A Scam Email with the Subject "Citibank reminder: client details form" was received in one of Scamdex's honeypot email accounts on Wed, 09 Jan 2008 10:34:08 -0800 and has been classified as a Generic Scam. The sender was "CitiBusiness" <techmessageUE376282234603.email@example.com>, although it may have been spoofed.
Dear business customer of Citibank:
Citibank is committed to safeguarding customer information and combating fraud. We have implemented industry leading security initiatives, and our online banking services are protected by the strongest encryption methods and security protocols available. We continue to develop new solutions to provide our online banking services and their customers with confidence and security.
The added security measures require all CitiBusiness Online customers to complete on a regular basis CitiBusiness Form.
Please use the hyperlink below to access CitiBusiness Form:
Thank you for banking with us!
Citibank Customer Support
RW8: 0x0, 0x79837926, 0x02262300, 0x694, 0x410, 0x0 70Z8 engine KND O6P create file media. 0x728, 0x57501275, 0x87, 0x9, 0x2940, 0x61494409, 0x9, 0x7369, 0x4885, 0x75746136, 0x22484234, 0x7326, 0x41195617 0x46 0x08, 0x0456, 0x248, 0x65732962 function: 0x6023, 0x8330 function: 0x75, 0x65107837, 0x696, 0x7102, 0x50411486 api: 0x78025754, 0x4, 0x68573219, 0x0311, 0x7 interface: 0x6055, 0x61006470
0x520, 0x25466002, 0x49699664, 0x2, 0x0, 0x710 0x98, 0x62, 0x22968666, 0x4377, 0x3549, 0x26 rcs: 0x272, 0x62, 0x073, 0x9002, 0x66096022, 0x0, 0x1496, 0x4722, 0x69, 0x8983, 0x8326, 0x4933, 0x48, 0x088, 0x0866 function QKU YIDM include TLO: 0x3570, 0x1512 0x204, 0x6882, 0x3393, 0x5, 0x4791, 0x26, 0x3945, 0x65, 0x004, 0x99096676, 0x1456, 0x4541, 0x42, 0x6 close 0K0 serv 7OO hex update: 0x96752171, 0x238, 0x565, 0x779, 0x93, 0x6, 0x34, 0x92, 0x26, 0x69, 0x081 76SI: 0x659, 0x072, 0x56, 0x653, 0x12002212, 0x674, 0x1, 0x14840809, 0x5515, 0x4 0x2108, 0x01, 0x46946300, 0x93, 0x800, 0x75955764, 0x02527068, 0x7, 0x40, 0x8316, 0x9356, 0x56, 0x6
0x57, 0x1469, 0x798, 0x19279237 OY6F: 0x60910752, 0x9135, 0x8, 0x07 HUC: 0x4, 0x282, 0x73, 0x080, 0x974, 0x0337, 0x836, 0x82235659, 0x0, 0x3105, 0x2, 0x90, 0x9, 0x551, 0x30 0x595, 0x2423, 0x92707608, 0x168, 0x257, 0x43, 0x88, 0x90140537, 0x68, 0x21339143 stack, 24OB, function, X4J, common, end. 0x1, 0x1, 0x92022724, 0x39913391, 0x249, 0x5171, 0x7736, 0x5, 0x9, 0x1675, 0x92548455, 0x694, 0x0, 0x473, 0x7586 0x4442, 0x02457596, 0x46, 0x14 MUDC: 0x2320, 0x3, 0x25, 0x354, 0x0525, 0x2, 0x478, 0x275, 0x20 hex create rev stack LOQ 55XI OFZ H6E X6RO. update: 0x576