Received: from [2.132.88.254] (port=62857 helo=[178.89.37.134]) by stodi.digitalkingdom.org with esmtp (Exim 4.92) (envelope-from ) id 1jGcZD-0003TK-OJ for lojban@lojban.org; Mon, 23 Mar 2020 22:57:39 -0700 Received: from jtsehbj ([155.180.44.95]) by 60903.com with MailEnable ESMTP; Tue, 24 Mar 2020 09:57:39 +0400 Received: (qmail 75252 invoked by uid 752); 24 Mar 2020 09:57:37 +0400 From: lojban@lojban.org To: lojban@lojban.org Subject: I GOT EVERYTHING! Date: Tue, 24 Mar 2020 09:57:39 +0400 Message-ID: <752527.752527@60903.com> Mime-Version: 1.0 Content-type: text/plain; charset=utf-8; X-Spam-Score: 0.4 (/) X-Spam_score: 0.4 X-Spam_score_int: 4 X-Spam_bar: / X-Spam-Report: Spam detection software, running on the system "stodi.digitalkingdom.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: Hey, check the sender of this email, I sent this email from your email account. Some time ago your computer was infected with my private malware, RAT (Remote Administration Tool), your browser wasn't updated / patched, so you got automatically infected while browsing the website [...] Content analysis details: (0.4 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: anycoindirect.eu] -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1% [score: 0.0049] 0.5 SUBJ_ALL_CAPS Subject is all capitals 0.0 SPF_NONE SPF: sender does not publish an SPF Record 0.0 RCVD_IN_SORBS_DUL RBL: SORBS: sent directly from dynamic IP address [2.132.88.254 listed in dnsbl.sorbs.net] 0.8 RDNS_NONE Delivered to internal network by a host with no rDNS 1.0 MONERO_EXTORT_01 Extortion spam, pay via Monero cryptocurrency 0.0 HELO_MISC_IP Looking for more Dynamic IP Relays Hey, check the sender of this email, I sent this email from your email account. Some time ago your computer was infected with my private malware, RAT (Remote Administration Tool), your browser wasn't updated / patched, so you got automatically infected while browsing the website wich had my iframe placed in the background. My malware gave me access to all your accounts, to all your files and it was possible to spy on you over your webcam. Google: Remote Administration Tool, to see the functions of it. I collected all your files and I recorded few nice moments of you through your webcam, haha! After I collected everything, I removed my malware again. I can publish all your files and the video of you on the whole web, send it to your contacts, social network, hacking forums and the darknet. You can stop me, send exactly 900$ with the cryptocurrency Monero (XMR) to my Monero (XMR) wallet. It's very easy to buy Monero (XMR), for example here: www.binance.com , www.anycoindirect.eu , www.bitnovo.com , or Google for another exchanger. My Monero (XMR) wallet is: 49RD2byfAXfGU4BaZ5mgaQTH8zKowp6V7e88pPkiS1d1iPrJG9RVptDNU1NcHrm5hdKMZzjp2npNzS2CYwy4HjUU3CV52oX Yes that's a long wallet, copy and paste it, it's (CaSE-SEnSetiVE). Send the Monero (XMR) directly to my wallet, or create your wallet first with the software from: www.mymonero.com and then send to mine. I give you 2 days time to send the Monero (XMR). After that I remove everything and we forget everything. Mail-Client-ID: 7525275163