Canada post phish from kcr-inc.com Tokyo Japan

Return-path:

Envelope-to: dave@doctor.nl2k.ab.ca

Delivery-date: Sat, 11 Nov 2023 06:24:10 -0700

Received: from doctor by doctor.nl2k.ab.ca with local (Exim 4.97 (FreeBSD))

(envelope-from )

id 1r1nF3-00000000C7R-072Y

for dave@doctor.nl2k.ab.ca;

Sat, 11 Nov 2023 05:37:37 -0700

Resent-From: The Doctor

Resent-Date: Sat, 11 Nov 2023 05:37:36 -0700

Resent-Message-ID:

Resent-To: Dave Yadallee

Received: from www.kcr-inc.com ([202.51.9.218]:34711)

by doctor.nl2k.ab.ca with esmtps (TLS1.3) tls TLS_AES_256_GCM_SHA384

(Exim 4.97 (FreeBSD))

(envelope-from )

id 1r1m1o-000000005tI-2G7w

for root@nl2k.ab.ca;

Sat, 11 Nov 2023 04:20:00 -0700

Received: by www.kcr-inc.com (Postfix, from userid 10005)

id DEC7AA06BE6; Sat, 11 Nov 2023 20:17:56 +0900 (JST)

From: kcam-admin@kcam.co.jp

To: root@nl2k.ab.ca

Subject: You have a pending delivery - Canada Post

X-PHP-Originating-Script: 10005:hotmai.php

MIME-Version: 1.0

Content-Type: text/html; charset=UTF-8

Message-Id: <20231111111756.DEC7AA06BE6@www.kcr-inc.com>

Date: Sat, 11 Nov 2023 20:17:56 +0900 (JST)

X-Antivirus: AVG (VPS 231110-8, 11/10/2023), Inbound message

X-Antivirus-Status: Clean













































Pending Delivery



Your package is still pending delivery .



We have to re-confirm your delivery address and payment information before we proceed .
Please click here and verify your information.









Pay Here


Thank you.



 



 

































Trackbacks

Trackback specific URI for this entry

This link is not meant to be clicked. It contains the trackback URI for this entry. You can use this URI to send ping- & trackbacks from your own blog to this entry. To copy the link, right click and select "Copy Shortcut" in Internet Explorer or "Copy Link Location" in Mozilla.

No Trackbacks

Comments

Display comments as Linear | Threaded

No comments

Add Comment

Enclosing asterisks marks text as bold (*word*), underscore are made via _word_.
Standard emoticons like :-) and ;-) are converted to images.

To prevent automated Bots from commentspamming, please enter the string you see in the image below in the appropriate input box. Your comment will only be submitted if the strings match. Please ensure that your browser supports and accepts cookies, or your comment cannot be verified correctly.
CAPTCHA

Enclosing asterisks marks text as bold (*word*), underscore are made via _word_.
Standard emoticons like :-) and ;-) are converted to images.

To prevent automated Bots from commentspamming, please enter the string you see in the image below in the appropriate input box. Your comment will only be submitted if the strings match. Please ensure that your browser supports and accepts cookies, or your comment cannot be verified correctly.
CAPTCHA