[bitfolk] Moved to calendar monthly / quarterly / yearly bil…

Top Page

Reply to this message
Author: Andy Smith
Date:  
Subject: [bitfolk] Moved to calendar monthly / quarterly / yearly billing
CUdG3dM3ja4hFy9rwjdjygbhArnZ+bZgfU4vBoeLgQaP5dfnjBaitqICWJdu0cLPfNxWN084biVnjdWIE+Mz+RwmFwwkhTdKR6E=;
X-YMail-OSG: Me1wOTUVM1n9pRqQ8gywMoL26oDl.z.DZ98Oc13vM3Och8u
    jABgSG0xiI4S0auj1Z_09Us.FbODAb72fOwJLXqFtEkcR3jSDFQ7_Ys3qThk
    QVmiPCCX9zSyG0tNgL.R_4Vzr2whmqMU4FXJXMqC9mApsRQSZIvpVUjbYaTs
    vBIugSi5YHAEcgUR5wpryknDtjg_xoDBCGHHbiIsDjcw9RdoSCCQmDZhrGGm
    ncou_qs9dvtcSpmziSEOCLIFeH4.UJ47f97bqKuYFL.ttTBvp5ekbKJm0HeM
    wDN7MrrDVBNM13Vwey1Dsfs7sjcZ53N3U7NS_zcVjAIxmB.vVgnFieUjq4p_
    m3xEMWgZokD_7Jb15PU0dQzpiVbSJNE8O7CTnm.hQyUn5Q0D3UAjo3vtJH86
    qOGz25I2OJInqoKIloJ0mbhlw3sOSmD4gbtUSoKFuG.uSAxuG6RCb6cy8P6o
    TErzYzwGJGqvZsJo1_slwoRRjFKTnBaacWmebDCqN_wnXrMzU2ZDZhp1Vfru
    yt8mOpehkQ90LHeU_nbGn6NbhQyLY2gv.soLsg16AZJ.hK7OHfhcNilzjWPI
    w.v99_2shBkNx53GD8lRa3BuvoczzVH8332IDemiHWero
Received: from [193.54.50.250] by web45308.mail.sp1.yahoo.com via HTTP;
    Sat, 18 Feb 2012 04:14:16 PST
X-Mailer: YahooMailClassic/15.0.4 YahooMailWebService/0.8.116.338427
Message-ID: <1329567256.98879.YahooMailClassic@???>
Date: Sat, 18 Feb 2012 04:14:16 -0800 (PST)
From: Max B <txtmax@???>
To: users@???
MIME-Version: 1.0
Content-Type: multipart/alternative;
    boundary="322902375-811045692-1329567256=:98879"
X-Virus-Scanner: Scanned by ClamAV on mail.bitfolk.com at Sat,
    18 Feb 2012 12:15:24 +0000
X-SA-Exim-Connect-IP: 98.139.91.216
X-SA-Exim-Mail-From: txtmax@???
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on
    spamd2.lon.bitfolk.com
X-Spam-Level: **
X-Spam-ASN: AS36752 98.139.64.0/19
X-Spam-Status: No, score=2.3 required=5.0 tests=DKIM_SIGNED,DKIM_VALID,
    DKIM_VALID_AU,HTML_MESSAGE,RCVD_IN_DNSWL_NONE,URI_NO_WWW_BIZ_CGI
    shortcircuit=no autolearn=disabled version=3.3.1
X-Spam-Report: * -0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at http://www.dnswl.org/,
    no *      trust *      [98.139.91.216 listed in list.dnswl.org]
    * 2.4 URI_NO_WWW_BIZ_CGI URI: CGI in .biz TLD other than third-level
    "www" *  0.0 HTML_MESSAGE BODY: HTML included in message
    * -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from
    author's *       domain
    * -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
    *  0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily
    *      valid
X-SA-Exim-Version: 4.2.1 (built Wed, 25 Jun 2008 17:14:11 +0000)
X-SA-Exim-Scanned: Yes (on mail.bitfolk.com)
Subject: [bitfolk] idle curiosity? bank phishing scam,
    was Fw: Notice ID:01ZMCX
X-BeenThere: users@???
X-Mailman-Version: 2.1.11
Precedence: list
List-Id: Users of BitFolk hosting <users.lists.bitfolk.com>
List-Unsubscribe: <https://lists.bitfolk.com/mailman/options/users>,
    <mailto:users-request@lists.bitfolk.com?subject=unsubscribe>
List-Archive: <http://lists.bitfolk.com/lurker/list/users.html>
List-Post: <mailto:users@lists.bitfolk.com>
List-Help: <mailto:users-request@lists.bitfolk.com?subject=help>
List-Subscribe: <https://lists.bitfolk.com/mailman/listinfo/users>,
    <mailto:users-request@lists.bitfolk.com?subject=subscribe>
X-List-Received-Date: Sat, 18 Feb 2012 12:15:25 -0000


--322902375-811045692-1329567256=:98879
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable





Hi bitfolkers,

I was emailed today by a phish bot (copy withheld by yahoo spamguard) which=
seeks bank information.=A0 The scam appears to redirect victims to a locat=
ion in Stanford (see www.81solutions.com/server-location.html) whose host i=
s located in Austria: 171.66.18.10 resolved by scotiaonline.scotiabank.comp=
an.for-some.biz=A0=20

I suspect this is a VPS, in an organisation similar to bitfolk, with a viru=
s.

Which leads me to ask some questions of this list:

1) Do I have a duty in law to maintain a phishbot-virus-free VPS?

2) Can a mandamus order shut down an innocent VPS owner whose server hosts =
a phishbot virus?

3) Has a bitfolk VPS owner ever been targetted by phishbots?=A0 If so, what=
were