[OpenWrt-Devel] QUALCOMM spoof attempt detected: [PATCH] build: don't call prereq for any package/symlinks rules

McClintock, Matthew mmcclint at qca.qualcomm.com
Mon Apr 27 19:51:21 EDT 2015

Please allow this mailing list, this is related to a Open Source project I work on.


> On Apr 27, 2015, at 6:47 PM, request.allow.spoof at qualcomm.com wrote:
> --------------------------------------------------------------------------------------
> An email has been sent to you from outside of Qualcomm, but the “From” address has been changed (i.e., spoofed) to make it look like it originated from inside Qualcomm. Since this can indicate a phishing attack the email has been quarantined to protect you.
> “Spoofing” can also occur when you use your Qualcomm email address on external websites to send yourself, friends, and colleagues articles, directions, reservations, etc. 
> If you do not recognize the email or the email sender, there is no action required by you. The quarantined email will be deleted.
> If the quarantined email is business related, simply reply to this email with a justification for its release.
> To learn more about spoofing and why this email may have been labeled a spoofed email, please visit http://qwiki.qualcomm.com/it/QCSpoof.
> Quarantine: https://quarantine.qualcomm.com
> Remote Host: arrakis.dune.hu
> Server IP:
> Envelope Sender: openwrt-devel-bounces at lists.openwrt.org
> From: Mathieu Olivari <mathieu at qca.qualcomm.com>
> To: <openwrt-devel at lists.openwrt.org>
> Subject: [OpenWrt-Devel] [PATCH] build: don't call prereq for any	package/symlinks rules

openwrt-devel mailing list
openwrt-devel at lists.openwrt.org

More information about the openwrt-devel mailing list