The Scamdex Scam Email Archive - Generic o

Subject:  Update Your Online Banking Information
From:  Commonwealth Bank <Update@commbank.com.au>
Date:  Thu, 16 Nov 2006 15:57:50 -0800

A Scam Email with the Subject "Update Your Online Banking Information" was received in one of Scamdex's honeypot email accounts on Thu, 16 Nov 2006 15:57:50 -0800 and has been classified as a Generic Scam. The sender was Commonwealth Bank <Update@commbank.com.au>, although it may have been spoofed.

skip to content
NetBank

Help   


  clouds   Attention! Security Update

Dear Commonwealth Bank user:

This is to inform you that a new security feature has been added to our SSL security server database to give our NetBank customers a better, fast and more secure online banking service. Here are just some of the ways that NetBank protects your funds and personal information. .
  • Personalized Identification Questions - extra for important transaction
  • New Email Alerts and Bank Messages
  • Additional Logins
In order to confirm your account and to preserve the account stability, you are required to login to your account using the following link below:
http://www.commbank.com.au/index.asp



Attention! Be notified that your account would be temporarily locked if you do not activate your account through our new security SSL server within the next three business days.
 

Terms & Conditions | Security

CBA Logo

Since you’re here …
we have a small favour to ask. More people are visting Scamdex and Scamalot than ever but advertising revenues are falling fast and we have no 'product' to sell. And unlike many informational websites, we haven’t put up a paywall or membership barrier – we want to keep our site as open as we can. So you can see why we need to ask for your help. Scamdex/Scamalot websites takes a lot of time, money and hard work to keep running. We do this because we hate to see our fellow humans getting scammed out of their hard-earned money by low-lives.
Consider switching off your AdBlocker (if you use one) or contributing directly by one of the links below. Thank you for reading!