*SPAM* Your private information has been stolen because of suspicious events.

Spam detection software, running on the system "mail.pglaf.org", has identified this incoming email as possible spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: Greetings! Would like to introduce myself - I am a specialized hacker, and have succeeded in hacking your operating system. At this moment, I have obtained a complete access to account of yours. On top of that, [...] Content analysis details: (10.4 points, 4.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1% [score: 0.0000] 1.6 DATE_IN_PAST_03_06 Date: is 3 to 6 hours before Received: date 1.4 PYZOR_CHECK Listed in Pyzor (https://pyzor.readthedocs.io/en/latest/) 0.8 RDNS_NONE Delivered to internal network by a host with no rDNS 0.0 FSL_BULK_SIG Bulk signature with no Unsubscribe 0.0 HDR_ORDER_FTSDMCXX_NORDNS Header order similar to spam (FTSDMCXX/boundary variant) + no rDNS 0.3 PDS_BTC_ID FP reduced Bitcoin ID 1.8 BITCOIN_XPRIO Bitcoin + priority 0.0 PDS_BTC_MSGID Bitcoin ID with T_MSGID_NOFQDN2 0.1 TO_EQ_FM_DIRECT_MX To == From and direct-to-MX 0.0 BITCOIN_SPAM_07 BitCoin spam pattern 07 0.0 BITCOIN_TOEQFM Bitcoin + To same as From 0.0 MIMEOLE_DIRECT_TO_MX MIMEOLE + direct-to-MX 3.0 BITCOIN_YOUR_INFO BitCoin with your personal info 0.0 HDR_ORDER_FTSDMCXX_DIRECT Header order similar to spam (FTSDMCXX/boundary variant) + direct-to-MX 0.8 BITCOIN_DEADLINE BitCoin with a deadline 2.5 DOS_OE_TO_MX Delivered direct to MX with OE headers 0.0 XPRIO Has X-Priority header 0.0 NO_FM_NAME_IP_HOSTN No From name + hostname using IP address
participants (1)
-
nmc-wg@ogf.org