Sh3ll
OdayForums


Server : LiteSpeed
System : Linux premium84.web-hosting.com 4.18.0-553.44.1.lve.el8.x86_64 #1 SMP Thu Mar 13 14:29:12 UTC 2025 x86_64
User : claqxcrl ( 523)
PHP Version : 8.1.32
Disable Function : NONE
Directory :  /home/claqxcrl/mail/new/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : //home/claqxcrl/mail/new/1679286361.M803725P3054170.premium84.web-hosting.com,S=4526,W=4610
Return-Path: <>
Delivered-To: claqxcrl@premium84.web-hosting.com
Received: from premium84.web-hosting.com
	by premium84.web-hosting.com with LMTP
	id UNxEL1ngF2Rami4A54oXFA
	(envelope-from <>)
	for <claqxcrl@premium84.web-hosting.com>; Mon, 20 Mar 2023 00:26:01 -0400
Return-path: <>
Envelope-to: claqxcrl@premium84.web-hosting.com
Delivery-date: Mon, 20 Mar 2023 00:26:01 -0400
Received: from mailnull by premium84.web-hosting.com with local (Exim 4.95)
	id 1pe75t-00CzMS-Oq
	for claqxcrl@premium84.web-hosting.com;
	Mon, 20 Mar 2023 00:26:01 -0400
X-Failed-Recipients: jucianodasilvasilvaa@gmail.com
Auto-Submitted: auto-replied
From: Mail Delivery System <Mailer-Daemon@premium84.web-hosting.com>
To: claqxcrl@premium84.web-hosting.com
References: <RZgja6rUcKL4a70V5Cx4qqgXSTjZpenwppfPARhZE@matelopsrp.com>
Content-Type: multipart/report; report-type=delivery-status; boundary=1679286361-eximdsn-27253980
MIME-Version: 1.0
Subject: Mail delivery failed: returning message to sender
Message-Id: <E1pe75t-00CzMS-Oq@premium84.web-hosting.com>
Date: Mon, 20 Mar 2023 00:26:01 -0400

--1679286361-eximdsn-27253980
Content-type: text/plain; charset=us-ascii

This message was created automatically by mail delivery software.

A message that you sent could not be delivered to one or more of its
recipients. This is a permanent error. The following address(es) failed:

  jucianodasilvasilvaa@gmail.com
    Message discarded as high-probability spam. You can find how to improve your message score here:
    https://www.namecheap.com/support/knowledgebase/article.aspx/9984/2216/why-emails-go-to-spam-and-what-to-do/ 

--1679286361-eximdsn-27253980
Content-type: message/delivery-status

Reporting-MTA: dns; premium84.web-hosting.com

Action: failed
Final-Recipient: rfc822;jucianodasilvasilvaa@gmail.com
Status: 5.0.0

--1679286361-eximdsn-27253980
Content-type: message/rfc822

Return-path: <claqxcrl@premium84.web-hosting.com>
Received: from claqxcrl by premium84.web-hosting.com with local (Exim 4.95)
	(envelope-from <claqxcrl@premium84.web-hosting.com>)
	id 1pe75r-00CzHT-9g
	for jucianodasilvasilvaa@gmail.com;
	Mon, 20 Mar 2023 00:25:59 -0400
To: jucianodasilvasilvaa@gmail.com
Subject: =?UTF-8?Q?MateloPSRP_"Pedido_de_Servi=C3=A7o"?=
X-PHP-Script: matelopsrp.com/index.php for 37.46.113.162, 37.46.113.162
X-PHP-Filename: /home/claqxcrl/matelopsrp.com/index.php REMOTE_ADDR: 37.46.113.162
Date: Mon, 20 Mar 2023 04:25:59 +0000
From: MateloPSRP <admin@matelopsrp.com>
Reply-To: hacker@kajakikaszuby.com
Message-ID: <RZgja6rUcKL4a70V5Cx4qqgXSTjZpenwppfPARhZE@matelopsrp.com>
X-Mailer: PHPMailer 6.6.5 (https://github.com/PHPMailer/PHPMailer)
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Sender:  <claqxcrl@premium84.web-hosting.com>

De: [your-name] <[your-email]>
Assunto: Pedido de Serviço | Gestão de Contactos e Relacionamento

Corpo da mensagem:
We have hacked your website matelopsrp.com and extracted your databases. This was due to the security holes you had in your your site/server which have gained us remote control of pretty much everything that was on the server. 

Our team is mostly interested in customer, administrative, and employee information which we have extracted through your databases once we got remote control over the server. It still needs to be sorted out but it will be well-organized once finished. First, we will be going through the emails/sms information and contacting the recipient how you held in disregard about their information being exposed to a hacking group when you could have stopped it. This would be detrimental to your personal image with these relationships with these people. Lastly, now that we have information not only will we be monetizing off it with our methods but made public or sold to other people that will do whatever they wish with the information also after we are done.

Now you can put a stop to this by paying a $3000 fee (0.11 BTC) in bitcoin to the address 3GYE9gjbYKAKz98UNZr8KeTXMNsKCb5LRX We will be notified of payment which we will then delete the information we have obtained, patch the hole in the site/server which we got in and remove you from any future targeting in the future. You have 72 hours in doing so after viewing this message or the series of steps will commence. You can obtain bitcoin through such services such as paxful.com or do a search on bing.com

-- 
Este email foi enviado por um formulário de contacto em MateloPSRP https://matelopsrp.com


--1679286361-eximdsn-27253980--

ZeroDay Forums Mini