Quoting Michael Siladi ([email protected]):
> Hey!
>
>
>
> Open message [RM: payload URL snipped]
>
>
>
> [email protected]
Imprtant note: That was _not_ from Michael Siladi, and not from his ISP
Netcom, but rather a spammer forgery -- as can be seen in the SMTP
headers:
Received: from msa02a.plala.or.jp (msa02.plala.or.jp [58.93.240.2])
by che.dreamhost.com (Postfix) with ESMTP id 09C2310579
for <[email protected]>; Thu, 24 Mar 2016 10:18:56 -0700 (PDT)
BASFA's mailing list is hosted at Dreamhost, which accepted in this case
incoming mail from IP address 58.93.240.2, an Internet server at
plala.or.jp, which is NTT Plala, Inc., a major consumer ISP in Japan --
where the spam was probably injected into the outbound mail stream by a
malware-infected customer MS-Windows desktop machine.
Michael is blameless in all of this. He didn't send it, his own machine
isn't malware-infected, his ISP password hasn't been stolen, and his ISP
isn't involved.
_______________________________________________
Basfa mailing list
[email protected]
http://lists.basfa.org/listinfo.cgi/basfa-basfa.org