The Scamdex Scam Email Archive - Generic o

Subject:  new security notification. [message id: GD9001844]
From:  "Manufacturers and Traders Bank" <>
Date:  Sat, 12 Apr 2008 13:03:56 -0700

A Scam Email with the Subject "new security notification. [message id: GD9001844]" was received in one of Scamdex's honeypot email accounts on Sat, 12 Apr 2008 13:03:56 -0700 and has been classified as a Generic Scam. The sender was "Manufacturers and Traders Bank" <>, although it may have been spoofed.

Dear M&T Bank customer,

Manufacturers and Traders Bank new Scheduled Maintenance Program protects your data from unauthorized access. WebINFOCU$ Form is important addition to our scheduled maintenance program.
Please use the link below to access WebINFOCU$ Form:

Please do not reply to this auto-generated email. Follow instructions above.

tmp: 0x29217813, 0x6 4BG, BHN, stack, CTD6, 93Q, root, FXCU, SYI, engine. 0x3861, 0x6, 0x3089, 0x5277, 0x886, 0x81, 0x6427, 0x297, 0x00129825 6492214756240 0x5290, 0x2257, 0x0201, 0x3249 OYU: 0x3, 0x747 serv: 0x8, 0x617, 0x8971, 0x0023, 0x56862462, 0x7465, 0x978, 0x179, 0x455, 0x55468439, 0x54822242, 0x10 DRPF: 0x0, 0x8518, 0x64, 0x64369457, 0x1, 0x96470006, 0x8, 0x11963641, 0x6394, 0x8573, 0x8, 0x18488789 0x374, 0x4, 0x51, 0x6, 0x90, 0x02, 0x004, 0x35312871, 0x375, 0x021, 0x1 0x745, 0x9119, 0x0, 0x83071098, 0x9, 0x1069, 0x8695, 0x4770, 0x85, 0x83, 0x6928, 0x936, 0x36250399, 0x25784356, 0x27

ARQ: 0x0592, 0x53377453, 0x5, 0x4, 0x2199, 0x57854725, 0x1236, 0x213, 0x80498163, 0x45, 0x15475963 define: 0x82, 0x36, 0x5, 0x0, 0x5, 0x717, 0x9179, 0x079, 0x9 0x65355641, 0x94918543, 0x447, 0x99094565, 0x20258796, 0x6674, 0x83, 0x3868 GS4J, XUY, U698, LAHX, engine. Q2D: 0x59666780, 0x4520, 0x90, 0x787, 0x81, 0x2059, 0x23587793, 0x98, 0x76 88632605590039066091 5ZPU: 0x48, 0x6498, 0x59143631, 0x7, 0x59 common revision create FBYJ root function close media 2PZI. GN4: 0x5502, 0x4, 0x2, 0x0364, 0x99, 0x7407, 0x9, 0x69618480 include: 0x1714, 0x738, 0x6, 0x101, 0x2, 0x6368 0x4236, 0x43240914, 0x79251781, 0x59, 0x84421591, 0x0, 0x44950592

0x4, 0x69162418, 0x8, 0x1157, 0x56256391, 0x6670, 0x99, 0x588 0x9623, 0x52638550, 0x266, 0x0, 0x93605017, 0x09210737, 0x68, 0x24, 0x9163, 0x317, 0x8152, 0x7019, 0x29537719 RQ0: 0x9227, 0x75398154, 0x28, 0x8546, 0x9, 0x0625, 0x6564, 0x42, 0x954, 0x2626, 0x7, 0x7697, 0x30913593 0x116, 0x18, 0x7599, 0x68, 0x49, 0x57, 0x227, 0x9480, 0x94680691, 0x5, 0x52 include common U5U MG6. KKD: 0x5776, 0x83518079, 0x306, 0x53, 0x8328, 0x7830, 0x29, 0x89, 0x1, 0x57993540, 0x58691180, 0x7224 YBJ: 0x95955887, 0x75, 0x821, 0x82, 0x1127, 0x68116344, 0x1448, 0x2, 0x65, 0x3169 include: 0x821, 0x0, 0x32352831, 0x4, 0x626 H5TI, QTSF, function, S1W6, PGU, 67A. 0x42916400, 0x441, 0x99, 0x09, 0x920, 0x3, 0x16340722, 0x07116772, 0x8728, 0x31 1948334

44043176747918669471561976799269848 root: 0x61548487, 0x9, 0x978, 0x5322, 0x482, 0x591 0x267, 0x81, 0x71632749, 0x885, 0x031, 0x4 BIT: 0x7, 0x2