[nsp-sec] Another money-laundering invite from *@gmail.com
Paul Goyette
pgoyette at juniper.net
Wed Jul 2 09:02:52 EDT 2008
>From XPinfo at shannonside.ie Wed Jul 2 05:43:58 2008
Return-Path: <XPinfo at shannonside.ie>
X-Original-To: paul at whooppee.com
Delivered-To: paul at whooppee.com
Received: from localhost (localhost [127.0.0.1])
by quicky.whooppee.com (Postfix) with SMTP id 9A5825833
for <paul at whooppee.com>; Wed, 2 Jul 2008 05:43:57 -0700 (PDT)
Received: from quicky.whooppee.com (localhost [127.0.0.1])
by quicky.whooppee.com (Postfix) with ESMTP id 78F855880
for <paul at whooppee.com>; Wed, 2 Jul 2008 05:43:56 -0700 (PDT)
Received: from mail.speakeasy.net
by quicky.whooppee.com with IMAP (fetchmail-6.3.8)
for <paul at whooppee.com> (single-drop); Wed, 02 Jul 2008 05:43:56
-0700 (PDT)
Received: (qmail 9571 invoked from network); 2 Jul 2008 12:41:43 -0000
Received: from mxperim8.sea5.speakeasy.net ([69.17.117.73])
(envelope-sender <XPinfo at shannonside.ie>)
by mail23.sea5.speakeasy.net (qmail-ldap-1.03) with SMTP
for <paul at whooppee.com>; 2 Jul 2008 12:41:43 -0000
Received: from localhost (localhost [127.0.0.1])
by mxperim8.sea5.speakeasy.net (Postfix) with ESMTP id
3407BF7448
for <paul at whooppee.com>; Wed, 2 Jul 2008 05:41:43 -0700 (PDT)
X-Virus-Scanned: Debian amavisd-new at mxperim8.sea5.speakeasy.net
Received: from mxperim8.sea5.speakeasy.net ([127.0.0.1])
by localhost (mxperim8.sea5.speakeasy.net [127.0.0.1])
(amavisd-new, port 10024)
with ESMTP id 22fX7GB8RN1Q for <paul at whooppee.com>;
Wed, 2 Jul 2008 05:41:41 -0700 (PDT)
Received: from 78-9-112-92.pool.ukrtel.net (unknown [92.112.9.78])
by mxperim8.sea5.speakeasy.net (Postfix) with ESMTP
for <paul at whooppee.com>; Wed, 2 Jul 2008 05:41:21 -0700 (PDT)
Message-ID: <000601c8dc40$0687cc9e$395c5e8a at gvoqgcg>
From: "bud melville" <XPinfo at shannonside.ie>
To: <paul at whooppee.com>
Subject: *SPAM* [SPAM] A big international company is looking for
partners
Date: Wed, 02 Jul 2008 10:53:49 +0000
MIME-Version: 1.0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.3138
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3198
X-Spam-Prev-Subject: A big international company is looking for
partners
X-Spam-Checker-Version: SpamAssassin 3.0.4 (2005-06-05) on mail23.sea5
X-Spam-Level: *******
X-Spam-Status: Yes, score=7.3 required=6.0 tests=BAYES_80,
HELO_DYNAMIC_IPADDR2 autolearn=disabled version=3.0.4
X-Spam-Report:
* 3.5 HELO_DYNAMIC_IPADDR2 Relay HELO'd using suspicious
hostname (IP addr 2)
* 3.8 BAYES_80 BODY: Bayesian spam probability is 80 to 95%
* [score: 0.9490]
X-DSPAM-Result: Spam
X-DSPAM-Processed: Wed Jul 2 05:43:57 2008
X-DSPAM-Confidence: 0.9986
X-DSPAM-Probability: 1.0000
X-DSPAM-Signature: 486b780d1761373021274
X-DSPAM-Factors: 15,
Subject*[SPAM], 0.99979,
X-Spam-Status*Yes, 0.99978,
X-Spam-Report*suspicious, 0.99941,
X-Spam-Report*suspicious+hostname, 0.99941,
X-Spam-Report*Relay, 0.99941,
X-Spam-Report*Relay+HELO'd, 0.99941,
X-Spam-Report*hostname, 0.99941,
X-Spam-Report*HELO'd, 0.99941,
X-Spam-Report*HELO'd+using, 0.99941,
X-Spam-Report*using+suspicious, 0.99940,
X-Spam-Report*using, 0.99940,
X-Spam-Report*hostname+(IP, 0.99925,
X-Spam-Report*addr, 0.99925,
X-Spam-Report*(IP, 0.99925,
X-Spam-Report*(IP+addr, 0.99925
Company is searching for managers, we will provide good salary and
profits ( 600 USD - 2000 USD per week), first 10 candidates will get
invitation to start working in our company.( 10 countries are working
with
our company today).
Our offers bonuses at the end of every month and the employee of the
month will get a pleasant surprise. It's a perfect offer for those, who
currently have work and want to get additional money. It won't take much
time, just 1-2 hours a day. Think about it, it's easy and well-paid.
Interesting work with people and Internet. We are waiting for your
resume: ctccompany1 at gmail.com
!DSPAM:486b780d1761373021274!
Paul Goyette
Juniper Networks Customer Service
JTAC Senior Escalation Engineer
Juniper Security Incident Response Team
PGP Key ID 0x53BA7731 Fingerprint:
FA29 0E3B 35AF E8AE 6651
0786 F758 55DE 53BA 7731
More information about the nsp-security
mailing list