I give you 2 days time to send the Monero (XMR). After that I remove everything and we forget everything. Mail-Client-ID: 8837637707