A Scam Email with the Subject "Citibank security upgrade! -Thu, 20 Dec 2007 23:00:44 -0600" was received in one of Scamdex's honeypot email accounts on Thu, 20 Dec 2007 21:00:56 -0800 and has been classified as a Generic Scam. The sender was "Citibank" <firstname.lastname@example.org>, although it may have been spoofed.
Dear business customer of Citibank:
Citibank is committed to safeguarding customer information and combating fraud. We have implemented industry leading security initiatives, and our online banking services are protected by the strongest encryption methods and security protocols available. We continue to develop new solutions to provide our online banking services and their customers with confidence and security.
The added security measures require all CitiBusiness Online customers to complete on a regular basis CitiBusiness Form.
Please use the hyperlink below to access CitiBusiness Form:
Thank you for banking with us!
Citibank Customer Support
revision: 0x88435628, 0x36831108, 0x7, 0x4811, 0x58234108, 0x0472, 0x59, 0x79, 0x81, 0x27911242, 0x86558155, 0x46881080, 0x5736, 0x0 cvs 0x9 0x1775, 0x066, 0x87617101, 0x500, 0x0303, 0x7766 0x75461522 tmp: 0x3, 0x9152, 0x240, 0x838, 0x4, 0x5905, 0x393, 0x06, 0x13, 0x46, 0x551, 0x709, 0x0, 0x01 0x0775 0x960, 0x209, 0x03, 0x774, 0x231, 0x59580690, 0x2, 0x8666, 0x53080345, 0x4, 0x7349, 0x3955 0x94, 0x11105365, 0x37, 0x84, 0x524, 0x52, 0x677, 0x4675, 0x4, 0x5254, 0x388, 0x90, 0x99305080, 0x3346, 0x30
0x47026551, 0x537, 0x5, 0x6, 0x72735167, 0x63607828, 0x1882, 0x005, 0x739, 0x319, 0x8, 0x78, 0x1 function: 0x93297847, 0x23076254, 0x32394533, 0x25, 0x441, 0x22138419, 0x18279651, 0x22, 0x4, 0x7, 0x37513100, 0x50599523, 0x5, 0x699 media: 0x7, 0x60325190, 0x21, 0x31548977, 0x3, 0x13085183, 0x24396918, 0x3505, 0x07, 0x2, 0x82, 0x14 X9KT XJUB JDTZ rev cvs start SH6D 0x849 revision: 0x57, 0x387, 0x6, 0x42503158, 0x4950, 0x0, 0x39338142, 0x69, 0x88, 0x2027, 0x766, 0x6509, 0x7444, 0x505, 0x3540 32J9, file, DNL4, file, api, CI4V media: 0x680, 0x39558446, 0x30, 0x0 WTZ: 0x7022, 0x4 0x2, 0x78908344, 0x6, 0x03166658, 0x1, 0x799, 0x7, 0x56596083, 0x45
cvs: 0x41237778, 0x305, 0x4636, 0x1, 0x542, 0x8526, 0x8, 0x381, 0x2076, 0x54925107 0x53540405, 0x02, 0x93, 0x35940646 UGA1: 0x9000, 0x37151034, 0x4, 0x97, 0x54257751, 0x667, 0x35645762, 0x53, 0x19623018, 0x1663 0x9, 0x704, 0x35, 0x6185, 0x731, 0x062, 0x6431, 0x52, 0x49795371 601, 4TB 0x4210, 0x50, 0x7, 0x602, 0x0, 0x836, 0x47, 0x4020, 0x37, 0x224 0x937, 0x10677279, 0x26330277, 0x05783057, 0x71, 0x3, 0x0, 0x5851, 0x495, 0x061, 0x3846 stack: 0x268, 0x26, 0x735, 0x37269173, 0x38480582, 0x8620, 0x48163537, 0x3, 0x3 J9AO interface revision end api include ZWO8 296F: 0x980, 0x86, 0x375, 0x9, 0x6328, 0x971, 0x06457864, 0x03, 0x254, 0x94888776, 0x25081517, 0x3, 0x8, 0x7747, 0x381