/home/arranoyd/mail/.spam/cur/1685632216.M419461P21241.nl53.altushost.com,S=5786,W=5897:2,
Return-Path: <info@jagma.hr>
Delivered-To: arranoyd+spam@nl53.altushost.com
Received: from nl53.altushost.com
	by nl53.altushost.com with LMTP
	id cN8fGNi0eGT5UgAAmQ2V0w
	(envelope-from <info@jagma.hr>)
	for <arranoyd+spam@nl53.altushost.com>; Thu, 01 Jun 2023 17:10:16 +0200
Return-path: <info@jagma.hr>
Envelope-to: info@jagma.hr
Delivery-date: Thu, 01 Jun 2023 17:10:16 +0200
Received: from [103.181.69.164] (port=20502 helo=[103.181.69.165])
	by nl53.altushost.com with esmtp (Exim 4.96)
	(envelope-from <info@jagma.hr>)
	id 1q4jwM-0005Sg-2R
	for info@jagma.hr;
	Thu, 01 Jun 2023 17:10:16 +0200
Message-ID: <004f01d994cf$01ae2915$d00ebfa4@lgchtwd>
From: <info@jagma.hr>
To: <info@jagma.hr>
Date: 2 Jun 2023 02:03:43 +0500
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-3"
Content-Transfer-Encoding: 8bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
X-Spam-Status: Yes, score=20.3
X-Spam-Score: 203
X-Spam-Bar: ++++++++++++++++++++
X-Spam-Report: Spam detection software, running on the system "nl53.altushost.com",
 has identified this incoming email as possible spam.  The original
 message has been attached to this so you can view it or label
 similar future email.  If you have any questions, see
 root\@localhost for details.
 Content preview:  Hi, I am a hacker, and I have successfully gained access to
    your operating system. I also have full access to your account. I've been
    watching you for a few months now. 
 Content analysis details:   (20.3 points, 5.0 required)
  pts rule name              description
 ---- ---------------------- --------------------------------------------------
  1.3 RCVD_IN_VALIDITY_RPBL  RBL: Relay in Validity RPBL,
                             https://senderscore.org/blocklistlookup/
                            [103.181.69.164 listed in bl.score.senderscore.com]
  2.4 DATE_IN_FUTURE_03_06   Date: is 3 to 6 hours after Received: date
  4.0 SPF_FAIL               SPF: sender does not match SPF record (fail)
 [SPF failed: Please see http://www.openspf.org/Why?s=mfrom;id=info%40jagma.hr;ip=103.181.69.164;r=nl53.altushost.com]
  2.0 PYZOR_CHECK            Listed in Pyzor
                             (https://pyzor.readthedocs.io/en/latest/)
 -0.0 T_SCC_BODY_TEXT_LINE   No description available.
  0.0 KAM_DMARC_STATUS       Test Rule for DKIM or SPF Failure with Strict
                             Alignment
  1.5 KAM_DMARC_QUARANTINE   DKIM has Failed or SPF has failed on the
                             message and the domain has a DMARC
                             quarantine policy
  0.0 HDR_ORDER_FTSDMCXX_NORDNS Header order similar to spam
                             (FTSDMCXX/boundary variant) + no rDNS
  2.0 RDNS_NONE              Delivered to internal network by a host with no rDNS
  0.0 AXB_XMAILER_MIMEOLE_OL_024C2 Yet another X header trait
  0.0 PDS_BTC_ID             FP reduced Bitcoin ID
  0.0 BITCOIN_XPRIO          Bitcoin + priority
  0.0 FSL_BULK_SIG           Bulk signature with no Unsubscribe
  0.8 BITCOIN_EXTORT_01      Extortion spam, pay via BitCoin
  0.0 PDS_BTC_MSGID          Bitcoin ID with T_MSGID_NOFQDN2
  0.0 HDR_ORDER_FTSDMCXX_DIRECT Header order similar to spam
                             (FTSDMCXX/boundary variant) + direct-to-MX
  0.0 MIMEOLE_DIRECT_TO_MX   MIMEOLE + direct-to-MX
  0.0 TO_EQ_FM_DIRECT_MX     To == From and direct-to-MX
  3.3 BITCOIN_SPAM_07        BitCoin spam pattern 07
  3.1 DOS_OE_TO_MX           Delivered direct to MX with OE headers
  0.0 TO_EQ_FM_DOM_SPF_FAIL  To domain == From domain and external SPF
                             failed
  0.0 TO_EQ_FM_SPF_FAIL      To == From and external SPF failed
X-Spam-Flag: YES
Subject:  ***SPAM***  Your account is hacked. Your data is stolen. Learn how to regain access.
X-From-Rewrite: unmodified, forwarded message

Hi,

I am a hacker, and I have successfully gained access to your operating system.
I also have full access to your account.

I've been watching you for a few months now.

The fact is that your computer has been infected with malware through an adult site that you visited.
If you are not familiar with this, I will explain.
Trojan Virus gives me full access and control over a computer or other device.
This means that I can see everything on your screen, turn on the camera and microphone, but you do not know about it.
I also have access to all your contacts and all your correspondence.

Why did your antivirus not detect malware?
Answer: The malware I used is driver-based, I update its signatures every 4 hours. Hence your antivirus is unable to detect its presence.
I made a video showing how you satisfy yourself in the left half of the screen, and the right half shows the video you were watching at the time.

With one mouse click, I can send this video to all your emails and contacts on your social networks.
I can also make public all your e-mail correspondence and chat history on the messengers that you use.

If you don't want this to happen, transfer $950 in Bitcoin equivalent to my Bitcoin address (if you do not know how to do this, just search "buy bitcoin" on Google).

My Bitcoin address (BTC Wallet) is: 15NCWERN56DQNf4WiPLR2txgiEF2np5Q2g

After confirming your payment, I will delete the video immediately, and that's it. You will never hear from me again.
I will give you 50 hours (more than 2 days) to pay. I will get a notice, when you open this email, and the timer will start.
Filing a complaint somewhere does not make sense because this email cannot be tracked like my Bitcoin address.

I never make any mistakes.
If I find that you have shared this message with someone else, the video will be immediately distributed.

Best regards!