MOON
Server: Apache/2.2.34 (Unix) mod_ssl/2.2.34 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 FrontPage/5.0.2.2635
System: Linux server.asjudinet.com 2.6.32-042stab141.3 #1 SMP Fri Nov 15 22:45:34 MSK 2019 i686
User: asjudine (504)
PHP: 5.2.17
Disabled: NONE
Upload Files
File: /home/asjudine/mail/asjudinet.com/servi/new/1678586974.H236120P10823.server.asjudinet.com,S=10790
Return-path: <servi@asjudinet.com>
Envelope-to: servi@asjudinet.com
Delivery-date: Sat, 11 Mar 2023 20:09:34 -0600
Received: from [103.104.177.82] (port=23203)
	by server.asjudinet.com with esmtp (Exim 4.87)
	(envelope-from <servi@asjudinet.com>)
	id 1pbB9C-0002mn-T2
	for servi@asjudinet.com; Sat, 11 Mar 2023 20:09:34 -0600
Message-ID: <640D9673.9080107@asjudinet.com>
Date: Sun, 12 Mar 2023 15:08:03 +0600
From: <servi@asjudinet.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:11.0) Gecko/20120410 Thunderbird/11.0.1
MIME-Version: 1.0
To: <servi@asjudinet.com>
Subject: =?UTF-8?B?SGV5LCB3aGF0J3MgdXA/?=
Content-Type: multipart/alternative;
 boundary="------------080100090806010907080408"
X-Spam-Status: No, score=2.9
X-Spam-Score: 29
X-Spam-Bar: ++
X-Ham-Report: Spam detection software, running on the system "server.asjudinet.com",
 has NOT identified this incoming email as spam.  The original
 message has been attached to this so you can view it or label
 similar future email.  If you have any questions, see
 root\@localhost for details.
 
 Content preview:  body{background-color:#f9f9f9;font-family:Arial,sans-serif;font-size:16px;line-height:1.6;color:#333;padding:20px}h1{font-size:24px;line-height:1.2;color:#000;margin-top:0;margin-bottom:20px;text-align:center;text-transform:uppercase;letter-spacing:2px}p{margin-top:0;margin-bottom:20px;text-align:justify}.highlight{background-color:#ffc107;color:#000;font-weight:700;padding:5px;border-radius:5px}
    Greetings. I am the one who has infiltrated your system and accessed your
    private information.You may wonder why I chose you as my target. The truth
    is, I am a professional hacker who develops and tests exploits in the wild.
    I saw that you fit the criteria of a potential target who could afford to
    pay and had indulged in some questionable online activities.Using my expertise,
    I discovered a vulnerability in your system and exploited it using a zero-day
    technique. This type of exploit takes advantage of software vulnerabilities
    that are unknown to the developer, giving me complete access to your computer.
    With a packet sniffer, I was able to intercept your browsing history and
   found evidence of your involvement in adult content. From there, it was a
   simple matter to create a compromising video of you that I can use to blackmail
    you if necessary.As a hacker, I know the value of zero-day exploits and how
    they can be used to gain access to sensitive information. In your case, I
    used this technique to gain control of your entire digital life. I inserted
    bookmarks into your system and monitored all the traffic going in and out
    of your computer.I am willing to offer you a deal to resolve this situation.
    If you make the right decision, I will delete all the content that I have
    and the bookmarks that I inserted into your system. However, if you choose
    not to cooperate with me, I will take further action. I am a dedicated individual
    with obsessive-compulsive personality disorder, so I can assure you that
   I will follow through on my threats.My ultimate goal is to get paid for my
    work, and once I receive the payment, we will both [...] 
 
 Content analysis details:   (2.9 points, 5.0 required)
 
  pts rule name              description
 ---- ---------------------- --------------------------------------------------
  0.0 URIBL_BLOCKED          ADMINISTRATOR NOTICE: The query to URIBL was blocked.
                             See
                             http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
                              for more information.
                             [URIs: threats.my]
 -1.9 BAYES_00               BODY: Bayes spam probability is 0 to 1%
                             [score: 0.0000]
  0.0 STOX_BOUND_090909_B    No description available.
 -5.0 RCVD_IN_DNSWL_HI       RBL: Sender listed at https://www.dnswl.org/, high
                             trust
                             [103.104.177.82 listed in list.dnswl.org]
  1.9 DATE_IN_FUTURE_06_12   Date: is 6 to 12 hours after Received: date
  0.1 TRACKER_ID             BODY: Incorporates a tracking ID number
  0.0 HTML_MESSAGE           BODY: HTML included in message
  1.0 KAM_LAZY_DOMAIN_SECURITY Sending domain does not have any
                             anti-forgery methods
  2.0 RDNS_NONE              Delivered to internal network by a host with no rDNS
  0.3 PDS_BTC_ID             FP reduced Bitcoin ID
  1.0 BITCOIN_PAY_ME         Pay me via BitCoin
  1.5 BITCOIN_YOUR_INFO      BitCoin with your personal info
  1.0 TO_EQ_FM_DIRECT_MX     To == From and direct-to-MX
  1.0 BITCOIN_SPAM_07        BitCoin spam pattern 07
  0.0 BITCOIN_SPAM_02        BitCoin spam pattern 02
X-Spam-Flag: NO

This is a multi-part message in MIME format.
--------------080100090806010907080408
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: quoted-printable

 =
body{background-color:#f9f9f9;font-family:Arial,sans-serif;font-size:16px=
;line-height:1.6;color:#333;padding:20px}h1{font-size:24px;line-height:1.=
2;color:#000;margin-top:0;margin-bottom:20px;text-align:center;text-trans=
form:uppercase;letter-spacing:2px}p{margin-top:0;margin-bottom:20px;text-=
align:justify}.highlight{background-color:#ffc107;color:#000;font-weight:=
700;padding:5px;border-radius:5px}
Greetings. I am the one who has infiltrated your system and accessed =
your private information.You may wonder why I chose you as my target. =
The truth is, I am a professional hacker who develops and tests exploits =
in the wild. I saw that you fit the criteria of a potential target who =
could afford to pay and had indulged in some questionable online =
activities.Using my expertise, I discovered a vulnerability in your =
system and exploited it using a zero-day technique. This type of exploit =
takes advantage of software vulnerabilities that are unknown to the =
developer, giving me complete access to your computer. With a packet =
sniffer, I was able to intercept your browsing history and found =
evidence of your involvement in adult content. From there, it was a =
simple matter to create a compromising video of you that I can use to =
blackmail you if necessary.As a hacker, I know the value of zero-day =
exploits and how they can be used to gain access to sensitive =
information. In your case, I used this technique to gain control of your =
entire digital life. I inserted bookmarks into your system and monitored =
all the traffic going in and out of your computer.I am willing to offer =
you a deal to resolve this situation. If you make the right decision, I =
will delete all the content that I have and the bookmarks that I =
inserted into your system. However, if you choose not to cooperate with =
me, I will take further action. I am a dedicated individual with =
obsessive-compulsive personality disorder, so I can assure you that I =
will follow through on my threats.My ultimate goal is to get paid for my =
work, and once I receive the payment, we will both go our separate ways. =
But time is running out, and the deal that I offer will expire in just a =
few days. You have until the weekend to make a payment of 1500 USD worth =
of Bitcoin to my account =
below.1MUptF6SZ7ycwGc5P1ZGCkP2JTgDs1bqjBRemember that this situation can =
become more costly for you if you make the wrong decision. If you refuse =
to cooperate, I will release the compromising video that I have created, =
and the shame that you have brought upon yourself will be public for all =
to see. The choice is yours, but I strongly advise you to make the right =
one.
--------------080100090806010907080408
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable

<html>
  <head>

    <meta http-equiv=3D"content-type" content=3D"text/html; =
charset=3DISO-8859-1">
  </head>
  <body bgcolor=3D"#FFFFFF" text=3D"#000000">
    <style>
 =
body{background-color:#f9f9f9;font-family:Arial,sans-serif;font-size:16px=
;line-height:1.6;color:#333;padding:20px}h1{font-size:24px;line-height:1.=
2;color:#000;margin-top:0;margin-bottom:20px;text-align:center;text-trans=
form:uppercase;letter-spacing:2px}p{margin-top:0;margin-bottom:20px;text-=
align:justify}.highlight{background-color:#ffc107;color:#000;font-weight:=
700;padding:5px;border-radius:5px}
</style>
<h1>Greetings. I am the one who has infiltrated your system and accessed =
your private information.</h1>
<p>You may wonder why I chose you as my target. The truth is, I am a =
professional hacker who develops and tests exploits in the wild. I saw =
that you fit the criteria of a potential target who could afford to pay =
and had indulged in some questionable online activities.
<p>Using my expertise, I discovered a vulnerability in your system and =
exploited it using a zero-day technique. This type of exploit takes =
advantage of software vulnerabilities that are unknown to the developer, =
giving me complete access to your computer. With a packet sniffer, I was =
able to intercept your browsing history and found evidence of your =
involvement in adult content. From there, it was a simple matter to =
create a compromising video of you that I can use to blackmail you if =
necessary.
<p>As a hacker, I know the value of zero-day exploits and how they can =
be used to gain access to sensitive information. In your case, I used =
this technique to gain control of your entire digital life. I inserted =
bookmarks into your system and monitored all the traffic going in and =
out of your computer.
<p>I am willing to offer you a deal to resolve this situation. If you =
make the right decision, I will delete all the content that I have and =
the bookmarks that I inserted into your system. However, if you choose =
not to cooperate with me, I will take further action. I am a dedicated =
individual with obsessive-compulsive personality disorder, so I can =
assure you that I will follow through on my threats.
<p>
<p>My ultimate goal is to get paid for my work, and once I receive the =
payment, we will both go our separate ways. But time is running out, and =
the deal that I offer will expire in just a few days. You have until the =
weekend to make a payment of 1500 USD worth of Bitcoin to my account =
below.
<p><span class=3Dhighlight>1MUptF6SZ7ycwGc5P1ZGCkP2JTgDs1bqjB</span>
<p>
<p>Remember that this situation can become more costly for you if you =
make the wrong decision. If you refuse to cooperate, I will release the =
compromising video that I have created, and the shame that you have =
brought upon yourself will be public for all to see. The choice is =
yours, but I strongly advise you to make the right one.
  </body>
</html>

--------------080100090806010907080408--