[OpenWrt-Devel] QUALCOMM spoof attempt detected: [PATCH 1/4] ar71xx: uci-defaults: fix ap143 to appropriate group

McClintock, Matthew mmcclint at qca.qualcomm.com
Tue Sep 1 00:22:53 EDT 2015

This mailing list should already be whitelist’ed - what’s going on?


On 8/31/15, 11:22 PM, "request.allow.spoof at qualcomm.com on behalf of request.allow.spoof" <request.allow.spoof at qualcomm.com> wrote:

>An email has been sent to you from outside of Qualcomm, but the “From” address has been changed (i.e., spoofed) to make it look like it originated from inside Qualcomm. Since this can indicate a phishing attack the email has been quarantined to protect you.
>“Spoofing” can also occur when you use your Qualcomm email address on external websites to send yourself, friends, and colleagues articles, directions, reservations, etc. 
>If you do not recognize the email or the email sender, there is no action required by you. The quarantined email will be deleted.
>If the quarantined email is business related, simply reply to this email with a justification for its release.
>To learn more about spoofing and why this email may have been labeled a spoofed email, please visit http://qwiki.qualcomm.com/it/QCSpoof.
>Quarantine: https://quarantine.qualcomm.com
>Remote Host: arrakis.dune.hu
>Server IP:
>Envelope Sender: openwrt-devel-bounces at lists.openwrt.org
>From: <miaoqing at qti.qualcomm.com>
>To: <openwrt-devel at lists.openwrt.org>
>Subject: [OpenWrt-Devel] [PATCH 1/4] ar71xx: uci-defaults: fix ap143 to	appropriate group
openwrt-devel mailing list
openwrt-devel at lists.openwrt.org

More information about the openwrt-devel mailing list