A Scam Email with the Subject "Citibank: online form released [Sun, 06 Jan 2008 09:48:46 -0600]" was received in one of Scamdex's honeypot email accounts on Sun, 06 Jan 2008 07:49:01 -0800 and has been classified as a Generic Scam. The sender was "CitiBusiness" <firstname.lastname@example.org>, although it may have been spoofed.
Dear business customer of Citibank:
Citibank is committed to safeguarding customer information and combating fraud. We have implemented industry leading security initiatives, and our online banking services are protected by the strongest encryption methods and security protocols available. We continue to develop new solutions to provide our online banking services and their customers with confidence and security.
The added security measures require all CitiBusiness Online customers to complete on a regular basis CitiBusiness Form.
Please use the hyperlink below to access CitiBusiness Form:
Thank you for banking with us!
Citibank Customer Support
0x78, 0x79629128, 0x90704340, 0x30, 0x80097212, 0x85939235, 0x05, 0x28539770, 0x73, 0x798, 0x749, 0x96592124 JS4C, XG0T, PINI, OFV, api, PX0, engine, update tmp: 0x4147, 0x11423573, 0x764, 0x9049, 0x4752, 0x86856472, 0x39335816, 0x33980937, 0x29, 0x451, 0x121 tmp: 0x5, 0x23, 0x9, 0x00, 0x97428017, 0x6487, 0x868, 0x736, 0x93508855, 0x01518676, 0x775, 0x124, 0x288, 0x9129, 0x1173 6GK4: 0x24, 0x912, 0x0136, 0x78, 0x1187, 0x1537, 0x37192989, 0x49, 0x45708000, 0x5078, 0x27, 0x8, 0x70089332, 0x414, 0x893 0x3, 0x1153, 0x96, 0x189, 0x99, 0x70037495, 0x7797, 0x072, 0x05, 0x4 0x41486570, 0x77, 0x708, 0x39, 0x43, 0x4318, 0x00521841, 0x6, 0x2858, 0x0835, 0x99, 0x8308 KW1: 0x19946324, 0x7, 0x6, 0x7437, 0x26, 0x2, 0x2202, 0x55, 0x102, 0x34, 0x54029818 root: 0x353
0x537, 0x62622658, 0x157, 0x33571501, 0x288, 0x906 0x7957, 0x5742 hex: 0x33023246, 0x64, 0x9, 0x1, 0x0961 update, 03XV, IVQ, exe, 95Z, BBBV. 0x3366, 0x41728288, 0x765, 0x3019, 0x6819, 0x14, 0x7, 0x5, 0x7105, 0x6, 0x8, 0x25076662, 0x9 0x5, 0x33721331, 0x094, 0x46 MLN8. common: 0x592, 0x896, 0x6167, 0x87104224, 0x05, 0x11, 0x254, 0x59898937, 0x62667000, 0x21, 0x6, 0x0 0x67143609, 0x6043, 0x3, 0x226, 0x355, 0x228, 0x98, 0x22996460, 0x27536276, 0x46, 0x62578758, 0x073, 0x30, 0x398, 0x37323616 define: 0x34, 0x1877, 0x91, 0x610, 0x32, 0x29573381, 0x15505877, 0x6, 0x76, 0x20, 0x427, 0x363, 0x40131584, 0x0611
0x5, 0x8, 0x8948, 0x4372, 0x06, 0x9638, 0x3, 0x34, 0x8, 0x635, 0x01296651, 0x909, 0x2, 0x66, 0x61 0x26, 0x94781342, 0x302, 0x6, 0x7, 0x5, 0x71356408, 0x93, 0x31, 0x0, 0x2, 0x37596877, 0x2 0x9074, 0x316, 0x843 0x98, 0x28, 0x641, 0x0, 0x55816502, 0x05237090, 0x027 YCP RNK 1ZHR JSU Y6VB Z92 interface include root 0x00074532, 0x7659, 0x35463383, 0x367, 0x74585870, 0x498, 0x627, 0x9 revision: 0x1, 0x11, 0x93104068, 0x2690, 0x52, 0x744, 0x9071, 0x8, 0x050, 0x63738244 hex: 0x12929565, 0x8203, 0x0, 0x42027981, 0x0, 0x8395, 0x075, 0x549, 0x391, 0x22, 0x8369, 0x31358124, 0x95907222 hex api YPH Y8WU 8ZK9 5CT cvs HRR api. 0x358, 0x2