Blackmail scam
Abuser: prozess.fluid[AT]donaufront.com
Received: from ([191.5.254.237]) for <xerox.device7[AT][personaldomain].com> with Catch-All Filter; Fri, 23 Apr 2021 19:38:20 -0700 Received: from 237-254-5-191-reverso.varzeanet.com.br ([191.5.254.237]) by [webserver].us-win.[hostingprovider].com with ESMTP; Fri, 23 Apr 2021 19:38:20 -0700 From: <prozess.fluid[AT]donaufront.com> To: <xerox.device7[AT][personaldomain].com> Subject: Hackers have access to your device. Check details ASAP! Date: Fri, 23 Apr 2021 19:04:19 -0400 Message-ID: <004001d73899$07bf92ae$813a7e9e$[AT]donaufront.com> MIME-Version: 1.0 Content-Type: text/plain; charset="IBM852" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Office Outlook 12.0 Thread-Index: AQJFr5cXdx6C6duHb73Y2djSz176iw== Content-Language: en x-cr-hashedpuzzle: 2D4= 9o4m 35av 8s85 729o 4m35 av8s 8572 9o4m 35av 8s85 729o 4m35 k9e5 y0yw 810i;1;r5k9e5y0yw810ir5k9e5y0yw810ir5k9e5y0yw810ir5k9e5;Sosha1_v1;7;\{16D9431A-C78C-809E-51CB-0AC8FAF7E938\};ZQB3AGUAZg810ir5k9e5y0yw810ir5k9e5y0yw810ir5k9e5;23 Apr 2021 19:04:19 -0400;r24gtu2fym7on5r2 x-cr-puzzleid: \{16D9431A-C78C-809E-51CB-0AC8FAF7E938\} Body: ______________________________________________________________________ Hello there Let me introduce myself first - I am a professional programmer, who specializes in hacking during my free time. This time you were unlucky to become my next victim and I have just hacked the Operating System and your device. I have been observing you for several months. To put things in a simple way, I have infected your device with my virus while you were visiting your favorite adult website. ... The good news is that you can still prevent this from happening: All you need to do is transfer $1350 (USD) of bitcoin equivalent to my BTC wallet (if you don't know how to get it done, do some search online - there are plenty of articles describing the step-by-step process). My bitcoin wallet is (BTC Wallet): 1NToziZKcJfyxHpwkcxbafwghGasme4NUf ...