Будьте бдительны рассылка скамовых писем.

AG
На сайте с 04.10.2010
Offline
103
736

Пришло на ящик пару часов назад , судя по теме на webhostingtalk ( http://www.webhostingtalk.com/showthread.php?t=1052123 ) не только мне одному.

Но многим РУ хостерам думаю тоже придет.

В аттаче к письму вредоносный word и pdf , многим прило не рабочее вложение но мне попался рабочий pdf.


Тема : Cease and desist copyright infrigement!

Dear Sir,

Attached is a list of the copyrighted material you are infriging on.
We are the proprietors of all copyrighted material that is being fringed upon on your companies webste.
We have reserved all rights regarding these trademarked files.
Permission was neither asked nor granted to reproduce our copyrighted material, therefore what your company is doing constitutes infringement of our rights. In terms of the Copyright Statutes, we are entitled to an injunction against your continued infringement, as well as to recover damages from you for the loss we have suffered as a result of your infringing conduct.

In the circumstances, we demand that you immediately:

1. remove all infringing content and notify us in writing that you have done so;

2. pay a licensing fee in the amount of 160,000 USD;

3. immediately cease the use and distribution of copyrighted material;

We await to hear from you by.

This is written without prejudice to our rights, all of which are hereby expressly reserved.

Yours faithfully,
CEO Andrew Webber
www.arizonakey.com

Заголовки письма.


Delivered-To: abuse@xxxxxxxx.com
Received: by 10.101.32.2 with SMTP id k2cs16640anj;
Fri, 27 May 2011 10:17:52 -0700 (PDT)
Received: by 10.227.204.197 with SMTP id fn5mr2313705wbb.36.1306516672026;
Fri, 27 May 2011 10:17:52 -0700 (PDT)
Return-Path: <roebben@adv-roebbenvelkeneers.be>
Received: from s01.gt-networks.be (s01.gt-networks.be [94.103.146.92])
by mx.google.com with ESMTPS id e7si3953415wbh.65.2011.05.27.10.17.51
(version=TLSv1/SSLv3 cipher=OTHER);
Fri, 27 May 2011 10:17:52 -0700 (PDT)
Received-SPF: pass (google.com: domain of roebben@adv-roebbenvelkeneers.be designates 94.103.146.92 as permitted sender) client-ip=94.103.146.92;
Authentication-Results: mx.google.com; spf=pass (google.com: domain of roebben@adv-roebbenvelkeneers.be designates 94.103.146.92 as permitted sender) smtp.mail=roebben@adv-roebbenvelkeneers.be
Received: from apache by s01.gt-networks.be with local (Exim 4.76)
(envelope-from <roebben@adv-roebbenvelkeneers.be>)
id 1QQ0fY-0002US-Iz
for novikov@agata-group.com; Fri, 27 May 2011 19:17:52 +0200
To: abuse@xxxxxxxx.com
Subject: Cease and desist copyright infrigement!
X-PHP-Script: adv-roebbenvelkeneers.be/ad/sendme.php for 82.195.232.218
From: Andrew Webber - Arizonakey.com <andrew.webber@arizonakey.com>
Reply-To:
MIME-Version: 1.0
Content-Type: text/plain
Content-Transfer-Encoding: 8bit
Message-Id: <E1QQ0fY-0002US-Iz@s01.gt-networks.be>
Date: Fri, 27 May 2011 19:17:52 +0200

Хоть особой опасности не представляет но будьте бдительны , с вложениями такими которые присылают , мы уже успели проколоться пару раз с вредоносными PDF файлами.

P>S

Также по слухам аккаунты на directadmin.com скомпрометированы.

И письма приходят в основном пользователям DA и реселлерам.

rustelekom
На сайте с 20.04.2005
Offline
523
#1

это не слухи, так и есть. ломанули их сервер корпоративный.

SSD VPS, SSD хостинг и выделенные серверы в Германии или РФ, FTP хранилища, регистрация доменов и SSL сертификаты ( https://www.robovps.biz/ ) Контакты: Telegram ( https://t.me/rustelekom_bot )
AG
На сайте с 04.10.2010
Offline
103
#2
rustelekom:
это не слухи, так и есть. ломанули их сервер корпоративный.

Да но от директ админа другое письмо было , что типа ссылка на фишинговый сайт ведет.


In the last 24 hours an e-mail was sent to clients with the subject: "DirectAdmin Client Message." This message claimed there was a serious DirectAdmin security issue and included a link to a phishing website.

We apologize to all our clients because this was a result of our server being compromised. Please DELETE the phishing e-mail and run a virus scanner if you clicked on the link. Most people were not exposed to the phishing site because it was taken down very quickly. For this reason you may have seen a 404 error only.

First and foremost, your billing information remains 100% safe. We store no financial information on our server. In addition, we use a merchant gateway that restricts us, even as owners, from viewing your credit card information. Secondly, there is no security issue with the latest version of DirectAdmin. We have no reason to belive that DirectAdmin or any related software is vulnerable to attack. There are thousands of DirectAdmin servers and no reports of any being compromised.

Please note that we encrypt ALL passwords; for example, any password generated (e.g. client account password) and any password you provide (e.g. server password on the order form). Although cracking encrypted passwords is unlikely, changing your password is the best way to guarantee 100% security. Aside from that, there is nothing else you need to do as a customer. Your DirectAdmin server is not open to any new vulnerabilities.

We sincerely apologize and take responsibility for this incident. If you require more specific information please contact me at mark@jbmc-software.com for a personal response, or you can use our regular support@directadmin.com address. I'm available for addressing specific questions and concerns.

Mark
JBMC Software

А тут совсем другое...

Ну да ладно...

НКВД.pro
На сайте с 21.03.2009
Offline
140
#3

Да, нам пришло и от этих, и от DirectAdmin.

"Народный комиссариат виртуальных дел (http://nkvd.pro)". На хостинг-рынке с 2006 г. Да, девятый год на рынке хостинга и самая быстрая поддержка. :)
rustelekom
На сайте с 20.04.2005
Offline
523
#4

нет, там письмо было разослано с jbms-software.com а это их собственный корпортативный сервер. ссылка вела на сайт где посетители заражались эксплоитом.

NQhost
На сайте с 12.05.2010
Offline
88
#5

Прям неделя атак на хостеров.

И от "DA" пришел фишинг и от этих якобы с "arizonakey.com".

NQhost.com : Linux VPS (http://ru.nqhost.com), Windows VPS (http://ru.nqhost.com/windows-vps.html) в России, Германии и США Виртуализация - наша специализация
globalmoney
На сайте с 09.12.2005
Offline
391
#6

Мне прилетело целых три письма от них, с одним и тем же содержанием.

MGNHost.ru - полный комплекс хостинг услуг ( https://www.mgnhost.ru ) VPS/VDS на SSD дисках в России / Нидерландах / США от 210 рублей ( https://www.mgnhost.ru/vds.php )

Авторизуйтесь или зарегистрируйтесь, чтобы оставить комментарий