/home/smartonegroup/mail/.spam/new/1731128513.M182421P10179.server12.hhost.eg,S=6003,W=6111
Return-Path: <info@smartonegroup.com>
Delivered-To: smartonegroup+spam@server12.hhost.eg
Received: from server12.hhost.eg
	by server12.hhost.eg with LMTP
	id aOLNCsHsLmfDJwAAOMpsuw
	(envelope-from <info@smartonegroup.com>)
	for <smartonegroup+spam@server12.hhost.eg>; Sat, 09 Nov 2024 05:01:53 +0000
Return-path: <info@smartonegroup.com>
Envelope-to: info@smartonegroup.com
Delivery-date: Sat, 09 Nov 2024 07:01:53 +0200
Received: from 62-73-100-189.ip.btc-net.bg ([62.73.100.189]:10212)
	by server12.hhost.eg with esmtp (Exim 4.96.2)
	(envelope-from <info@smartonegroup.com>)
	id 1t9dbg-0005UY-0m
	for info@smartonegroup.com;
	Sat, 09 Nov 2024 07:01:53 +0200
Message-ID: <08A0B9895E11906EC6DFEF3877F608A0@smartonegroup.com>
From: <info@smartonegroup.com>
To: <info@smartonegroup.com>
Date: 9 Nov 2024 07:40:16 +0100
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Mailer: Dggiku nnquoc 1.4
X-Spam-Status: Yes, score=28.0
X-Spam-Score: 280
X-Spam-Bar: ++++++++++++++++++++++++++++
X-Spam-Report: Spam detection software, running on the system "server12.hhost.eg",
 has identified this incoming email as possible spam.  The original
 message has been attached to this so you can view it or label
 similar future email.  If you have any questions, see
 root\@localhost for details.
 Content preview:  Hi,<br> <br> I am a hacker, and I have successfully gained
    access to your operating system.<br> I also have full access to your account.<br>
    <br> I've been watching you for a few months now.<br> <br> [...] 
 Content analysis details:   (28.0 points, 5.0 required)
  pts rule name              description
 ---- ---------------------- --------------------------------------------------
  0.0 TVD_RCVD_IP            Message was received from an IP address
  1.2 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in
                             bl.spamcop.net
               [Blocked - see <https://www.spamcop.net/bl.shtml?62.73.100.189>]
  4.7 RCVD_IN_XBL            RBL: Received via a relay in Spamhaus XBL
                             [62.73.100.189 listed in zen.spamhaus.org]
  1.5 SPF_SOFTFAIL           SPF: sender does not match SPF record (softfail)
  0.0 RCVD_IN_VALIDITY_RPBL_BLOCKED RBL: ADMINISTRATOR NOTICE: The
                             query to Validity was blocked.  See
                             https://knowledge.validity.com/hc/en-us/articles/20961730681243
                              for more information.
                             [62.73.100.189 listed in bl.score.senderscore.com]
  0.0 RCVD_IN_VALIDITY_CERTIFIED_BLOCKED RBL: ADMINISTRATOR NOTICE:
                             The query to Validity was blocked.  See
                             https://knowledge.validity.com/hc/en-us/articles/20961730681243
                              for more information.
                          [62.73.100.189 listed in sa-trusted.bondedsender.org]
  2.7 RCVD_IN_PSBL           RBL: Received via a relay in PSBL
                             [62.73.100.189 listed in psbl.surriel.com]
  2.0 PYZOR_CHECK            Listed in Pyzor
                             (https://pyzor.readthedocs.io/en/latest/)
  3.9 HELO_DYNAMIC_IPADDR2   Relay HELO'd using suspicious hostname (IP
                             addr 2)
  1.8 BITCOIN_VISTA          Bitcoin + old MSFT msgid format
  0.0 KAM_DMARC_STATUS       Test Rule for DKIM or SPF Failure with Strict
                             Alignment
  2.6 RDNS_DYNAMIC           Delivered to internal network by host with
                             dynamic-looking rDNS
  3.0 BITCOIN_EXTORT_01      Extortion spam, pay via BitCoin
  0.5 PDS_BTC_ID             FP reduced Bitcoin ID
  0.1 FSL_BULK_SIG           Bulk signature with no Unsubscribe
  1.6 BITCOIN_TOEQFM         Bitcoin + To same as From
  2.3 BITCOIN_SPAM_07        BitCoin spam pattern 07
  0.0 TO_EQ_FM_DIRECT_MX     To == From and direct-to-MX
X-Spam-Flag: YES
Subject:  ***SPAM***  Delivery status notification.

Hi,<br>
<br>
I am a hacker, and I have successfully gained access to your operating system.<br>
I also have full access to your account.<br>
<br>
I've been watching you for a few months now.<br>
<br>
The fact is that your computer has been infected with malware through an adult site that you visited.<br>
If you are not familiar with this, I will explain.<br>
Trojan Virus gives me full access and control over a computer or other device.<br>
This means that I can see everything on your screen, turn on the camera and microphone, but you do not know about it.<br>
I also have access to all your contacts and all your correspondence.<br>
<br>
Why did your antivirus not detect malware?<br>
Answer: The malware I used is driver-based, I update its signatures every 4 hours. Hence your antivirus is unable to detect its presence.<br>
I made a video showing how you satisfy yourself in the left half of the screen, and the right half shows the video you were watching at the time.<br>
<br>
With one mouse click, I can send this video to all your emails and contacts on your social networks.<br>
I can also make public all your e-mail correspondence and chat history on the messengers that you use.<br>
<br>
If you don't want this to happen, transfer $1370 in Bitcoin equivalent to my Bitcoin address (if you do not know how to do this, just search "buy bitcoin" on Google).<br>
<br>
My Bitcoin address (BTC Wallet) is: bc1qejcsp6kekz8z3dlra7aje6j8r53fmhgmpgj3qj<br>
<br>
After confirming your payment, I will delete the video immediately, and that's it. You will never hear from me again.<br>
I will give you 50 hours (more than 2 days) to pay. I will get a notice, when you open this email, and the timer will start.<br>
Filing a complaint somewhere does not make sense because this email cannot be tracked like my Bitcoin address.<br>
<br>
I never make any mistakes.<br>
If I find that you have shared this message with someone else, the video will be immediately distributed.<br>
<br>
Best regards!