Current File : /home/aventura/mail/new/1711087481.M102753P8365.vps-1692706-x.dattaweb.com,S=5750,W=5866
Return-Path: <>
Delivered-To: aventura@vps-1692706-x.dattaweb.com
Received: from vps-1692706-x.dattaweb.com
	by vps-1692706-x.dattaweb.com with LMTP
	id mBBmBXkf/WWtIAAA1+GVDg
	(envelope-from <>)
	for <aventura@vps-1692706-x.dattaweb.com>; Fri, 22 Mar 2024 03:04:41 -0300
Return-path: <>
Envelope-to: aventura@vps-1692706-x.dattaweb.com
Delivery-date: Fri, 22 Mar 2024 03:04:41 -0300
Received: from mailnull by vps-1692706-x.dattaweb.com with local (Exim 4.96.2)
	id 1rnY1A-0002Bs-3B
	for aventura@vps-1692706-x.dattaweb.com;
	Fri, 22 Mar 2024 03:04:41 -0300
X-Failed-Recipients: yasmine@turismodecastro.tur.ar
Auto-Submitted: auto-replied
From: Mail Delivery System <Mailer-Daemon@vps-1692706-x.dattaweb.com>
To: aventura@vps-1692706-x.dattaweb.com
References: <3ade50fbcd99caafb170331f83bb35a6@www.aventuramagica.com.ar>
Content-Type: multipart/report; report-type=delivery-status; boundary=1711087480-eximdsn-927814893
MIME-Version: 1.0
Subject: Mail delivery failed: returning message to sender
Message-Id: <E1rnY1A-0002Bs-3B@vps-1692706-x.dattaweb.com>
Date: Fri, 22 Mar 2024 03:04:40 -0300

--1711087480-eximdsn-927814893
Content-type: text/plain; charset=us-ascii

This message was created automatically by mail delivery software.

A message that you sent could not be delivered to one or more of its
recipients. This is a permanent error. The following address(es) failed:

  yasmine@turismodecastro.tur.ar
    host aspmx.l.google.com [142.250.0.26]
    SMTP error from remote mail server after RCPT TO:<yasmine@turismodecastro.tur.ar>:
    550-5.1.1 The email account that you tried to reach does not exist. Please try
    550-5.1.1 double-checking the recipient's email address for typos or
    550-5.1.1 unnecessary spaces. For more information, go to
    550 5.1.1  https://support.google.com/mail/?p=NoSuchUser g15-20020aa7818f000000b006e724b23a4asi1218840pfi.369 - gsmtp

--1711087480-eximdsn-927814893
Content-type: message/delivery-status

Reporting-MTA: dns; vps-1692706-x.dattaweb.com

Action: failed
Final-Recipient: rfc822;yasmine@turismodecastro.tur.ar
Status: 5.0.0
Remote-MTA: dns; aspmx.l.google.com
Diagnostic-Code: smtp; 550-5.1.1 The email account that you tried to reach does not exist. Please try
 550-5.1.1 double-checking the recipient's email address for typos or
 550-5.1.1 unnecessary spaces. For more information, go to
 550 5.1.1  https://support.google.com/mail/?p=NoSuchUser g15-20020aa7818f000000b006e724b23a4asi1218840pfi.369 - gsmtp

--1711087480-eximdsn-927814893
Content-type: message/rfc822

Return-path: <aventura@vps-1692706-x.dattaweb.com>
Received: from aventura by vps-1692706-x.dattaweb.com with local (Exim 4.96.2)
	(envelope-from <aventura@vps-1692706-x.dattaweb.com>)
	id 1rnY19-0002A8-2H
	for yasmine@turismodecastro.tur.ar;
	Fri, 22 Mar 2024 03:04:39 -0300
To: yasmine@turismodecastro.tur.ar
Subject: AVM :: "Bowden - "
X-PHP-Script: www.aventuramagica.com.ar/site/index.php for 172.83.47.137
X-PHP-Originating-Script: 1005:class-phpmailer.php
Date: Fri, 22 Mar 2024 06:04:39 +0000
From: Bowden <wordpress@aventuramagica.com.ar>
Reply-To: hacked@aventuramagica.com.ar
Message-ID: <3ade50fbcd99caafb170331f83bb35a6@www.aventuramagica.com.ar>
X-Mailer: PHPMailer 5.2.22 (https://github.com/PHPMailer/PHPMailer)
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8

De: Bowden <hacked@aventuramagica.com.ar>

Cuerpo del mensaje:
We have hacked your website https://aventuramagica.com.ar and extracted your databases.

How did this happen?

Our team has found a vulnerability within your site that we were able to exploit. After finding the vulnerability we were able to get your database credentials and extract your entire database and move the information to an offshore server.

What does this mean?

We will systematically go through a series of steps of totally damaging your reputation. First your database will be leaked or sold to the highest bidder which they will use with whatever their intentions are. Next if there are e-mails found they will be e-mailed that their information has been sold or leaked and your site https://aventuramagica.com.ar was at fault thusly damaging your reputation and having angry customers/associates with whatever angry customers/associates do. Lastly any links that you have indexed in the search engines will be de-indexed based off of blackhat techniques that we used in the past to de-index Our targets.

How do i stop this?

We are willing to refrain from destroying your site's reputation for a small fee. The current fee is $3000 in bitcoins (0.044 BTC).

Send the bitcoin to the following Bitcoin address (Make sure to copy and paste):

3GNLedSoZxz2JLXnzrbiZPzEnXDLY1TncL 

Once you have paid we will automatically get informed that it was your payment. Please note that you have to make payment within 5 days after receiving this e-mail or the database leak, e-mails dispatched, and de-index of your site WiLL start!

How do i get Bitcoins?

You can easily buy bitcoins via several websites or even offline from a Bitcoin-ATM.

What if i don't pay?

We will start the attack at the indicated date and uphold it until you do, there's no counter measure to this, you will Only end up wasting more money trying to find a solution. We will completely destroy your reputation amongst google and your customers.

This is not a hoax, do not reply to this email, don't try to reason or negotiate, we will not read any replies. Once you have paid we will stop what we were doing and you will never hear from us again!

Please note that Bitcoin is anonymous and no one will find out that you have complied.

-- 
Este mensaje se ha enviado desde un formulario de contacto en AVM :: (http://aventuramagica.com.ar/site)


--1711087480-eximdsn-927814893--