Email Detail
Show an email
GET /hyperkitty/api/list/[email protected]/email/TJD3K33Y4AA2BFR4Z4QJBFY56CQMBLJ2/?format=api
{ "url": "https://mailman.amsat.org/hyperkitty/api/list/[email protected]/email/TJD3K33Y4AA2BFR4Z4QJBFY56CQMBLJ2/?format=api", "mailinglist": "https://mailman.amsat.org/hyperkitty/api/list/[email protected]/?format=api", "message_id": "[email protected]", "message_id_hash": "TJD3K33Y4AA2BFR4Z4QJBFY56CQMBLJ2", "thread": "https://mailman.amsat.org/hyperkitty/api/list/[email protected]/thread/TJD3K33Y4AA2BFR4Z4QJBFY56CQMBLJ2/?format=api", "sender": { "address": "vk3jed (a) gmail.com", "mailman_id": "e049fcabdd4648088cd7ce227ab7c655", "emails": "https://mailman.amsat.org/hyperkitty/api/sender/e049fcabdd4648088cd7ce227ab7c655/emails/?format=api" }, "sender_name": "Tony Langdon", "subject": "[amsat-bb] Re: (no subject)", "date": "2010-06-08T00:31:23Z", "parent": null, "children": [], "votes": { "likes": 0, "dislikes": 0, "status": "neutral" }, "content": "At 09:08 AM 6/8/2010, Larry Teran wrote:\n>SPAM get out\n>\n>On Mon, Jun 7, 2010 at 1:42 PM, Simone T <[email protected]> wrote:\n\n<snip to avoid propagating spam URL further>\n\nThese ones are the result of the account's owner getting infected \nwith something, and a spam bot hijacking their account. Complaining \nabout the spam does nothing (never does). The most successful \napproach has been to inform the affected person of the problem, and \nget them to scan their PC with something like the free scanner from \nwww.malwarebytes.org , or another good malware scanner, then change \ntheir webmail password.\n\nThere is a pattern to this sort of spam/infection:\n\n1. It ALWAYS comes from a webmail capable address (I have seen \nYahoo, Gmail and Hotmail accounts infected).\n\n2. It always features a single line with a URL, maybe with one line \nof generic text \"Hey, look at this\" or similar.\n\nHow I discovered it was the account owner's PC being infected was \nthat I posted an advisory message in the group that was getting spam, \nand suggesting everyone check their PC for malware. The account \nowner (that the spam claimed to come from) came forward and described \nwhat happened, and that they had fixed their system, once made aware \nof the problem. Subsequent instances of this type of spam have \nrevealed a similar pattern. This was first sighted a few months ago.\n\nAnyway, hope this helps people affected by this sort of problem to \nfind and remove the offending malware.\n\n73 de VK3JED / VK3IRL\nhttp://vkradio.com\n\n", "attachments": [] }