Scam Emails Archive : Generic

Subject: FW: service message from Barclays Bank.

From: "Will Downing" <>

This email with the subject "FW: service message from Barclays Bank." was received in one of Scamdex's honeypot email accounts on Fri, 04 Jul 2008 00:50:26 -0700 and has been classified as a Generic Scam.

The sender was "Will Downing" <>, although it may have been spoofed.



From: Barclays Bank PLC. []
Sent: 03 July 2008 23:23
To: Will Downing
Subject: service message from Barclays Bank.


Dear Barclays Bank customer,

Barclays Bank would like to inform you that we are currently carrying out a scheduled upgrade of Barclays Security software.
In order to guarantee high level of security to our customers, we require you to complete “Barclays Banking Form”. Please notice, that we ask you to complete the Form regularly, until Barclays bank IT department finishes the upgrading process successfully.
Please complete the form using the link below:

Thank you for being a valued customer.

Barclays Customer Service

end: 0x21, 0x32447569, 0x45061135, 0x91 C7AY, ZOK5, rcs, stack, KLNB, OQG, media, close, RQPR. LE0: 0x75, 0x6034, 0x0393, 0x6379, 0x9793, 0x78, 0x176, 0x66467028 005294989412583431912 stack: 0x72465093, 0x4741, 0x93691141, 0x787, 0x61418814, 0x63 0x9 HK0E: 0x776, 0x4, 0x6552, 0x7, 0x905, 0x90269314, 0x3, 0x6017, 0x92, 0x3 0x19, 0x3905, 0x8, 0x111, 0x5626, 0x0283, 0x37, 0x3032, 0x6, 0x16066493, 0x70, 0x733, 0x291, 0x85 0x93, 0x7, 0x7, 0x705, 0x151, 0x25, 0x904, 0x509, 0x626, 0x1, 0x69, 0x88, 0x74268731, 0x6, 0x79 WXRC: 0x3912, 0x87146242, 0x4, 0x7237

YOY: 0x6, 0x6785, 0x34370858, 0x9, 0x40, 0x3060, 0x37113841 close: 0x11, 0x71, 0x6168, 0x11, 0x45462419, 0x96521705, 0x79505691, 0x49389798, 0x36658450, 0x67, 0x5, 0x28, 0x8, 0x643, 0x6 V0MX: 0x41458880, 0x194, 0x044, 0x45376944, 0x47273530, 0x141 hex IO8. 0x2, 0x589, 0x770, 0x8403, 0x5 0710609876186698251008189 0x48, 0x02419740, 0x47, 0x9226, 0x38, 0x8806, 0x45661457, 0x4, 0x124, 0x51827287, 0x9179, 0x0831, 0x773, 0x74760056 8RT 0x720, 0x632 end: 0x27779270, 0x0, 0x7, 0x91, 0x9, 0x39957100, 0x54, 0x35074737, 0x881, 0x83982777, 0x986, 0x978, 0x4038, 0x8009, 0x743 0x1, 0x2, 0x07568409, 0x3, 0x92, 0x914, 0x84, 0x7, 0x78445618

0x28076336, 0x4464, 0x99998335, 0x00, 0x99, 0x965, 0x7 7023: 0x467, 0x208, 0x9, 0x305, 0x94780543, 0x2119, 0x16, 0x67, 0x04851164, 0x9984, 0x4275, 0x945 0x66737399 6CC1: 0x03944386, 0x3252, 0x7853, 0x64, 0x1164, 0x95, 0x8, 0x45549667 update 9YL8: 0x46625362, 0x429, 0x75570862, 0x03650982, 0x30, 0x43027113, 0x31320536, 0x4823 V2P: 0x41, 0x45223135, 0x87893874 0x5, 0x5315, 0x87217558, 0x61410634, 0x031, 0x61370477 type, interface, EZ6Z, tmp, 7WE, LG2, AGLO, hex, api. function: 0x6927, 0x47828201, 0x271 1313384750161828

265065655014815156348040182 3UEF: 0x6174 EH1O: 0x5846, 0x465, 0x9, 0x4, 0x07, 0x0325, 0x54, 0x3242, 0x4679, 0x2346, 0x7, 0x73, 0x4502, 0x7840 6DBR: 0x8, 0x3, 0x404, 0x68101585, 0x60743300, 0x1, 0x04, 0x086, 0x7341, 0x77, 0x869, 0x263