Blackmail scam
Abuser: kf@chengmei.com
some brainless idiot trying to blackmail with FAKE hacking. just copy and paste bitcoinaddress on a picture very clever HA HA HA
some brainless idiot trying to blackmail with FAKE hacking. just copy and paste bitcoinaddress on a picture very clever HA HA HA
Same old bullshit sextortion scam using an image so you can't cut and paste.
Received: from [142.161.75.177.infopasa.com.br] (142.161.75.177.infopasa.com.br [177.75.161.142]) (Authenticated sender: lucas@microsave.com.br) by smtp-sp203-149.hospedagem.net (Postfix) with ESMTPA id 1E9ED6002F0C for <redacted>; Wed, 24 Apr 2019 18:17:27 -0300 (-03) Message-ID: <krt2si9-k38s76-00@microsave.com.br> X-Complaints-To: abuse@mailer.microsave.com.br
Hacked my computer and used my non existent web cam to spy on me.. Blah! blah! The email wasn't even text - it was a scanned image! I had to type in his bit coin wallet.
as described here: https://www.hoax-slayer.net/this-account-is-now-infected-fake-blackmail-sextortion-scam/ details from email: eceived-SPF: Permerror (SPF Permanent Error: Too many DNS lookups) identity=mailfrom; client-ip=200.147.32.41; helo=smtp.uhserver.com; envelope-from=defesacivil@araras.sp.gov.br; receiver=... Received: from smtp.uhserver.com (a2-smithers1.uhserver.com [200.147.32.41]) by ... (Postfix) with ESMTPS id C559B304771AE for <...>; Fri, 26 Apr 2019 19:26:44 +0200 (CEST) Received: from localhost (localhost.localdomain [127.0.0.1]) by a2-smithers1.uhserver.com (Postfix) with ESMTP id 4C79A1A0000CE for <...>; Fri, 26 Apr 2019 14:26:41 -0300 (BRT) Received: from [177-67-38-131.netslim.com.br] (unknown [177.67.38.131]) (Authenticated sender: defesacivil@araras.sp.gov.br) by a2-smithers1.uhserver.com (Postfix) with ESMTPA id CC7551A0000D8 for <...>; Fri, 26 Apr 2019 14:26:21 -0300 (BRT)
your account was recently infected