Spam detection software, running on the system "mail.pglaf.org",
has identified this incoming email as possible spam. The original
message has been attached to this so you can view it or label
similar future email. If you have any questions, see
the administrator of that system for details.
Content preview: Hello! Have you recently noticed that I have e-mailed you
from your account? Yes, this simply means that I have total access to your
device. For the last couple of months, I have been watching you. Still wondering
how is that possible? Well, you have been infected with malware originating
from an adult website that you visited. You may not [...]
Content analysis details: (10.0 points, 4.0 required)
pts rule name description
---- ---------------------- --------------------------------------------------
-1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1%
[score: 0.0000]
0.0 TVD_RCVD_IP Message was received from an IP address
3.0 DATE_IN_FUTURE_03_06 Date: is 3 to 6 hours after Received: date
0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record
1.4 PYZOR_CHECK Listed in Pyzor
(https://pyzor.readthedocs.io/en/latest/)
0.0 FSL_BULK_SIG Bulk signature with no Unsubscribe
0.8 RDNS_NONE Delivered to internal network by a host with no rDNS
0.0 PDS_BTC_ID FP reduced Bitcoin ID
1.9 BITCOIN_EXTORT_01 Extortion spam, pay via BitCoin
1.0 BITCOIN_SPAM_07 BitCoin spam pattern 07
1.0 TO_EQ_FM_DIRECT_MX To == From and direct-to-MX
2.8 DOS_OUTLOOK_TO_MX Delivered direct to MX with Outlook headers
0.0 NO_FM_NAME_IP_HOSTN No From name + hostname using IP address
Spam detection software, running on the system "mail.pglaf.org",
has identified this incoming email as possible spam. The original
message has been attached to this so you can view it or label
similar future email. If you have any questions, see
the administrator of that system for details.
Content preview: Hello! Have you recently noticed that I have e-mailed you
from your account? Yes, this simply means that I have total access to your
device. For the last couple of months, I have been watching you. Still wondering
how is that possible? Well, you have been infected with malware originating
from an adult website that you visited. You may not [...]
Content analysis details: (15.1 points, 4.0 required)
pts rule name description
---- ---------------------- --------------------------------------------------
0.8 BAYES_50 BODY: Bayes spam probability is 40 to 60%
[score: 0.4264]
3.5 HELO_DYNAMIC_SPLIT_IP Relay HELO'd using suspicious hostname
(Split IP)
0.2 CK_HELO_GENERIC Relay used name indicative of a Dynamic Pool or
Generic rPTR
0.0 TVD_RCVD_IP Message was received from an IP address
0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record
1.4 PYZOR_CHECK Listed in Pyzor
(https://pyzor.readthedocs.io/en/latest/)
0.0 FSL_BULK_SIG Bulk signature with no Unsubscribe
0.8 RDNS_NONE Delivered to internal network by a host with no rDNS
0.0 HDR_ORDER_FTSDMCXX_NORDNS Header order similar to spam
(FTSDMCXX/boundary variant) + no rDNS
0.0 BITCOIN_XPRIO Bitcoin + priority
1.9 BITCOIN_EXTORT_01 Extortion spam, pay via BitCoin
0.0 PDS_BTC_MSGID Bitcoin ID with T_MSGID_NOFQDN2
0.0 PDS_BTC_ID FP reduced Bitcoin ID
0.0 MIMEOLE_DIRECT_TO_MX MIMEOLE + direct-to-MX
2.0 HDR_ORDER_FTSDMCXX_DIRECT Header order similar to spam
(FTSDMCXX/boundary variant) + direct-to-MX
1.0 TO_EQ_FM_DIRECT_MX To == From and direct-to-MX
1.0 BITCOIN_SPAM_07 BitCoin spam pattern 07
2.5 DOS_OE_TO_MX Delivered direct to MX with OE headers
0.0 XPRIO Has X-Priority header
0.0 NO_FM_NAME_IP_HOSTN No From name + hostname using IP address