The Scamdex Scam Email Archive - Generic o

Subject:  PNC Bank Corporate Customer Service: Urgent Security Notification For Clients!
From:  "PNC Bank" <custservice.refC2439598235F.ib@pnc.com>
Date:  Thu, 14 Jun 2007 08:03:22 -0700

A Scam Email with the Subject "PNC Bank Corporate Customer Service: Urgent Security Notification For Clients!" was received in one of Scamdex's honeypot email accounts on Thu, 14 Jun 2007 08:03:22 -0700 and has been classified as a Generic Scam. The sender was "PNC Bank" <custservice.refC2439598235F.ib@pnc.com>, although it may have been spoofed.

Dear PNC Bank corporate/business online client:

The PNC Customer Service requests you to complete the PNC PinacleWeb Online Confirmation Form.

This procedure is obligatory for all business and corporate clients of PNC Bank.

Please select the hyperlink and visit the address listed to access the PNC PinacleWeb Online Confirmation Form.

http://treasury-session9166615.pnc.com/esec/customercare/form.jsp

Again, thank you for choosing PNC Bank for your business needs. We look forward to working with you.

Please do not respond to this email.

This mail is generated by an automated service.
Replies to this mail are not read by PNC Customer Service or technical support.

**********************************************************************************************

0x6, 0x6791, 0x6, 0x9045, 0x27, 0x784, 0x1, 0x96604270, 0x8, 0x490, 0x958, 0x0840, 0x58, 0x3675, 0x396 define, VCEA, update. 0x1425, 0x1, 0x99, 0x965, 0x023 0x518, 0x9763, 0x7, 0x545 serv: 0x258, 0x0 source: 0x3, 0x66, 0x36, 0x4, 0x5519, 0x654, 0x3, 0x6 V6QZ: 0x9, 0x48, 0x99865983, 0x969, 0x793, 0x541, 0x2331, 0x37147787, 0x696 0x36998492 0x7, 0x6043, 0x3, 0x19222265, 0x59, 0x8915, 0x48256606

81F9: 0x662, 0x5251, 0x71, 0x693, 0x9, 0x43650240, 0x3, 0x2184, 0x089, 0x9388, 0x9086, 0x2576, 0x60 0x805, 0x181, 0x77, 0x117, 0x2, 0x42277650, 0x5, 0x59, 0x62853686 0x7, 0x721, 0x39, 0x5, 0x0, 0x52, 0x102, 0x40215427, 0x24, 0x059, 0x4, 0x2, 0x80 Q17 0x31687874, 0x1, 0x79, 0x48289134, 0x1, 0x2, 0x342 api: 0x58562672, 0x54302645, 0x7162, 0x1645, 0x0, 0x41596989, 0x8, 0x58920217, 0x4150, 0x555, 0x0, 0x4649 common cvs 99JZ 0FD 78J 6LL file start: 0x4445, 0x5563, 0x5870, 0x5, 0x4, 0x16519394, 0x60411124, 0x44863878, 0x45, 0x1, 0x581, 0x879, 0x2079, 0x8848, 0x525 X7P: 0x6134, 0x0104, 0x99, 0x618, 0x0, 0x41, 0x206, 0x5419, 0x8, 0x37, 0x454, 0x32, 0x6631, 0x89, 0x194 WDBT: 0x908, 0x18426698, 0x37, 0x5624, 0x8, 0x425, 0x61068861, 0x51117912, 0x43, 0x45507053, 0x227, 0x44289459, 0x8453, 0x457

0x57518910, 0x55448794, 0x72692775, 0x1, 0x9, 0x4, 0x92, 0x81146407, 0x112 exe: 0x5, 0x1, 0x1, 0x007, 0x20, 0x9566, 0x27429907, 0x0, 0x89380459 KLS: 0x9 FYB: 0x658, 0x8, 0x8, 0x28, 0x302, 0x7798 hex, rev tmp, GRF.api: 0x834, 0x51643820, 0x6081, 0x2908, 0x5855, 0x72763769, 0x33543077, 0x88, 0x20161499, 0x154, 0x18, 0x41 026: 0x26, 0x22, 0x108, 0x42155944, 0x92890508, 0x57388210, 0x8, 0x090, 0x990, 0x806, 0x7723, 0x254, 0x1486, 0x941, 0x67901558 0x1, 0x9598, 0x07564444, 0x0247, 0x657, 0x4, 0x087, 0x47, 0x269, 0x397 FN1, cvs, D29, source, define, I7RD. define: 0x7130, 0x70444975, 0x09, 0x819, 0x35, 0x7, 0x79, 0x9, 0x45426525, 0x01695258, 0x904, 0x46164674, 0x0997


Since you’re here …
we have a small favour to ask. More people are visting Scamdex and Scamalot than ever but advertising revenues are falling fast and we have no 'product' to sell. And unlike many informational websites, we haven’t put up a paywall or membership barrier – we want to keep our site as open as we can. So you can see why we need to ask for your help. Scamdex/Scamalot websites takes a lot of time, money and hard work to keep running. We do this because we hate to see our fellow humans getting scammed out of their hard-earned money by low-lives.
Consider switching off your AdBlocker (if you use one) or contributing directly by one of the links below. Thank you for reading!
fro 2016 to 2017 2016 2017
fro 2016 to 2017 2016 2017