[OpenWrt-Devel] QUALCOMM spoof attempt detected: [PATCH 1/4] ar71xx: uci-defaults: fix ap143 to appropriate group
McClintock, Matthew
mmcclint at qca.qualcomm.com
Tue Sep 1 00:22:53 EDT 2015
This mailing list should already be whitelist’ed - what’s going on?
-M
On 8/31/15, 11:22 PM, "request.allow.spoof at qualcomm.com on behalf of request.allow.spoof" <request.allow.spoof at qualcomm.com> wrote:
>PLEASE RESEND THE INFORMATION USING A PERSONAL EMAIL ADDRESS.
>--------------------------------------------------------------------------------------
>
>An email has been sent to you from outside of Qualcomm, but the “From” address has been changed (i.e., spoofed) to make it look like it originated from inside Qualcomm. Since this can indicate a phishing attack the email has been quarantined to protect you.
>
>“Spoofing” can also occur when you use your Qualcomm email address on external websites to send yourself, friends, and colleagues articles, directions, reservations, etc.
>
>If you do not recognize the email or the email sender, there is no action required by you. The quarantined email will be deleted.
>
>If the quarantined email is business related, simply reply to this email with a justification for its release.
>
>To learn more about spoofing and why this email may have been labeled a spoofed email, please visit http://qwiki.qualcomm.com/it/QCSpoof.
>
>
>Quarantine: https://quarantine.qualcomm.com
>Remote Host: arrakis.dune.hu
>Server IP: 78.24.191.176
>Envelope Sender: openwrt-devel-bounces at lists.openwrt.org
>From: <miaoqing at qti.qualcomm.com>
>To: <openwrt-devel at lists.openwrt.org>
>Subject: [OpenWrt-Devel] [PATCH 1/4] ar71xx: uci-defaults: fix ap143 to appropriate group
>
>
_______________________________________________
openwrt-devel mailing list
openwrt-devel at lists.openwrt.org
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel
More information about the openwrt-devel
mailing list