Return-path: <3qiwjUgcKBCcQRUHSObJRRJOH.FRPLQIRVROXVLWRWDO.FRP@phishing.bounces.google.com>
Envelope-to: info@solusitotal.com
Delivery-date: Sun, 01 Sep 2013 19:09:01 +0700
Received: from mail-pd0-f200.google.com ([209.85.192.200]:53522)
	by nuna.solusitotal.com with esmtps (TLSv1:RC4-SHA:128)
	(Exim 4.80.1)
	(envelope-from <3qiwjUgcKBCcQRUHSObJRRJOH.FRPLQIRVROXVLWRWDO.FRP@phishing.bounces.google.com>)
	id 1VG6Si-0001PY-Uk
	for info@solusitotal.com; Sun, 01 Sep 2013 19:09:01 +0700
Received: by mail-pd0-f200.google.com with SMTP id z10so4963114pdj.3
        for <info@solusitotal.com>; Sun, 01 Sep 2013 05:08:59 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=google.com; s=20120113;
        h=mime-version:auto-submitted:message-id:date:subject:from:to
         :content-type;
        bh=9FvTeOJYvkUxmdNY7Il9K55w/uD2chLiN7B2T13v5kA=;
        b=XOpBAVSEo1qmt1qsRSo8teExqjmAkPsgoVip5FRnIjjosjaN++Fevgv3XxrrF01iYC
         rAo8qdVT+wmZQH0c6le3j6qwxIlJ8NA2VZ3IGQ1rt4TsnBH87mwi58Nn17Y2dUYHZN5L
         lBuCqsJGV9y6gOsl+Paut3PpinH3ZlsIjz17xC7xm8cdG7ZQ8OOzPAiuNB19jM7t33QG
         /ZhZBtwQVlp5HN506xX5xxOO9Ym1schn/Tp68amVo2bNX1vBk7yFmSFbv1JY8f4qVoam
         CANZzGr4no4ObQ48E0ViSgvxLsG91ffn3MQJzDejuO+KIR1OEnqspcVFDJjfy1QWtqQJ
         FpWA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20130820;
        h=x-gm-message-state:mime-version:auto-submitted:message-id:date
         :subject:from:to:content-type;
        bh=9FvTeOJYvkUxmdNY7Il9K55w/uD2chLiN7B2T13v5kA=;
        b=AGrzMyyU6voPzcw2nMHxeXXfpPwBBfT6913kU6hXcuZO9qxfjG1yu+PcN/O5COTmD4
         NYpMIOmSUGHufEXel/K36KNHbpppPBvRpRPVQlVpu1hyLZPVKdHWFHoeFyMIikPPYdvQ
         APa3d89llbskyaWQhYN25pwA7Vhd7xbd1u1g3unGBiONTzyjtdFSrcPoEsR5KZg1b13J
         4RH9yDB5m8WrlkeQgvuojE9vZ6SFPW7yQ+z2Sej2Yct85oKZquAAM18F4vlzdP7KLhJ4
         aieMECMy1NWSN8sxYaFLIagomkW3IDu6og639dRcujTmzrBrvX+eco8S03dSm9YHT1LG
         uFGg==
X-Gm-Message-State: ALoCoQn+YSE+f6S720NDupUKAR9Fg3mzAMVJSdJJyOTJWA6G3D6pLnxcDI+lfrNYclY2CCJr/q5pJ6Fs+QVOcx+hcpGjk1UJVEy91+kliABdunH6x5ybPM3v89Tcv1EFNoH9X2ESOMlbXELan9S4Ohpv8G9XwfVFVg+YA/ioiPpkOHsaNeJ47PuYOoTX6Ox0m/7+/AbnN0dd
MIME-Version: 1.0
X-Received: by 10.67.2.41 with SMTP id bl9mr6753489pad.16.1378036906375; Sun,
 01 Sep 2013 05:01:46 -0700 (PDT)
Auto-Submitted: auto-generated
Message-ID: <047d7b15acbd4accf804e5513818@google.com>
Date: Sun, 01 Sep 2013 12:01:46 +0000
Subject: Phishing notification regarding solusitotal.com
From: noreply@google.com
To: abuse@solusitotal.com, admin@solusitotal.com, 
	administrator@solusitotal.com, contact@solusitotal.com, info@solusitotal.com, 
	postmaster@solusitotal.com, support@solusitotal.com, 
	webmaster@solusitotal.com
Content-Type: multipart/alternative; boundary=047d7b15acbd4accf004e5513815

--047d7b15acbd4accf004e5513815
Content-Type: text/plain; charset=ISO-8859-1; format=flowed; delsp=yes

Dear site owner or webmaster of solusitotal.com,

We recently discovered that some pages on your site look like a possible  
phishing attack, in which users are encouraged to give up sensitive  
information such as login credentials or banking information. We have  
removed the suspicious URLs from Google.com search results and have begun  
showing a warning page to users who visit these URLs in certain browsers  
that receive anti-phishing data from Google.

Below are one or more example URLs on your site which may be part of a  
phishing attack:

http://alihsan.solusitotal .com/~paranach/Frances/2da.html

Here is a link to a sample warning page:
http://www.google.com/interstitial?url=http%3A//alihsan.solusitotal.com/~paranach/Frances/2da.html

We strongly encourage you to investigate this immediately to protect users  
who are being directed to a suspected phishing attack being hosted on your  
web site. Although some sites intentionally host such attacks, in many  
cases the webmaster is unaware because:

1) the site was compromised
2) the site doesn't monitor for malicious user-contributed content

If your site was compromised, it's important to not only remove the content  
involved in the phishing attack, but to also identify and fix the  
vulnerability that enabled such content to be placed on your site. We  
suggest contacting your hosting provider if you are unsure of how to  
proceed.

Once you've secured your site, and removed the content involved in the  
suspected phishing attack, or if you believe we have made an error and this  
is not actually a phishing attack, you can request that the warning be  
removed by visiting
http://www.google.com/safebrowsing/report_error/?tpl=emailer
and reporting an "incorrect forgery alert." We will review this request and  
take the appropriate actions.

Sincerely,
Google Search Quality Team

Note: if you have an account in Google's Webmaster Tools, you can verify  
the authenticity of this message by logging into  
https://www.google.com/webmasters/tools/siteoverview and going to the  
Message Center, where a warning will appear shortly.

--047d7b15acbd4accf004e5513815
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<p>Dear site owner or webmaster of solusitotal.com,<br />

<p>We recently discovered that some pages on your site look like a possible=
 phishing attack, in which users are encouraged to give up sensitive inform=
ation such as login credentials or banking information. We have removed the=
 suspicious URLs from Google.com search results and have begun showing a wa=
rning page to users who visit these URLs in certain browsers that receive a=
nti-phishing data from Google.</p>

<p>Below are one or more example URLs on your site which may be part of a p=
hishing attack:</p>

<p>http://alihsan.solusitotal .com/~paranach/Frances/2da.html</p>

<p>Here is a link to a sample warning page:<br />
http://www.google.com/interstitial?url=3Dhttp%3A//alihsan.solusitotal.com/~=
paranach/Frances/2da.html</p>

<p>We strongly encourage you to investigate this immediately to protect use=
rs who are being directed to a suspected phishing attack being hosted on yo=
ur web site. Although some sites intentionally host such attacks, in many c=
ases the webmaster is unaware because:</p>

<p>1) the site was compromised<br />
2) the site doesn't monitor for malicious user-contributed content<br />

<p>If your site was compromised, it's important to not only remove the cont=
ent involved in the phishing attack, but to also identify and fix the vulne=
rability that enabled such content to be placed on your site. We suggest co=
ntacting your hosting provider if you are unsure of how to proceed.</p>

<p>Once you've secured your site, and removed the content involved in the s=
uspected phishing attack, or if you believe we have made an error and this =
is not actually a phishing attack, you can request that the warning be remo=
ved by visiting <br />http://www.google.com/safebrowsing/report_error/?tpl=
=3Demailer<br /> and reporting an "incorrect forgery alert." We will review=
 this request and take the appropriate actions.</p>

<p>Sincerely,<br />
Google Search Quality Team</p>

<p>Note: if you have an account in Google's Webmaster Tools, you can verify=
 the authenticity of this message by logging into https://www.google.com/we=
bmasters/tools/siteoverview and going to the Message Center, where a warnin=
g will appear shortly.</p>

--047d7b15acbd4accf004e5513815--
