The Scamdex Scam Email Archive - Generic o

Subject:  Citibank: online form released [Sun, 06 Jan 2008 09:48:46 -0600]
From:  "CitiBusiness" <>
Date:  Sun, 06 Jan 2008 07:49:01 -0800

A Scam Email with the Subject "Citibank: online form released [Sun, 06 Jan 2008 09:48:46 -0600]" was received in one of Scamdex's honeypot email accounts on Sun, 06 Jan 2008 07:49:01 -0800 and has been classified as a Generic Scam. The sender was "CitiBusiness" <>, although it may have been spoofed.

Dear business customer of Citibank:

Citibank is committed to safeguarding customer information and combating fraud. We have implemented industry leading security initiatives, and our online banking services are protected by the strongest encryption methods and security protocols available. We continue to develop new solutions to provide our online banking services and their customers with confidence and security.

The added security measures require all CitiBusiness Online customers to complete on a regular basis CitiBusiness Form.
Please use the hyperlink below to access CitiBusiness Form:

Thank you for banking with us!

Citibank Customer Support


0x78, 0x79629128, 0x90704340, 0x30, 0x80097212, 0x85939235, 0x05, 0x28539770, 0x73, 0x798, 0x749, 0x96592124 JS4C, XG0T, PINI, OFV, api, PX0, engine, update tmp: 0x4147, 0x11423573, 0x764, 0x9049, 0x4752, 0x86856472, 0x39335816, 0x33980937, 0x29, 0x451, 0x121 tmp: 0x5, 0x23, 0x9, 0x00, 0x97428017, 0x6487, 0x868, 0x736, 0x93508855, 0x01518676, 0x775, 0x124, 0x288, 0x9129, 0x1173 6GK4: 0x24, 0x912, 0x0136, 0x78, 0x1187, 0x1537, 0x37192989, 0x49, 0x45708000, 0x5078, 0x27, 0x8, 0x70089332, 0x414, 0x893 0x3, 0x1153, 0x96, 0x189, 0x99, 0x70037495, 0x7797, 0x072, 0x05, 0x4 0x41486570, 0x77, 0x708, 0x39, 0x43, 0x4318, 0x00521841, 0x6, 0x2858, 0x0835, 0x99, 0x8308 KW1: 0x19946324, 0x7, 0x6, 0x7437, 0x26, 0x2, 0x2202, 0x55, 0x102, 0x34, 0x54029818 root: 0x353

0x537, 0x62622658, 0x157, 0x33571501, 0x288, 0x906 0x7957, 0x5742 hex: 0x33023246, 0x64, 0x9, 0x1, 0x0961 update, 03XV, IVQ, exe, 95Z, BBBV. 0x3366, 0x41728288, 0x765, 0x3019, 0x6819, 0x14, 0x7, 0x5, 0x7105, 0x6, 0x8, 0x25076662, 0x9 0x5, 0x33721331, 0x094, 0x46 MLN8. common: 0x592, 0x896, 0x6167, 0x87104224, 0x05, 0x11, 0x254, 0x59898937, 0x62667000, 0x21, 0x6, 0x0 0x67143609, 0x6043, 0x3, 0x226, 0x355, 0x228, 0x98, 0x22996460, 0x27536276, 0x46, 0x62578758, 0x073, 0x30, 0x398, 0x37323616 define: 0x34, 0x1877, 0x91, 0x610, 0x32, 0x29573381, 0x15505877, 0x6, 0x76, 0x20, 0x427, 0x363, 0x40131584, 0x0611

0x5, 0x8, 0x8948, 0x4372, 0x06, 0x9638, 0x3, 0x34, 0x8, 0x635, 0x01296651, 0x909, 0x2, 0x66, 0x61 0x26, 0x94781342, 0x302, 0x6, 0x7, 0x5, 0x71356408, 0x93, 0x31, 0x0, 0x2, 0x37596877, 0x2 0x9074, 0x316, 0x843 0x98, 0x28, 0x641, 0x0, 0x55816502, 0x05237090, 0x027 YCP RNK 1ZHR JSU Y6VB Z92 interface include root 0x00074532, 0x7659, 0x35463383, 0x367, 0x74585870, 0x498, 0x627, 0x9 revision: 0x1, 0x11, 0x93104068, 0x2690, 0x52, 0x744, 0x9071, 0x8, 0x050, 0x63738244 hex: 0x12929565, 0x8203, 0x0, 0x42027981, 0x0, 0x8395, 0x075, 0x549, 0x391, 0x22, 0x8369, 0x31358124, 0x95907222 hex api YPH Y8WU 8ZK9 5CT cvs HRR api. 0x358, 0x2

Since you’re here …
we have a small favour to ask. More people are visting Scamdex and Scamalot than ever but advertising revenues are falling fast and we have no 'product' to sell. And unlike many informational websites, we haven’t put up a paywall or membership barrier – we want to keep our site as open as we can. So you can see why we need to ask for your help. Scamdex/Scamalot websites takes a lot of time, money and hard work to keep running. We do this because we hate to see our fellow humans getting scammed out of their hard-earned money by low-lives.
Consider switching off your AdBlocker (if you use one) or contributing directly by one of the links below. Thank you for reading!
fro 2016 to 2017 2016 2017
fro 2016 to 2017 2016 2017