An Email with the Subject "new security notification. [message id: GD9001844]" was received in one of Scamdex's honeypot email accounts on Sat, 12 Apr 2008 13:03:56 -0700 and has been classified as a Generic Scam Email. The sender shows as "Manufacturers and Traders Bank" <auto_notify.id8873030409118mt@mandtbank.com>.
The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be added to their email address lists for spam purposes.
Dear M&T Bank customer,
Manufacturers and Traders Bank new Scheduled Maintenance Program protects your data from unauthorized access. WebINFOCU$ Form is important addition to our scheduled maintenance program.
Please use the link below to access WebINFOCU$ Form:
Please do not reply to this auto-generated email. Follow instructions above.
tmp: 0x29217813, 0x6 4BG, BHN, stack, CTD6, 93Q, root, FXCU, SYI, engine. 0x3861, 0x6, 0x3089, 0x5277, 0x886, 0x81, 0x6427, 0x297, 0x00129825 6492214756240 0x5290, 0x2257, 0x0201, 0x3249 OYU: 0x3, 0x747 serv: 0x8, 0x617, 0x8971, 0x0023, 0x56862462, 0x7465, 0x978, 0x179, 0x455, 0x55468439, 0x54822242, 0x10 DRPF: 0x0, 0x8518, 0x64, 0x64369457, 0x1, 0x96470006, 0x8, 0x11963641, 0x6394, 0x8573, 0x8, 0x18488789 0x374, 0x4, 0x51, 0x6, 0x90, 0x02, 0x004, 0x35312871, 0x375, 0x021, 0x1 0x745, 0x9119, 0x0, 0x83071098, 0x9, 0x1069, 0x8695, 0x4770, 0x85, 0x83, 0x6928, 0x936, 0x36250399, 0x25784356, 0x27
ARQ: 0x0592, 0x53377453, 0x5, 0x4, 0x2199, 0x57854725, 0x1236, 0x213, 0x80498163, 0x45, 0x15475963 define: 0x82, 0x36, 0x5, 0x0, 0x5, 0x717, 0x9179, 0x079, 0x9 0x65355641, 0x94918543, 0x447, 0x99094565, 0x20258796, 0x6674, 0x83, 0x3868 GS4J, XUY, U698, LAHX, engine. Q2D: 0x59666780, 0x4520, 0x90, 0x787, 0x81, 0x2059, 0x23587793, 0x98, 0x76 88632605590039066091 5ZPU: 0x48, 0x6498, 0x59143631, 0x7, 0x59 common revision create FBYJ root function close media 2PZI. GN4: 0x5502, 0x4, 0x2, 0x0364, 0x99, 0x7407, 0x9, 0x69618480 include: 0x1714, 0x738, 0x6, 0x101, 0x2, 0x6368 0x4236, 0x43240914, 0x79251781, 0x59, 0x84421591, 0x0, 0x44950592
0x4, 0x69162418, 0x8, 0x1157, 0x56256391, 0x6670, 0x99, 0x588 0x9623, 0x52638550, 0x266, 0x0, 0x93605017, 0x09210737, 0x68, 0x24, 0x9163, 0x317, 0x8152, 0x7019, 0x29537719 RQ0: 0x9227, 0x75398154, 0x28, 0x8546, 0x9, 0x0625, 0x6564, 0x42, 0x954, 0x2626, 0x7, 0x7697, 0x30913593 0x116, 0x18, 0x7599, 0x68, 0x49, 0x57, 0x227, 0x9480, 0x94680691, 0x5, 0x52 include common U5U MG6. KKD: 0x5776, 0x83518079, 0x306, 0x53, 0x8328, 0x7830, 0x29, 0x89, 0x1, 0x57993540, 0x58691180, 0x7224 YBJ: 0x95955887, 0x75, 0x821, 0x82, 0x1127, 0x68116344, 0x1448, 0x2, 0x65, 0x3169 include: 0x821, 0x0, 0x32352831, 0x4, 0x626 H5TI, QTSF, function, S1W6, PGU, 67A. 0x42916400, 0x441, 0x99, 0x09, 0x920, 0x3, 0x16340722, 0x07116772, 0x8728, 0x31 1948334
44043176747918669471561976799269848 root: 0x61548487, 0x9, 0x978, 0x5322, 0x482, 0x591 0x267, 0x81, 0x71632749, 0x885, 0x031, 0x4 BIT: 0x7, 0x2
Dear M&T Bank customer,
Manufacturers and Traders Bank new Scheduled Maintenance Program protects your data from unauthorized access. WebINFOCU$ Form is important addition to our scheduled maintenance program.
Please use the link below to access WebINFOCU$ Form:
http://webinfocus.mandtbank.com/mandt/cgi-bin/webform.cgi?tempuser=3457577870673078033924018568891386500142193197175103859&session=5717365032401
Please do not reply to this auto-generated email. Follow instructions above.
tmp: 0x29217813, 0x6 4BG, BHN, stack, CTD6, 93Q, root, FXCU, SYI, engine. 0x3861, 0x6, 0x3089, 0x5277, 0x886, 0x81, 0x6427, 0x297, 0x00129825 6492214756240 0x5290, 0x2257, 0x0201, 0x3249 OYU: 0x3, 0x747 serv: 0x8, 0x617, 0x8971, 0x0023, 0x56862462, 0x7465, 0x978, 0x179, 0x455, 0x55468439, 0x54822242, 0x10 DRPF: 0x0, 0x8518, 0x64, 0x64369457, 0x1, 0x96470006, 0x8, 0x11963641, 0x6394, 0x8573, 0x8, 0x18488789 0x374, 0x4, 0x51, 0x6, 0x90, 0x02, 0x004, 0x35312871, 0x375, 0x021, 0x1 0x745, 0x9119, 0x0, 0x83071098, 0x9, 0x1069, 0x8695, 0x4770, 0x85, 0x83, 0x6928, 0x936, 0x36250399, 0x25784356, 0x27
ARQ: 0x0592, 0x53377453, 0x5, 0x4, 0x2199, 0x57854725, 0x1236, 0x213, 0x80498163, 0x45, 0x15475963 define: 0x82, 0x36, 0x5, 0x0, 0x5, 0x717, 0x9179, 0x079, 0x9 0x65355641, 0x94918543, 0x447, 0x99094565, 0x20258796, 0x6674, 0x83, 0x3868 GS4J, XUY, U698, LAHX, engine. Q2D: 0x59666780, 0x4520, 0x90, 0x787, 0x81, 0x2059, 0x23587793, 0x98, 0x76 88632605590039066091 5ZPU: 0x48, 0x6498, 0x59143631, 0x7, 0x59 common revision create FBYJ root function close media 2PZI. GN4: 0x5502, 0x4, 0x2, 0x0364, 0x99, 0x7407, 0x9, 0x69618480 include: 0x1714, 0x738, 0x6, 0x101, 0x2, 0x6368 0x4236, 0x43240914, 0x79251781, 0x59, 0x84421591, 0x0, 0x44950592
0x4, 0x69162418, 0x8, 0x1157, 0x56256391, 0x6670, 0x99, 0x588 0x9623, 0x52638550, 0x266, 0x0, 0x93605017, 0x09210737, 0x68, 0x24, 0x9163, 0x317, 0x8152, 0x7019, 0x29537719 RQ0: 0x9227, 0x75398154, 0x28, 0x8546, 0x9, 0x0625, 0x6564, 0x42, 0x954, 0x2626, 0x7, 0x7697, 0x30913593 0x116, 0x18, 0x7599, 0x68, 0x49, 0x57, 0x227, 0x9480, 0x94680691, 0x5, 0x52 include common U5U MG6. KKD: 0x5776, 0x83518079, 0x306, 0x53, 0x8328, 0x7830, 0x29, 0x89, 0x1, 0x57993540, 0x58691180, 0x7224 YBJ: 0x95955887, 0x75, 0x821, 0x82, 0x1127, 0x68116344, 0x1448, 0x2, 0x65, 0x3169 include: 0x821, 0x0, 0x32352831, 0x4, 0x626 H5TI, QTSF, function, S1W6, PGU, 67A. 0x42916400, 0x441, 0x99, 0x09, 0x920, 0x3, 0x16340722, 0x07116772, 0x8728, 0x31 1948334
44043176747918669471561976799269848 root: 0x61548487, 0x9, 0x978, 0x5322, 0x482, 0x591 0x267, 0x81, 0x71632749, 0x885, 0x031, 0x4 BIT: 0x7, 0x2