Hier mal wieder ein HYIP Spam, der voll nach Joe Job aussieht:

01: Return-Path: <support [at] hyipsensor.net>
02: X-Flags: 1001
03: Delivered-To: GMX delivery to ... [at] gmx.de
04: Received: (qmail invoked by alias); 30 Jan 2007 xx:xx:xx -0000
05: Received: from dsl.static8599104119.ttnet.net.tr (HELO mazlum)
06: []
07: by mx0.gmx.net (mx002) with SMTP; 30 Jan 2007 xx:xx:xx +0100
08: Message-ID: [ID filtered]
09: From: support [at] hyipsensor.net
10: To: <... [at] gmx.de>
11: Subject: RE [5]: order details
12: Reply-To: <support [at] hyipsensor.net
13: Date: Tue, 30 Jan 2007 xx:xx:xx +0300
14: MIME-Version: 1.0
15: Content-Type: multipart/alternative;
16: boundary="----=_NextPart_000_0015_01C744B6.5F7DB900"
17: X-Priority: 3
18: X-MSMail-Priority: Normal
19: X-Mailer: Microsoft Outlook Express 6.00.2900.2180
20: X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180
21: X-GMX-Antivirus: -1 (not scanned, may not use virus scanner)
22: X-GMX-Antispam: 5 (SURBL Hit for: hyipsensor.net)
23: X-GMX-UID: [UID filtered]


We are glad to introduce you new project whois:http://hyipsensor.net
Look our board whois:http://hyipsensor.net/board/ Here you can find any info
regarding credit cards , exploits , trojans , viruses , hacked
botnets, hacked hostings.
Also you will be able to buy any "closed for public" info like email
bases, cc bases etc. And our daughter project whois:http://f1-finance.com
will help you to launder any amount of E-gold currency.
We are glad to accept any innovations in our theme just email at
admin @ f1-finance.com

Thank you and welcome to background world of whois:http://hyipsensor.net
Vor einigen Monaten bekam ich schon einmal massenweise solche HYIP Joe Jobs. Und die gingen anscheinend auch mehr oder minder gezielt an als Anti-Spammer bekannte Adressen. Hat da jemand die RSG betrogen, ist das eine 'Auftragsarbeit' oder schlicht Schutzgelderpressung?

- kjz