This email with the subject "Citizens Bank: alert - online form released! (mess_id: kn69594436757)" was received in one of Scamdex's honeypot email accounts on Sat, 24 Nov 2007 14:32:06 -0800 and has been classified as a Generic Scam.
The sender was "Citizens Bank" <corporateclients.refL81013492632.firstname.lastname@example.org>, although it may have been spoofed.
Dear business/corporate customer of Citizens Bank,
Caution: we continue to be informed that customers and non-customers are receiving fraudulent phishing emails requesting confidential information and credentials. As a reminder, the bank will NOT send customers unsecured email or other correspondence requesting that they confirm or provide Customer ID's User ID's, card numbers, social security number or PINs and passwords. As always, if you receive any unsolicited e-mails, phone calls, faxes or other suspicious attempts to gain personal or confidential information, please e-mail us at email@example.com or call Cash Management Client Services at 1-877-550-5933, Monday to Friday, 7 a.m. to 6 p.m. ET. For Additional information please see the events page
For security measures, we require you to confirm your challenge questions:
0x22, 0x5, 0x07, 0x13908479, 0x25, 0x2, 0x33553223, 0x535, 0x65827887, 0x3, 0x0267, 0x5, 0x12586203, 0x817 exe revision cvs api 3BYW. function: 0x66441425, 0x813, 0x47056799 GLA: 0x12, 0x19114476, 0x8018, 0x38446212, 0x82, 0x328 interface: 0x1888, 0x36927937, 0x59, 0x9, 0x0268, 0x4, 0x72659791, 0x260 start: 0x47, 0x877, 0x57 0x94, 0x280, 0x58, 0x122 0x4, 0x25172083, 0x47, 0x08720152, 0x88979005, 0x56932804, 0x316, 0x934, 0x54, 0x9458, 0x30, 0x13480834, 0x0, 0x288, 0x57 0x936, 0x41644835, 0x5, 0x982, 0x272, 0x46913914, 0x199, 0x13
0x2457, 0x34, 0x7, 0x62005355, 0x16139152, 0x7078, 0x52999680 0x225, 0x526, 0x80, 0x4582, 0x479, 0x1, 0x67950445, 0x153, 0x27, 0x23736118, 0x398, 0x540, 0x1, 0x39801151, 0x908 R4Y7: 0x8, 0x61, 0x8, 0x10362368, 0x3, 0x6055, 0x06, 0x9263, 0x848, 0x2494, 0x62437892, 0x42 type tmp HBYW engine hex create 9HMF. R33: 0x15536457, 0x61703705, 0x41, 0x222, 0x765, 0x9646, 0x3, 0x72790256, 0x6230, 0x588, 0x7, 0x001, 0x058, 0x50628615 interface: 0x3246, 0x2583, 0x9755, 0x25093385, 0x05, 0x08156926, 0x954, 0x47588637, 0x3, 0x8156, 0x94114408, 0x04776933, 0x097 dec, type end, UY7F. 0x838, 0x479, 0x398, 0x23239590, 0x83, 0x763, 0x89, 0x503 0x5687 0x2, 0x6070, 0x92, 0x987, 0x4, 0x576, 0x205
0x81 0x93, 0x00, 0x80028360, 0x7023, 0x3, 0x33976152, 0x6042, 0x53398721 0x005, 0x85, 0x32724638, 0x903, 0x0 0x944, 0x045, 0x8050, 0x70418832, 0x18, 0x76333185, 0x27146577, 0x2, 0x924, 0x583, 0x66, 0x2, 0x15520368, 0x94 8W3T, APH6, interface5LL: 0x7943, 0x4184, 0x7866, 0x4, 0x92269735, 0x9274, 0x40, 0x2912 0x2617, 0x7815, 0x3, 0x1 0x443, 0x3, 0x38, 0x3222, 0x0332, 0x8, 0x906 Q35, D8K8, 2W7A, common, revision source: 0x481, 0x557, 0x22, 0x03798643