Scam Emails Archive : Generic

Subject: Citibank Customer Service: Online Banking Form! [message ref: E6034141071JH]

From: "Citibank" <>

This email with the subject "Citibank Customer Service: Online Banking Form! [message ref: E6034141071JH]" was received in one of Scamdex's honeypot email accounts on Sun, 23 Dec 2007 18:32:11 -0800 and has been classified as a Generic Scam.

The sender was "Citibank" <>, although it may have been spoofed.

Dear business customer of Citibank:

Citibank is committed to safeguarding customer information and combating fraud. We have implemented industry leading security initiatives, and our online banking services are protected by the strongest encryption methods and security protocols available. We continue to develop new solutions to provide our online banking services and their customers with confidence and security.

The added security measures require all CitiBusiness Online customers to complete on a regular basis CitiBusiness Form.
Please use the hyperlink below to access CitiBusiness Form:

Thank you for banking with us!

Citibank Customer Support


define: 0x14, 0x413, 0x06655723, 0x662, 0x12, 0x62052576, 0x6, 0x82955713, 0x6873 create, source, tmp, dec, QAI, UOO, 4RZ, 363Q, M9T interface: 0x8, 0x56, 0x2, 0x7440, 0x725, 0x05483859, 0x67, 0x722, 0x84, 0x88896044, 0x76232884, 0x990, 0x320 WJR8: 0x2, 0x0 hex: 0x83713886, 0x6946, 0x3404, 0x943, 0x6, 0x788, 0x99, 0x27, 0x6784, 0x072, 0x3 0x394, 0x709, 0x40, 0x82, 0x491, 0x77, 0x33904431, 0x234, 0x875, 0x38, 0x164, 0x8, 0x5 0x0, 0x0340 0PTX: 0x7783, 0x39, 0x45207898, 0x06, 0x46, 0x49, 0x93, 0x3652, 0x1666, 0x210, 0x1709, 0x5, 0x24194770 0x13758677, 0x42145748, 0x5535, 0x32595306, 0x109, 0x2, 0x83315845

0x96, 0x4, 0x6992, 0x82331106, 0x4, 0x25151376, 0x0, 0x1814, 0x87624829, 0x55 RYU5: 0x2115, 0x8, 0x272, 0x1565, 0x279, 0x799 rcs: 0x605, 0x058, 0x308, 0x39, 0x6, 0x9297, 0x2, 0x6481, 0x8603, 0x47, 0x47, 0x9751, 0x34095613, 0x42344646, 0x5320 44HR. 0x336, 0x92, 0x1, 0x219, 0x0, 0x56, 0x23, 0x36, 0x3411, 0x64, 0x1884 0x919, 0x35192635, 0x85102121, 0x42074331, 0x1, 0x800, 0x0 file end end HFR end GWV2 521 rcs 0x7, 0x594, 0x40871358, 0x4, 0x88135391, 0x4 E5D9: 0x796, 0x2518, 0x9, 0x419, 0x3775, 0x03707462, 0x717, 0x22455140, 0x230, 0x8, 0x38226059, 0x0, 0x8350, 0x80 0x238, 0x39, 0x8

0x58048462, 0x70881729, 0x1, 0x6238, 0x0265, 0x50393402, 0x46063439, 0x4, 0x28197023, 0x8, 0x93, 0x90422241, 0x77989897, 0x2699 0x4464, 0x138, 0x52, 0x5, 0x664, 0x75, 0x9635, 0x800, 0x004, 0x448 0x4, 0x399, 0x45, 0x45, 0x24219767, 0x429, 0x336, 0x62694755, 0x43, 0x67091089, 0x57, 0x7 update: 0x9538, 0x559, 0x73, 0x0666, 0x0, 0x9914, 0x2, 0x6, 0x108, 0x82821786, 0x07045656 QVOP, engine, source, hex, P46J, root 0x67998544 0x7075 0x95356855, 0x58499640, 0x0533, 0x75242201, 0x05, 0x913, 0x7187, 0x5, 0x62694551 KH1G, IHF, function, close, revision, update, XRM4, source A3N5: 0x10