Linux altar53.supremepanel53.com 4.18.0-553.8.1.lve.el8.x86_64 #1 SMP Thu Jul 4 16:24:39 UTC 2024 x86_64
/ home/ bdapparelinfo/ mail/ new/ |
|
Return-Path: <> Delivered-To: bdapparelinfo@altar56.supremepanel56.com Received: from altar56.supremepanel56.com by altar56.supremepanel56.com with LMTP id qEn8KjnhG2RaIQAAkKCAWQ (envelope-from <>) for <bdapparelinfo@altar56.supremepanel56.com>; Thu, 23 Mar 2023 05:18:49 +0000 Return-path: <> Envelope-to: bdapparelinfo@altar56.supremepanel56.com Delivery-date: Thu, 23 Mar 2023 05:18:49 +0000 Received: from mailnull by altar56.supremepanel56.com with local (Exim 4.96) id 1pfDLd-0004Me-23 for bdapparelinfo@altar56.supremepanel56.com; Thu, 23 Mar 2023 05:18:49 +0000 X-Failed-Recipients: md.wasim0@gmail.com, sroth2020@gmail.com Auto-Submitted: auto-replied From: Mail Delivery System <Mailer-Daemon@altar56.supremepanel56.com> To: bdapparelinfo@altar56.supremepanel56.com References: <E1pfDLc-0004Ll-0b@altar56.supremepanel56.com> Content-Type: multipart/report; report-type=delivery-status; boundary=1679548729-eximdsn-1573076533 MIME-Version: 1.0 Subject: Mail delivery failed: returning message to sender Message-Id: <E1pfDLd-0004Me-23@altar56.supremepanel56.com> Date: Thu, 23 Mar 2023 05:18:49 +0000 --1679548729-eximdsn-1573076533 Content-type: text/plain; charset=us-ascii This message was created automatically by mail delivery software. A message that you sent could not be delivered to one or more of its recipients. This is a permanent error. The following address(es) failed: md.wasim0@gmail.com host gmail-smtp-in.l.google.com [142.250.27.27] SMTP error from remote mail server after end of data: 550-5.7.26 This mail is unauthenticated, which poses a security risk to the 550-5.7.26 sender and Gmail users, and has been blocked. The sender must 550-5.7.26 authenticate with at least one of SPF or DKIM. For this message, 550-5.7.26 DKIM checks did not pass and SPF check for [altar56.supremepanel56.c 550-5.7.26 om] did not pass with ip: [170.10.163.183]. The sender should visit 550-5.7.26 https://support.google.com/mail/answer/81126#authentication for 550 5.7.26 instructions on setting up authentication. z6-20020a170906944600b00931bc7937a0si15140266ejx.497 - gsmtp sroth2020@gmail.com host gmail-smtp-in.l.google.com [142.250.27.27] SMTP error from remote mail server after end of data: 550-5.7.26 This mail is unauthenticated, which poses a security risk to the 550-5.7.26 sender and Gmail users, and has been blocked. The sender must 550-5.7.26 authenticate with at least one of SPF or DKIM. For this message, 550-5.7.26 DKIM checks did not pass and SPF check for [altar56.supremepanel56.c 550-5.7.26 om] did not pass with ip: [170.10.163.183]. The sender should visit 550-5.7.26 https://support.google.com/mail/answer/81126#authentication for 550 5.7.26 instructions on setting up authentication. z6-20020a170906944600b00931bc7937a0si15140266ejx.497 - gsmtp --1679548729-eximdsn-1573076533 Content-type: message/delivery-status Reporting-MTA: dns; altar56.supremepanel56.com Action: failed Final-Recipient: rfc822;sroth2020@gmail.com Status: 5.0.0 Remote-MTA: dns; gmail-smtp-in.l.google.com Diagnostic-Code: smtp; 550-5.7.26 This mail is unauthenticated, which poses a security risk to the 550-5.7.26 sender and Gmail users, and has been blocked. The sender must 550-5.7.26 authenticate with at least one of SPF or DKIM. For this message, 550-5.7.26 DKIM checks did not pass and SPF check for [altar56.supremepanel56.c 550-5.7.26 om] did not pass with ip: [170.10.163.183]. The sender should visit 550-5.7.26 https://support.google.com/mail/answer/81126#authentication for 550 5.7.26 instructions on setting up authentication. z6-20020a170906944600b00931bc7937a0si15140266ejx.497 - gsmtp Action: failed Final-Recipient: rfc822;md.wasim0@gmail.com Status: 5.0.0 Remote-MTA: dns; gmail-smtp-in.l.google.com Diagnostic-Code: smtp; 550-5.7.26 This mail is unauthenticated, which poses a security risk to the 550-5.7.26 sender and Gmail users, and has been blocked. The sender must 550-5.7.26 authenticate with at least one of SPF or DKIM. For this message, 550-5.7.26 DKIM checks did not pass and SPF check for [altar56.supremepanel56.c 550-5.7.26 om] did not pass with ip: [170.10.163.183]. The sender should visit 550-5.7.26 https://support.google.com/mail/answer/81126#authentication for 550 5.7.26 instructions on setting up authentication. z6-20020a170906944600b00931bc7937a0si15140266ejx.497 - gsmtp --1679548729-eximdsn-1573076533 Content-type: message/rfc822 Return-path: <bdapparelinfo@altar56.supremepanel56.com> Received: from bdapparelinfo by altar56.supremepanel56.com with local (Exim 4.96) (envelope-from <bdapparelinfo@altar56.supremepanel56.com>) id 1pfDLc-0004Ll-0b; Thu, 23 Mar 2023 05:18:48 +0000 To: sroth2020@gmail.com, md.wasim0@gmail.com Subject: Mail From Our Website :Your Website Has Been Compromised X-PHP-Script: www.aifatradebd.com/contact.php for 37.46.113.158 X-PHP-Originating-Script: 2513:contact.php From: hacker@orderchamp.club Reply-To: hacker@orderchamp.club Content-type: text/html; charset=iso-8859-1 Message-Id: <E1pfDLc-0004Ll-0b@altar56.supremepanel56.com> Date: Thu, 23 Mar 2023 05:18:48 +0000 <div style='line-height:30px; color:#C00; border:1px solid #CCC;padding:10px;'><strong>Name :</strong> Harry Hannan<br><strong>Email:</strong> hacker@orderchamp.club<br><strong>Subject:</strong> Your Website Has Been Compromised<br><strong>Message:</strong> We have hacked your website aifatradebd.com and extracted your databases. This was due to the security holes you had in your your site/server which have gained us remote control of pretty much everything that was on the server. <br /> <br /> Our team is mostly interested in customer, administrative, and employee information which we have extracted through your databases once we got remote control over the server. It still needs to be sorted out but it will be well-organized once finished. First, we will be going through the emails/sms information and contacting the recipient how you held in disregard about their information being exposed to a hacking group when you could have stopped it. This would be detrimental to your personal image with these relationships with these people. Lastly, now that we have information not only will we be monetizing off it with our methods but made public or sold to other people that will do whatever they wish with the information also after we are done.<br /> <br /> Now you can put a stop to this by paying a $3000 fee (0.11 BTC) in bitcoin to the address 3PmYSqtG5x5bGNrsYUy5DGtu93qNtsaPRH We will be notified of payment which we will then delete the information we have obtained, patch the hole in the site/server which we got in and remove you from any future targeting in the future. You have 72 hours in doing so after viewing this message or the series of steps will commence. You can obtain bitcoin through such services such as paxful.com or do a search on bing.com<br> --1679548729-eximdsn-1573076533--