File: /home/asjudine/mail/asjudinet.com/servi/new/1678586974.H236120P10823.server.asjudinet.com,S=10790
Return-path: <servi@asjudinet.com>
Envelope-to: servi@asjudinet.com
Delivery-date: Sat, 11 Mar 2023 20:09:34 -0600
Received: from [103.104.177.82] (port=23203)
by server.asjudinet.com with esmtp (Exim 4.87)
(envelope-from <servi@asjudinet.com>)
id 1pbB9C-0002mn-T2
for servi@asjudinet.com; Sat, 11 Mar 2023 20:09:34 -0600
Message-ID: <640D9673.9080107@asjudinet.com>
Date: Sun, 12 Mar 2023 15:08:03 +0600
From: <servi@asjudinet.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:11.0) Gecko/20120410 Thunderbird/11.0.1
MIME-Version: 1.0
To: <servi@asjudinet.com>
Subject: =?UTF-8?B?SGV5LCB3aGF0J3MgdXA/?=
Content-Type: multipart/alternative;
boundary="------------080100090806010907080408"
X-Spam-Status: No, score=2.9
X-Spam-Score: 29
X-Spam-Bar: ++
X-Ham-Report: Spam detection software, running on the system "server.asjudinet.com",
has NOT identified this incoming email as spam. The original
message has been attached to this so you can view it or label
similar future email. If you have any questions, see
root\@localhost for details.
Content preview: body{background-color:#f9f9f9;font-family:Arial,sans-serif;font-size:16px;line-height:1.6;color:#333;padding:20px}h1{font-size:24px;line-height:1.2;color:#000;margin-top:0;margin-bottom:20px;text-align:center;text-transform:uppercase;letter-spacing:2px}p{margin-top:0;margin-bottom:20px;text-align:justify}.highlight{background-color:#ffc107;color:#000;font-weight:700;padding:5px;border-radius:5px}
Greetings. I am the one who has infiltrated your system and accessed your
private information.You may wonder why I chose you as my target. The truth
is, I am a professional hacker who develops and tests exploits in the wild.
I saw that you fit the criteria of a potential target who could afford to
pay and had indulged in some questionable online activities.Using my expertise,
I discovered a vulnerability in your system and exploited it using a zero-day
technique. This type of exploit takes advantage of software vulnerabilities
that are unknown to the developer, giving me complete access to your computer.
With a packet sniffer, I was able to intercept your browsing history and
found evidence of your involvement in adult content. From there, it was a
simple matter to create a compromising video of you that I can use to blackmail
you if necessary.As a hacker, I know the value of zero-day exploits and how
they can be used to gain access to sensitive information. In your case, I
used this technique to gain control of your entire digital life. I inserted
bookmarks into your system and monitored all the traffic going in and out
of your computer.I am willing to offer you a deal to resolve this situation.
If you make the right decision, I will delete all the content that I have
and the bookmarks that I inserted into your system. However, if you choose
not to cooperate with me, I will take further action. I am a dedicated individual
with obsessive-compulsive personality disorder, so I can assure you that
I will follow through on my threats.My ultimate goal is to get paid for my
work, and once I receive the payment, we will both [...]
Content analysis details: (2.9 points, 5.0 required)
pts rule name description
---- ---------------------- --------------------------------------------------
0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked.
See
http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
for more information.
[URIs: threats.my]
-1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1%
[score: 0.0000]
0.0 STOX_BOUND_090909_B No description available.
-5.0 RCVD_IN_DNSWL_HI RBL: Sender listed at https://www.dnswl.org/, high
trust
[103.104.177.82 listed in list.dnswl.org]
1.9 DATE_IN_FUTURE_06_12 Date: is 6 to 12 hours after Received: date
0.1 TRACKER_ID BODY: Incorporates a tracking ID number
0.0 HTML_MESSAGE BODY: HTML included in message
1.0 KAM_LAZY_DOMAIN_SECURITY Sending domain does not have any
anti-forgery methods
2.0 RDNS_NONE Delivered to internal network by a host with no rDNS
0.3 PDS_BTC_ID FP reduced Bitcoin ID
1.0 BITCOIN_PAY_ME Pay me via BitCoin
1.5 BITCOIN_YOUR_INFO BitCoin with your personal info
1.0 TO_EQ_FM_DIRECT_MX To == From and direct-to-MX
1.0 BITCOIN_SPAM_07 BitCoin spam pattern 07
0.0 BITCOIN_SPAM_02 BitCoin spam pattern 02
X-Spam-Flag: NO
This is a multi-part message in MIME format.
--------------080100090806010907080408
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: quoted-printable
=
body{background-color:#f9f9f9;font-family:Arial,sans-serif;font-size:16px=
;line-height:1.6;color:#333;padding:20px}h1{font-size:24px;line-height:1.=
2;color:#000;margin-top:0;margin-bottom:20px;text-align:center;text-trans=
form:uppercase;letter-spacing:2px}p{margin-top:0;margin-bottom:20px;text-=
align:justify}.highlight{background-color:#ffc107;color:#000;font-weight:=
700;padding:5px;border-radius:5px}
Greetings. I am the one who has infiltrated your system and accessed =
your private information.You may wonder why I chose you as my target. =
The truth is, I am a professional hacker who develops and tests exploits =
in the wild. I saw that you fit the criteria of a potential target who =
could afford to pay and had indulged in some questionable online =
activities.Using my expertise, I discovered a vulnerability in your =
system and exploited it using a zero-day technique. This type of exploit =
takes advantage of software vulnerabilities that are unknown to the =
developer, giving me complete access to your computer. With a packet =
sniffer, I was able to intercept your browsing history and found =
evidence of your involvement in adult content. From there, it was a =
simple matter to create a compromising video of you that I can use to =
blackmail you if necessary.As a hacker, I know the value of zero-day =
exploits and how they can be used to gain access to sensitive =
information. In your case, I used this technique to gain control of your =
entire digital life. I inserted bookmarks into your system and monitored =
all the traffic going in and out of your computer.I am willing to offer =
you a deal to resolve this situation. If you make the right decision, I =
will delete all the content that I have and the bookmarks that I =
inserted into your system. However, if you choose not to cooperate with =
me, I will take further action. I am a dedicated individual with =
obsessive-compulsive personality disorder, so I can assure you that I =
will follow through on my threats.My ultimate goal is to get paid for my =
work, and once I receive the payment, we will both go our separate ways. =
But time is running out, and the deal that I offer will expire in just a =
few days. You have until the weekend to make a payment of 1500 USD worth =
of Bitcoin to my account =
below.1MUptF6SZ7ycwGc5P1ZGCkP2JTgDs1bqjBRemember that this situation can =
become more costly for you if you make the wrong decision. If you refuse =
to cooperate, I will release the compromising video that I have created, =
and the shame that you have brought upon yourself will be public for all =
to see. The choice is yours, but I strongly advise you to make the right =
one.
--------------080100090806010907080408
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable
<html>
<head>
<meta http-equiv=3D"content-type" content=3D"text/html; =
charset=3DISO-8859-1">
</head>
<body bgcolor=3D"#FFFFFF" text=3D"#000000">
<style>
=
body{background-color:#f9f9f9;font-family:Arial,sans-serif;font-size:16px=
;line-height:1.6;color:#333;padding:20px}h1{font-size:24px;line-height:1.=
2;color:#000;margin-top:0;margin-bottom:20px;text-align:center;text-trans=
form:uppercase;letter-spacing:2px}p{margin-top:0;margin-bottom:20px;text-=
align:justify}.highlight{background-color:#ffc107;color:#000;font-weight:=
700;padding:5px;border-radius:5px}
</style>
<h1>Greetings. I am the one who has infiltrated your system and accessed =
your private information.</h1>
<p>You may wonder why I chose you as my target. The truth is, I am a =
professional hacker who develops and tests exploits in the wild. I saw =
that you fit the criteria of a potential target who could afford to pay =
and had indulged in some questionable online activities.
<p>Using my expertise, I discovered a vulnerability in your system and =
exploited it using a zero-day technique. This type of exploit takes =
advantage of software vulnerabilities that are unknown to the developer, =
giving me complete access to your computer. With a packet sniffer, I was =
able to intercept your browsing history and found evidence of your =
involvement in adult content. From there, it was a simple matter to =
create a compromising video of you that I can use to blackmail you if =
necessary.
<p>As a hacker, I know the value of zero-day exploits and how they can =
be used to gain access to sensitive information. In your case, I used =
this technique to gain control of your entire digital life. I inserted =
bookmarks into your system and monitored all the traffic going in and =
out of your computer.
<p>I am willing to offer you a deal to resolve this situation. If you =
make the right decision, I will delete all the content that I have and =
the bookmarks that I inserted into your system. However, if you choose =
not to cooperate with me, I will take further action. I am a dedicated =
individual with obsessive-compulsive personality disorder, so I can =
assure you that I will follow through on my threats.
<p>
<p>My ultimate goal is to get paid for my work, and once I receive the =
payment, we will both go our separate ways. But time is running out, and =
the deal that I offer will expire in just a few days. You have until the =
weekend to make a payment of 1500 USD worth of Bitcoin to my account =
below.
<p><span class=3Dhighlight>1MUptF6SZ7ycwGc5P1ZGCkP2JTgDs1bqjB</span>
<p>
<p>Remember that this situation can become more costly for you if you =
make the wrong decision. If you refuse to cooperate, I will release the =
compromising video that I have created, and the shame that you have =
brought upon yourself will be public for all to see. The choice is =
yours, but I strongly advise you to make the right one.
</body>
</html>
--------------080100090806010907080408--