has anyone a alternative working email of them ?
-- gerhard
Return-Path: <>
X-Original-To: abuse@clean-mx.de
Delivered-To: abuse@clean-mx.de
Received: from relayn.netpilot.net (relayn19.netpilot.net [195.214.79.19])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client
certificate requested) by ksrv8.netpilot.net (Postfix) with ESMTPS id
46310252C002 for <abuse@clean-mx.de>; Sun, 14 Feb 2010 16:28:15 +0100 (CET)
Received: from relayn.netpilot.net (localhost [127.0.0.1]) by
relayn.netpilot.net (Postfix) with ESMTP id 0E03AEAC2A4 for
<abuse@clean-mx.de>; Sun, 14 Feb 2010 16:28:15 +0100 (CET)
Received: from localhost (unknown [127.0.0.1]) by localhost (Postfix) with
ESMTP id DF3F9EAC2A6 for <abuse@clean-mx.de>; Sun, 14 Feb 2010 15:28:14
+0000 (UTC)
Received: from relayn.netpilot.net ([127.0.0.1]) by localhost
(relayn.netpilot.net [127.0.0.1]) (clean-mx, port 10024) with ESMTP id
H21OdIeGCUKR for <abuse@clean-mx.de>; Sun, 14 Feb 2010 16:28:14 +0100 (CET)
Received: from mail.amena.es (mail.amena.es [213.143.32.26]) by
relayn.netpilot.net (Postfix) with ESMTP id A53CEEAC2A4 for
<abuse@clean-mx.de>; Sun, 14 Feb 2010 16:28:13 +0100 (CET)
Received: from aotcoprdmzn0002.cosmos.es.ftgroup ([10.132.21.55]) by
mail.amena.es with Microsoft SMTPSVC(6.0.3790.3959); Sun, 14 Feb 2010
16:28:12 +0100
Received: from aotcoprsmtpn002.cosmos.es.ftgroup ([10.132.14.225]) by
aotcoprdmzn0002.cosmos.es.ftgroup with Microsoft SMTPSVC(6.0.3790.3959);
Sun, 14 Feb 2010 16:28:12 +0100
Received: from MAVA55BEX002P.cosmos.es.ftgroup ([10.113.57.134]) by
aotcoprsmtpn002.cosmos.es.ftgroup with Microsoft SMTPSVC(6.0.3790.3959);
Sun, 14 Feb 2010 16:28:12 +0100
From: postmaster@es.ftgroup
To: abuse@clean-mx.de
Date: Sun, 14 Feb 2010 16:28:12 +0100
MIME-Version: 1.0
Content-Type: multipart/report; report-type=delivery-status; boundary="9B095B5ADSN=_01CAA07A204044A000100DECMAVA55BEX002P.co"
X-DSNContext: 7ce717b1 - 1158 - 00000002 - 00000000
Message-ID: <elEngYxrV0000c878@MAVA55BEX002P.cosmos.es.ftgroup>
Subject: Delivery Status Notification (Failure)
X-OriginalArrivalTime: 14 Feb 2010 15:28:12.0626 (UTC)
FILETIME=[51FF5320:01CAAD8A]
X-Evolution-Source: imap://abuse%40clean-mx.de@ksrv8.netpilot.net/
This is a MIME-formatted message.
Portions of this message may be unreadable without a MIME-capable mail program.
--9B095B5ADSN=_01CAA07A204044A000100DECMAVA55BEX002P.co
Content-Type: text/plain; charset=unicode-1-1-utf-7
This is an automatically generated Delivery Status Notification.
Delivery to the following recipients failed.
abuseftes.es@orange-ftgroup.com
--9B095B5ADSN=_01CAA07A204044A000100DECMAVA55BEX002P.co
Content-Type: message/delivery-status
Reporting-MTA: dns;MAVA55BEX002P.cosmos.es.ftgroup
Received-From-MTA: dns;aotcoprsmtpn002.cosmos.es.ftgroup
Arrival-Date: Sun, 14 Feb 2010 16:28:12 +0100
Final-Recipient: rfc822;abuseftes.es@orange-ftgroup.com
Action: failed
Status: 5.2.2
X-Display-Name: ES, Abuseftes
--9B095B5ADSN=_01CAA07A204044A000100DECMAVA55BEX002P.co
Content-Type: message/rfc822
Received: from aotcoprsmtpn002.cosmos.es.ftgroup ([10.132.14.225]) by
MAVA55BEX002P.cosmos.es.ftgroup with Microsoft SMTPSVC(6.0.3790.3959); Sun,
14 Feb 2010 16:28:12 +0100
Received: from ORANGE1 ([10.132.12.235]) by
aotcoprsmtpn002.cosmos.es.ftgroup with Microsoft SMTPSVC(6.0.3790.3959);
Sun, 14 Feb 2010 16:28:12 +0100
Received: from ORANGE1 (localhost.localdomain [127.0.0.1]) by
postfix.imss70 (Postfix) with ESMTP id 1E1D640DD for
<abuse@es.francetelecom.com>; Sun, 14 Feb 2010 16:28:12 +0100 (CET)
Received: from relayn.netpilot.net (relayn.netpilot.net [62.67.240.20]) by
ORANGE1 (Postfix) with ESMTP id EF6C740D9 for <abuse@es.francetelecom.com>;
Sun, 14 Feb 2010 16:28:10 +0100 (CET)
Received: from relayn.netpilot.net (localhost [127.0.0.1]) by
relayn.netpilot.net (Postfix) with ESMTP id B1FD9EAC29A for
<abuse@es.francetelecom.com>; Sun, 14 Feb 2010 16:28:09 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha1; c=simple; d=clean-mx.de; h=from:to
:subject:mime-version:message-id:date:content-type; s=sel; bh=L4
5Ix2wwd+0I/Nx6ZqvhGLQFoLk=; b=XOKBkxn2C4wxokliahh2oogV1NaobPl/lg
pnsBywM08jTIuPwwDRyzvS4hnbQIxpcZPUA32URHiTVt7iX02+SN5xBOLO1DiuRT
DQmk5ShpZz00YS2ANlbtd34VgM35QaRzD5yCn6Uunnu6T1gJvtXyP+usTCTP9RU+ BrD0nxRJE=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=clean-mx.de; h=from:to
:subject:mime-version:message-id:date:content-type; q=dns; s=sel; b=
DOpkHt1Ip7mqVrL/vkHJn91YIfqqdOL9IF1J2BX51JTiJtlYof0gkO/AN0jV/bQz
HIztvWErntqjI7bcw6VPFaqysaNmGDTu4R8o0V1l5ekAFYyD5qR3WcggBMEmxOJo
ynC7sZfdQ1CLPpi1yK347bTGrsPohhFI4FYyO5aR/UQ=
Received: from dbserv.netpilot.net (unknown [195.214.79.22]) by localhost
(Postfix) with ESMTP id 90429EAC2A9 for <abuse@es.francetelecom.com>; Sun,
14 Feb 2010 15:28:09 +0000 (UTC)
From: abuse@clean-mx.de
to: abuse@es.francetelecom.com
Subject:
[clean-mx-viruses-427123](62.37.237.16)-->(abuse@es.francetelecom.com)
viruses sites (1 so far) within your network, please close them! status:
As of 2010-02-14 16:28:04 CET
Precedence: bulk
MIME-Version: 1.0
X-Mailer: clean mx secure mailer
X-Virus-Scanned: by netpilot GmbH at clean-mx.de
Message-Id: <20100214.1266161284@dbserv.netpilot.net>
Date: Sun, 14 Feb 2010 16:28:04 +0100
content-Type: multipart/signed; boundary="----------=_1266161289-29622-1092"; micalg="pgp-sha1"; protocol="application/pgp-signature"
X-TM-AS-Product-Ver: SMEX-8.0.0.4160-6.000.1038-17192.007
X-TM-AS-Result: No--27.401800-8.000000-31
X-imss-scan-details: No--27.402-5.0-31-1
X-TM-AS-User-Approved-Sender: No
X-TM-AS-User-Blocked-Sender: No
Return-Path: abuse@clean-mx.de
X-OriginalArrivalTime: 14 Feb 2010 15:28:12.0329 (UTC)
FILETIME=[51D20190:01CAAD8A]
This is a multi-part message in MIME format.
It has been signed conforming to RFC3156.
Produced by clean-mx transparent crypt gateway.
Version: 2.01.0619 http://www.clean-mx.de
You need GPG to check the signature.
------------=_1266161289-29622-1092
Content-type: multipart/mixed; boundary="----=_NextPart"
This is a multi-part message in MIME format.
------=_NextPart
Content-Type: text/plain; charset="iso-8859-1"
Dear abuse team,
please help to close these offending viruses sites(1) so far.
status: As of 2010-02-14 16:28:04 CET
http://support.clean-mx.de/clean-mx/viruses.php?email=abuse@es.francetelecom.com&response=alive
(for full uri, please scroll to the right end ...
We detected many active cases dated back to 2007, so please look at the date column below.
You may also subscribe to our MalwareWatch list http://lists.clean-mx.com/cgi-bin/mailman/listinfo/viruswatch
This information has been generated out of our comprehensive real time database, tracking worldwide viruses URI's
most likely also affected pages for these ip may be found via passive dns
please have a look on these other domains correlated to these ip
example: see http://www.bfk.de/bfk_dnslogger.html?query=62.37.237.16
If your review this list of offending site, please do this carefully, pay attention for redirects also!
Also, please consider this particular machines may have a root kit installed !
So simply deleting some files or dirs or disabling cgi may not really solve the issue !
Advice: The appearance of a Virus Site on a server means that
someone intruded into the system. The server's owner should
disconnect and not return the system into service until an
audit is performed to ensure no data was lost, that all OS and
internet software is up to date with the latest security fixes,
and that any backdoors and other exploits left by the intruders
are closed. Logs should be preserved and analyzed and, perhaps,
the appropriate law enforcement agencies notified.
DO NOT JUST DELETE THE FILES. IF YOU DO NOT FIX THE SECURITY
PROBLEM, THEY WILL BE BACK!
You may forward my information to law enforcement, CERTs,
other responsible admins, or similar agencies.
+-----------------------------------------------------------------------------------------------
|date |id |virusname |ip |domain |Url|
+-----------------------------------------------------------------------------------------------
|2010-02-14 15:19:09 CET |427123 |TR/VB.Downloader.Gen |62.37.237.16 |gratisweb.com |http://www.gratisweb.com/cadastrowebsite/Cadastro%20de%20e-mail.ExE
+-----------------------------------------------------------------------------------------------
Your email address has been pulled out of whois concerning this offending network block(s).
If you are not concerned with anti-fraud measurements, please forward this mail to the next responsible desk available...
If you just close(d) these incident(s) please give us a feedback, our automatic walker process may not detect a closed case
explanation of virusnames:
==========================
unknown_html_RFI_php not yet detected by scanners as RFI, but pure php code for injection
unknown_html_RFI_perl not yet detected by scanners as RFI, but pure perl code for injection
unknown_html_RFI_eval not yet detected by scanners as RFI, but suspect javascript obfuscationg evals
unknown_html_RFI not yet detected by scanners as RFI, but trapped by our honeypots as remote-code-injection
unknown_html not yet detected by scanners as RFI, but suspious, may be in rare case false positive
unknown_exe not yet detected by scanners as malware, but high risk!
all other names malwarename detected by scanners
==========================
yours
Gerhard W. Recher
(Geschftsfhrer)
NETpilot GmbH
Wilhelm-Riehl-Str. 13
D-80687 Mnchen
Tel: ++49 89 547182 0
Fax: ++49 89 547182 33
GSM: ++49 171 4802507
Handelsregister Mnchen: HRB 124497
w3: http://www.clean-mx.de
e-Mail: mailto:abuse@clean-mx.de
PGP-KEY: Fingerprint: A4E317B6DC6494DCC9616366A75AB34CDD0CE552 id: 0xDD0CE552
Location: http://www.clean-mx.de/downloads/abuse-at-clean-mx.de.pub.asc
------=_NextPart--
------------=_1266161289-29622-1092
Content-Type: application/pgp-signature; name="signature.asc"
Content-Disposition: inline; filename="signature.asc"
Content-Transfer-Encoding: 7bit
Content-Description: Digital Signature
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iQEVAwUBS3gWiRTGcx9kwGtzAQJ0MQf8DYPXyqA7YWrzNCfA0yNfQCYVKNk+dAuM
2b5BvaP4kYzo1EoEBQwHQGKX4UiR1tnXyd0ni9tqOFiP9jafqTLmi1Boj3Qq13hG
YHeImoP1cWN5tUIMaHRVUO01EI6JtKx4LntbRYxIr5F/xsfpOU9KAWXSpvdlBkSM
2Zl3Lgk1X99kvFKtOtesX/SA6CFjMyStJLIpe+Ofwv+MkdynZzONxiwm+mstBnDB
n7OI2PUrr582Og+TxNHtJ4YzwzHnAAweD3W4qmulpAoqwPh9qiHrwxuNEyA5pyL8
xhbOx4UWtLiHchakCDg2GMpeOsnx3A/QgXZ9BFAr6IzmcLSDRDpChA==
=XyXc
-----END PGP SIGNATURE-----
------------=_1266161289-29622-1092--
--9B095B5ADSN=_01CAA07A204044A000100DECMAVA55BEX002P.co--