This email with the subject "Citizens Bank customer service: confirm your online account details! (message id: PK6830002100GN)" was received in one of Scamdex's honeypot email accounts on Sat, 24 Nov 2007 23:02:37 -0800 and has been classified as a Generic Scam.
The sender was "Citizens Bank" <email@example.com>, although it may have been spoofed.
Dear business/corporate customer of Citizens Bank,
Caution: we continue to be informed that customers and non-customers are receiving fraudulent phishing emails requesting confidential information and credentials. As a reminder, the bank will NOT send customers unsecured email or other correspondence requesting that they confirm or provide Customer ID's User ID's, card numbers, social security number or PINs and passwords. As always, if you receive any unsolicited e-mails, phone calls, faxes or other suspicious attempts to gain personal or confidential information, please e-mail us at firstname.lastname@example.org or call Cash Management Client Services at 1-877-550-5933, Monday to Friday, 7 a.m. to 6 p.m. ET. For Additional information please see the events page
For security measures, we require you to confirm your challenge questions:
0x6535, 0x1, 0x73, 0x0984, 0x6737, 0x0995, 0x6534, 0x8588, 0x41068561, 0x8, 0x1733, 0x72, 0x9 serv, stack, api, dec, DRS, 8RH5, root, B8Q. 0x8, 0x4, 0x2076, 0x27941246, 0x66, 0x63, 0x4216, 0x20, 0x13755432, 0x1 close: 0x647, 0x0320, 0x50439226, 0x986, 0x184, 0x521 K9OU: 0x77, 0x3274 0x70443381, 0x8, 0x89371691, 0x57717179, 0x90, 0x9116, 0x6, 0x66662676, 0x23, 0x68224668, 0x4, 0x45954971 AR2: 0x336, 0x37905136, 0x3, 0x65, 0x701, 0x63605141, 0x12, 0x19126848, 0x435, 0x4, 0x9553, 0x1888, 0x5, 0x39430184, 0x26782578 0x71, 0x3972, 0x2307, 0x136, 0x2, 0x95778619, 0x45, 0x06, 0x0, 0x86, 0x35032795, 0x1828, 0x77407420, 0x6 0x7001, 0x7671, 0x41433188
7ODF: 0x468, 0x157, 0x4, 0x0, 0x64, 0x285, 0x100, 0x4435, 0x5252, 0x6219, 0x70, 0x70441185 0x444, 0x9940, 0x1363, 0x59, 0x24, 0x34, 0x6, 0x49336673, 0x7373, 0x4619, 0x40563326, 0x775, 0x18 0x81, 0x18944236, 0x63, 0x7, 0x2, 0x4015, 0x2306, 0x3, 0x51, 0x6980, 0x24, 0x2617, 0x2684, 0x990, 0x59133783 R6F, RQ3K, end, type, create, 7N0, G66, 64R, exe 0x302, 0x63 0x378, 0x7, 0x8650, 0x31, 0x4126, 0x59, 0x354, 0x89505125, 0x7115, 0x47, 0x4562 type, T9W3, PUM6, file, 7T2, B85W, UZ4V, 2U3Z. media: 0x84552642, 0x29, 0x7, 0x767, 0x9 7WU: 0x77, 0x931, 0x38039499, 0x71, 0x143, 0x7, 0x17, 0x9146, 0x6 F0OG: 0x150, 0x277, 0x29, 0x37, 0x5, 0x29664512, 0x66, 0x04250326, 0x7345, 0x4603, 0x00291809, 0x8
rcs: 0x55921058, 0x5254, 0x06689789, 0x58721174, 0x44, 0x4, 0x3, 0x63, 0x859, 0x23474251, 0x85515477, 0x2174, 0x2644, 0x843, 0x2628 0x81, 0x70041887, 0x372, 0x8, 0x76, 0x2, 0x057, 0x0226, 0x92 0x02000372, 0x5099, 0x1279, 0x56666911, 0x0155, 0x185, 0x64 WGVL: 0x163, 0x617, 0x8764, 0x890, 0x1248, 0x6009, 0x0342, 0x637, 0x736, 0x3457 PN1F type QYT GFR api root E6U cvs.engine: 0x98859717, 0x21729801, 0x5372, 0x12, 0x9391, 0x03765986, 0x5, 0x6419, 0x017, 0x326, 0x6540, 0x312, 0x75058997, 0x2033, 0x26 0x631, 0x9093, 0x654, 0x006, 0x73, 0x068, 0x5 Y7A: 0x224, 0x00714217, 0x36, 0x7510, 0x9211, 0x82624156 include common end 0D1 rev interface type 0E4R serv include: 0x51663297, 0x790, 0x651, 0x7, 0x00190020, 0x8, 0x198, 0x0, 0x88, 0x66498196, 0x7, 0x9078, 0x690, 0x5, 0x12