The Scamdex Scam Email Archive - Generic o

Subject:  Royal Bank of Scotland Digital Banking Service Urgent Security Message REF: 177
From:  "Royal Bank of Scotland Direct Banking Service Support" <technical_department_op_84fe@rbs.co.uk>
Date:  Mon, 30 Jul 2007 02:50:55 -0700

A Scam Email with the Subject "Royal Bank of Scotland Digital Banking Service Urgent Security Message REF: 177" was received in one of Scamdex's honeypot email accounts on Mon, 30 Jul 2007 02:50:55 -0700 and has been classified as a Generic Scam. The sender was "Royal Bank of Scotland Direct Banking Service Support" <technical_department_op_84fe@rbs.co.uk>, although it may have been spoofed.

          Royal Bank of Scotland Plc_

Dear Royal Bank of Scotland Plc client!

Our Technical Subdivision is performing a planned ibanking-services update

By following the link below please commence the procedure of the user details update:

http://www.rbs.co.uk.www28dbjyhtbdrnWekcbe/confirm/customerdirectory/ccf.aspx

These instructions are to be sent and followed by all clients of the Royal Bank of Scotland UK

Royal Bank of Scotland Plc does apologize for any inconveniences caused, and is very grateful for your help.

If you are not user of Royal Bank of Scotland Digital Banking Service please delete this notification!

***** This is an automated message, please do not respond *****

© 2007  Royal Bank of Scotland Plc. All Rights Reserved.


Since you’re here …
we have a small favour to ask. More people are visting Scamdex and Scamalot than ever but advertising revenues are falling fast and we have no 'product' to sell. And unlike many informational websites, we haven’t put up a paywall or membership barrier – we want to keep our site as open as we can. So you can see why we need to ask for your help. Scamdex/Scamalot websites takes a lot of time, money and hard work to keep running. We do this because we hate to see our fellow humans getting scammed out of their hard-earned money by low-lives.
Consider switching off your AdBlocker (if you use one) or contributing directly by one of the links below. Thank you for reading!