Logo



Scam email #212315
Subject
mugu.recycling.inc, Your questions answered inside
Date
2017-01-10 20:25:48
Advert

Header (click)
Message




















































/>










id="baliol">



















































Read your message before it gets deleted.

US intelligence has identified the go-betweens the Russians used to provide stolen emails to WikiLeaks, according to US officials familiar with the classified intelligence report that was presented to President Barack Obama on Thursday.



In a Fox News interview earlier this week, WikiLeaks founder Julian Assange denied that Russia was the source of leaked Democratic emails that roiled the 2016 election to the detriment of President-elect Donald Trump's rival, Democrat Hillary Clinton.

Meanwhile, US intelligence has received new information following the election that gave agencies increased confidence that Russia carried out the hack and did so, in part, to help Trump win.

Included in that new information were intercepted conversations of Russian officials expressing happiness at Trump's win. Another official described some of the messages as congratulatory.

Officials said this was just one of multiple indicators to give them high confidence of both Russian involvement and Russian intentions. Officials reiterated that there is no single intercepted communication that qualifies as a "smoking gun" on Russia's intention to benefit Trump's candidacy or to claim credit for doing so.











SpamAssassin Report (spam score: 7.6)



 pts rule name               description
---- ---------------------- --------------------------------------------------
2.5 URIBL_DBL_SPAM Contains a spam URL listed in the DBL blocklist
[URIs: ipqoecon.win]
0.0 TVD_RCVD_IP4 Message was received from an IPv4 address
0.0 TVD_RCVD_IP Message was received from an IP address
-0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at http://www.dnswl.org/, no
trust
[74.125.82.49 listed in list.dnswl.org]
2.6 RCVD_IN_SBL RBL: Received via a relay in Spamhaus SBL
[196.247.211.151 listed in zen.spamhaus.org]
0.5 RCVD_IN_SORBS_SPAM RBL: SORBS: sender is a spam source
[74.125.82.49 listed in dnsbl.sorbs.net]
-0.0 SPF_PASS SPF: sender matches SPF record
0.7 LOCALPART_IN_SUBJECT Local part of To: address appears in Subject
0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked.
See
http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
for more information.
[URIs: ipqoecon.win]
0.0 HTML_IMAGE_ONLY_32 BODY: HTML: images with 2800-3200 bytes of words
0.0 HTML_MESSAGE BODY: HTML included in message
1.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts
0.0 AC_BR_BONANZA RAW: Too many newlines in a row... spammy template
0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid
0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid
0.0 T_REMOTE_IMAGE Message contains an external image
Advert

Disclaimer (click)
Comments
Location



 


©2013-2016 Scammed.by - all rights reserved. Powered by IIS 8.5 on Windows Server 2012 R2scammed.by review, PageRank, website value and SEO analytics