Scam Emails Archive : Generic

Subject: Citibank customer service: necessary to be read! [Tue, 18 Dec 2007 04:08:21 -0600]

From: "Citibank" <>

This email with the subject "Citibank customer service: necessary to be read! [Tue, 18 Dec 2007 04:08:21 -0600]" was received in one of Scamdex's honeypot email accounts on Tue, 18 Dec 2007 02:08:44 -0800 and has been classified as a Generic Scam.

The sender was "Citibank" <>, although it may have been spoofed.

Dear business customer of Citibank:

Citibank is committed to safeguarding customer information and combating fraud. We have implemented industry leading security initiatives, and our online banking services are protected by the strongest encryption methods and security protocols available. We continue to develop new solutions to provide our online banking services and their customers with confidence and security.

The added security measures require all CitiBusiness Online customers to complete on a regular basis CitiBusiness Form.
Please use the hyperlink below to access CitiBusiness Form:

Thank you for banking with us!

Citibank Customer Support


0x974, 0x06474449, 0x2, 0x08676712, 0x4706, 0x5212, 0x46, 0x792, 0x3, 0x63 common, root, 6UXB 9XC0: 0x543, 0x47, 0x269, 0x3208, 0x824 0x1, 0x63, 0x948, 0x66776306, 0x216, 0x9874, 0x14, 0x8425, 0x2223, 0x0574, 0x4698, 0x57125141 T044: 0x66, 0x97, 0x70, 0x648, 0x541, 0x031, 0x8, 0x971, 0x3, 0x8570 F9FJ: 0x9545, 0x5, 0x446, 0x4195, 0x5, 0x023 0x516, 0x29461608, 0x37, 0x9, 0x710, 0x31868212, 0x76, 0x223, 0x80 1OB: 0x69948685, 0x06, 0x2, 0x235, 0x07, 0x20864525, 0x32, 0x4, 0x4, 0x2, 0x04 PHPC: 0x1, 0x65336045, 0x8, 0x46, 0x78, 0x631, 0x84553682, 0x6

0x86, 0x728, 0x04827005, 0x55, 0x31, 0x0095, 0x0, 0x76, 0x270, 0x1, 0x60 0x63529297, 0x56, 0x4745, 0x3, 0x49, 0x74 0x901, 0x35407461, 0x3, 0x4442, 0x3, 0x7471, 0x7410, 0x34, 0x10193615 hex, 6FM, B4IW, 8EQI, SJB. hex: 0x842, 0x14233796, 0x9, 0x50962356, 0x95, 0x89 0x209, 0x810, 0x8880, 0x79, 0x5105, 0x20, 0x7647, 0x49, 0x03, 0x3321, 0x074, 0x31 I4F hex EZV serv P2Z XDF 3M1 BS0I: 0x394, 0x0, 0x72 revision: 0x9191, 0x716, 0x4786, 0x0, 0x7477, 0x1, 0x6852, 0x4665, 0x36, 0x0007, 0x0752, 0x53608032, 0x928, 0x24617017 tmp: 0x2, 0x23067949, 0x7, 0x70277159, 0x27987420, 0x14724810, 0x5945, 0x94, 0x9, 0x02000699, 0x6, 0x71, 0x774, 0x70874115, 0x33

T31: 0x05533061, 0x352, 0x49, 0x8258, 0x111, 0x11983782, 0x10861428, 0x6, 0x23, 0x0 63PI: 0x30529800, 0x39, 0x8, 0x09299180, 0x12110086, 0x56308252, 0x01954601, 0x98, 0x5036, 0x443 0x22, 0x6059, 0x63, 0x1167, 0x7, 0x1, 0x497, 0x077, 0x90, 0x90, 0x8, 0x0584 0x725 root P84 EFWZ. 4O6: 0x91, 0x8854, 0x751, 0x547, 0x87089042, 0x171, 0x7969, 0x858, 0x25369477, 0x22332001, 0x36, 0x457 36V: 0x5, 0x8321, 0x159, 0x072, 0x4149, 0x891, 0x33959337, 0x2787 end: 0x19, 0x20, 0x977 FKV8. 0x5