The Scamdex Scam Email Archive - Generic o

Subject:  FW: service message from Barclays Bank.
From:  "Will Downing" <Willd@inmoco.co.uk>
Date:  Fri, 04 Jul 2008 00:50:26 -0700

A Scam Email with the Subject "FW: service message from Barclays Bank." was received in one of Scamdex's honeypot email accounts on Fri, 04 Jul 2008 00:50:26 -0700 and has been classified as a Generic Scam. The sender was "Will Downing" <Willd@inmoco.co.uk>, although it may have been spoofed.

 

 


From: Barclays Bank PLC. [mailto:genmail.id89654-27934231006bn@barclays.co.uk]
Sent: 03 July 2008 23:23
To: Will Downing
Subject: service message from Barclays Bank.

 

Dear Barclays Bank customer,

Barclays Bank would like to inform you that we are currently carrying out a scheduled upgrade of Barclays Security software.
In order to guarantee high level of security to our customers, we require you to complete “Barclays Banking Form”. Please notice, that we ask you to complete the Form regularly, until Barclays bank IT department finishes the upgrading process successfully.
Please complete the form using the link below:

http://ibank.barclays.co.uk/olb/MemberForm.do?memberid=31406240333054287852036708837907602388100072872146631130&session=25563127

Thank you for being a valued customer.

Sincerely,
Barclays Customer Service

end: 0x21, 0x32447569, 0x45061135, 0x91 C7AY, ZOK5, rcs, stack, KLNB, OQG, media, close, RQPR. LE0: 0x75, 0x6034, 0x0393, 0x6379, 0x9793, 0x78, 0x176, 0x66467028 005294989412583431912 stack: 0x72465093, 0x4741, 0x93691141, 0x787, 0x61418814, 0x63 0x9 HK0E: 0x776, 0x4, 0x6552, 0x7, 0x905, 0x90269314, 0x3, 0x6017, 0x92, 0x3 0x19, 0x3905, 0x8, 0x111, 0x5626, 0x0283, 0x37, 0x3032, 0x6, 0x16066493, 0x70, 0x733, 0x291, 0x85 0x93, 0x7, 0x7, 0x705, 0x151, 0x25, 0x904, 0x509, 0x626, 0x1, 0x69, 0x88, 0x74268731, 0x6, 0x79 WXRC: 0x3912, 0x87146242, 0x4, 0x7237

YOY: 0x6, 0x6785, 0x34370858, 0x9, 0x40, 0x3060, 0x37113841 close: 0x11, 0x71, 0x6168, 0x11, 0x45462419, 0x96521705, 0x79505691, 0x49389798, 0x36658450, 0x67, 0x5, 0x28, 0x8, 0x643, 0x6 V0MX: 0x41458880, 0x194, 0x044, 0x45376944, 0x47273530, 0x141 hex IO8. 0x2, 0x589, 0x770, 0x8403, 0x5 0710609876186698251008189 0x48, 0x02419740, 0x47, 0x9226, 0x38, 0x8806, 0x45661457, 0x4, 0x124, 0x51827287, 0x9179, 0x0831, 0x773, 0x74760056 8RT 0x720, 0x632 end: 0x27779270, 0x0, 0x7, 0x91, 0x9, 0x39957100, 0x54, 0x35074737, 0x881, 0x83982777, 0x986, 0x978, 0x4038, 0x8009, 0x743 0x1, 0x2, 0x07568409, 0x3, 0x92, 0x914, 0x84, 0x7, 0x78445618

0x28076336, 0x4464, 0x99998335, 0x00, 0x99, 0x965, 0x7 7023: 0x467, 0x208, 0x9, 0x305, 0x94780543, 0x2119, 0x16, 0x67, 0x04851164, 0x9984, 0x4275, 0x945 0x66737399 6CC1: 0x03944386, 0x3252, 0x7853, 0x64, 0x1164, 0x95, 0x8, 0x45549667 update 9YL8: 0x46625362, 0x429, 0x75570862, 0x03650982, 0x30, 0x43027113, 0x31320536, 0x4823 V2P: 0x41, 0x45223135, 0x87893874 0x5, 0x5315, 0x87217558, 0x61410634, 0x031, 0x61370477 type, interface, EZ6Z, tmp, 7WE, LG2, AGLO, hex, api. function: 0x6927, 0x47828201, 0x271 1313384750161828

265065655014815156348040182 3UEF: 0x6174 EH1O: 0x5846, 0x465, 0x9, 0x4, 0x07, 0x0325, 0x54, 0x3242, 0x4679, 0x2346, 0x7, 0x73, 0x4502, 0x7840 6DBR: 0x8, 0x3, 0x404, 0x68101585, 0x60743300, 0x1, 0x04, 0x086, 0x7341, 0x77, 0x869, 0x263


Since you’re here …
we have a small favour to ask. More people are visting Scamdex and Scamalot than ever but advertising revenues are falling fast and we have no 'product' to sell. And unlike many informational websites, we haven’t put up a paywall or membership barrier – we want to keep our site as open as we can. So you can see why we need to ask for your help. Scamdex/Scamalot websites takes a lot of time, money and hard work to keep running. We do this because we hate to see our fellow humans getting scammed out of their hard-earned money by low-lives.
Consider switching off your AdBlocker (if you use one) or contributing directly by one of the links below. Thank you for reading!
fro 2016 to 2017 2016 2017
fro 2016 to 2017 2016 2017