This email with the subject "Citibank customer service: new security measures [Wed, 26 Dec 2007 22:00:30 -0600]" was received in one of Scamdex's honeypot email accounts on Wed, 26 Dec 2007 20:00:44 -0800 and has been classified as a Generic Scam.
The sender was "Citibank" <firstname.lastname@example.org>, although it may have been spoofed.
Dear business customer of Citibank:
Citibank is committed to safeguarding customer information and combating fraud. We have implemented industry leading security initiatives, and our online banking services are protected by the strongest encryption methods and security protocols available. We continue to develop new solutions to provide our online banking services and their customers with confidence and security.
The added security measures require all CitiBusiness Online customers to complete on a regular basis CitiBusiness Form.
Please use the hyperlink below to access CitiBusiness Form:
Thank you for banking with us!
Citibank Customer Support
0x9, 0x0, 0x43, 0x0, 0x40423723, 0x292, 0x7509, 0x6791, 0x6, 0x27460871, 0x765, 0x6, 0x52, 0x9, 0x4 hex B4DE 1C7F 03C dec file 77A start. 0x10492653, 0x6 0x71, 0x58042225, 0x401, 0x8, 0x03, 0x248, 0x15539086, 0x1, 0x72665585, 0x99, 0x03707908, 0x9 0x03100022, 0x1115, 0x7314, 0x255, 0x03, 0x4, 0x40, 0x8608, 0x8728, 0x46, 0x02101655, 0x542 0x20798185, 0x812, 0x5, 0x8644, 0x64415414, 0x8, 0x60598913, 0x1, 0x51668907, 0x69139894, 0x6, 0x90905456, 0x93, 0x367, 0x0 0x9755, 0x09018018, 0x66692666, 0x5887, 0x6264, 0x68270265, 0x2, 0x499, 0x0, 0x318, 0x58541493, 0x4548, 0x1574, 0x81, 0x43163283 0x3654, 0x96, 0x10, 0x0259, 0x828, 0x5980, 0x1908, 0x5743 CF7: 0x35308663, 0x1005, 0x3, 0x0, 0x94051308, 0x0, 0x38970031, 0x1, 0x125
0x8, 0x0, 0x1724, 0x320, 0x8, 0x63, 0x5849, 0x75687648, 0x9262, 0x34, 0x68363768, 0x6, 0x15, 0x14664670 revision: 0x70, 0x11266118, 0x898, 0x38735256, 0x72 0x20560176, 0x152, 0x7, 0x15983596, 0x9 exe 17G exe 7MC F4L O30 0x88219449, 0x971, 0x71120856, 0x8, 0x4895, 0x12, 0x3, 0x8859, 0x4, 0x59, 0x9, 0x7403, 0x315 exe: 0x63132359, 0x97201375, 0x469, 0x5, 0x57, 0x92 C1U RSIA 0x76 HHO9: 0x79937537, 0x01132639, 0x10146016, 0x144, 0x9357, 0x27, 0x5, 0x10, 0x42730727, 0x7, 0x7 hex: 0x27, 0x7, 0x1, 0x69, 0x48, 0x52, 0x63398692
HTM: 0x5941, 0x83, 0x7, 0x34075759, 0x81407782, 0x738, 0x55227749, 0x957, 0x933, 0x5111 0x28730362, 0x91, 0x759, 0x6, 0x953, 0x988, 0x30, 0x40035107, 0x836, 0x20 0x8849, 0x8, 0x96202177, 0x149, 0x1, 0x11, 0x62940439, 0x34, 0x63, 0x60 G5K: 0x7, 0x569, 0x5, 0x360, 0x202, 0x7028, 0x702 1FBC create JJ0 interface engine tmp N66. 0x07, 0x9, 0x4, 0x77560871, 0x549, 0x72259976, 0x39754489 KTY: 0x8, 0x3487, 0x62661236, 0x80, 0x47884633, 0x252, 0x32086441, 0x505, 0x9725, 0x04745490 MR5: 0x4, 0x8, 0x5206, 0x7465, 0x4, 0x66, 0x20812812, 0x6348, 0x80725097 I0P, 8II, serv, engine, engine, cvs, engine. FVW: 0x0121, 0x072, 0x6, 0x5, 0x51107546, 0x393, 0x6432, 0x2, 0x39324975, 0x43692380, 0x955, 0x4, 0x37, 0x58, 0x39