Hola necesito ayuda. He recibido este correo. "Emma Hickson pregunta desde la web: We are a group of highly qualified ethical hackers who scan tens of thousands of sites every day for critical vulnerabilities and patch them for a small fee.
On your site 81.181 - we have discovered 5 critical vulnerabilities, each of which can give attackers full access to your site, databases and the server as a whole.
Pay $3000 (0.15 BTC) by visiting this site where you will be able to copy our bitcoin (btc) address or scan the QR code with your device https://www.blockchain.com/explorer/addresses/btc/3Ck6iD6Npf2TZwnN29xLBc73QU3RDr4zo5
And after payment within 12 hours we will fix all the vulnerabilities on your site and you can sleep peacefully without worrying about the safety of your site and server.
If we are hired by well-known corporations, then we charge from $50000 for our services, so you are lucky that we offer you the same service for $3000 (0.15 BTC)".
He comprobado puertos y el firewall esta activo. Podría ponerlo en conocimiento de Movistar para mi seguridad y la de todos?
hola Webby:
Como dice nuestro usuario anterior, Antena-kAT(gracias por tu aportación) lo mejor es ignorarlos y no pagar ningún dinero.
Si lo deseas puedes enviarnos las cabeceras ocultas completas del correo que has recibido para que podamos analizarlo.
Un saludo
Puedes notificarnos cualquier aviso o fraude a través de nemesys@telefonica.es, abuse@movistar.esTambién te invitamos a seguirnos en Twitter, Facebook y Google+.
Gracias. El mensaje se envio desde un formulario web de contacto que tengo en la pagina, esta es la cabecera del correo recibido en gmail.
"
Delivered-To: seinproweb@gmail.com Received: by 2002:aa7:cb15:0:b0:4eb:3375:d550 with SMTP id s21csp405975edt; Sat, 11 Mar 2023 12:55:54 -0800 (PST) X-Google-Smtp-Source: AK7set9St1B8T+s1impEtYwZoX23bEMUd9z5LMxy3v/bvD49YWK8wYzXHLbgBFA3Oc8pFLQ3QAaohSrsA2Y= X-Received: by 2002:a7b:c2a1:0:b0:3eb:5a1e:d526 with SMTP id c1-20020a7bc2a1000000b003eb5a1ed526mr1817985wmk.2.1678568154055; Sat, 11 Mar 2023 12:55:54 -0800 (PST) Authentication-Results: mx.google.com; spf=pass (google.com: found no external ips, assuming domain of hacker@meridiansystematik.de as permitted sender) smtp.mailfrom=hacker@meridiansystematik.de Received-SPF: pass (google.com: found no external ips, assuming domain of hacker@meridiansystematik.de as permitted sender) Received: by 2002:a05:6000:807:b0:2c5:5635:240 with POP3 id bt7-20020a056000080700b002c556350240mf2383470wrb.2; Sat, 11 Mar 2023 12:55:54 -0800 (PST) X-Gmail-Fetch-Info: seinpro@duti.ddns.net 1 duti.ddns.net 110 seinpro Return-Path: hacker@meridiansystematik.de Received: from AspEmail (duti.ddns.net [192.168.1.101]) by duti.ddns.net with ESMTP ; Sat, 11 Mar 2023 21:54:07 +0100 Message-ID: <4939601B-8E68-4688-B08D-F55495E1593B@duti.ddns.net> From: <hacker@meridiansystematik.de> To: seinpro@duti.ddns.net Subject: 5 Vulnerabilities Have Been Found In Your Site Date: Sat, 11 Mar 2023 21:54:06 +0100 MIME-Version: 1.0 Emma Hickson pregunta desde la web: We are a group of highly qualified ethical hackers who scan tens of thousands of sites every day for critical vulnerabilities and patch them for a small fee. On your site 81.181 - we have discovered 5 critical vulnerabilities, each of which can give attackers full access to your site, databases and the server as a whole. Pay $3000 (0.15 BTC) by visiting this site where you will be able to copy our bitcoin (btc) address or scan the QR code with your device https://www.blockchain.com/explorer/addresses/btc/3Ck6iD6Npf2TZwnN29xLBc73QU3RDr4zo5 And after payment within 12 hours we will fix all the vulnerabilities on your site and you can sleep peacefully without worrying about the safety of your site and server. If we are hired by well-known corporations, then we charge from $50000 for our services, so you are lucky that we offer you the same service for $3000 (0.15 BTC)"
Buenos días:
Envíanos estas cabeceras a la dirección nemesys@telefonica.es para un correcto tratamiento
Gracias, saludos
Puedes notificarnos cualquier aviso o fraude a través de nemesys@telefonica.es, abuse@movistar.esTambién te invitamos a seguirnos en Twitter, Facebook y Google+.