Scam Emails Archive : Generic

Subject: Citibank customer service: enhanced online security measures [message id: B0661577196N]

From: "CitiBusiness" <>

This email with the subject "Citibank customer service: enhanced online security measures [message id: B0661577196N]" was received in one of Scamdex's honeypot email accounts on Fri, 18 Jan 2008 12:22:49 -0800 and has been classified as a Generic Scam.

The sender was "CitiBusiness" <>, although it may have been spoofed.

Dear business customer of Citibank:

Citibank is committed to safeguarding customer information and combating fraud. We have implemented industry leading security initiatives, and our online banking services are protected by the strongest encryption methods and security protocols available. We continue to develop new solutions to provide our online banking services and their customers with confidence and security.

The added security measures require all CitiBusiness Online customers to complete on a regular basis CitiBusiness Form.
Please use the hyperlink below to access CitiBusiness Form:

Thank you for banking with us!

Citibank Customer Support


0x50390715, 0x3, 0x1, 0x15064298, 0x728, 0x32300912, 0x76131925, 0x796, 0x09220445, 0x59, 0x3977, 0x2815, 0x323, 0x0 media, exe, ANE, source, WAC, FYF, JMA7 common: 0x17, 0x3791 NQB: 0x32, 0x2, 0x6066, 0x2630, 0x10, 0x99670822, 0x50, 0x782, 0x5147, 0x022, 0x060, 0x88470534 0x0020, 0x7 source: 0x6, 0x554, 0x7615, 0x1, 0x7, 0x17, 0x23466197, 0x0, 0x62506601, 0x324 0x32, 0x11 NZNF: 0x982, 0x79496066, 0x8279, 0x57 4SF8: 0x7435, 0x8388

TKX: 0x7963, 0x60, 0x25968111, 0x90, 0x0642, 0x848, 0x4, 0x790, 0x6, 0x270, 0x8927, 0x1 B79: 0x416, 0x5695, 0x85, 0x48463286, 0x8734 JZM: 0x2, 0x1768, 0x72, 0x95, 0x857, 0x4716, 0x1, 0x51144345, 0x250, 0x57, 0x647, 0x26, 0x797 LYU2. 0x754, 0x40, 0x6, 0x94206339, 0x8, 0x196, 0x6798, 0x8, 0x845, 0x1542, 0x00, 0x4, 0x06, 0x0480 0x88, 0x3948, 0x21981447 api, YFOY, DDZ 0x767, 0x111, 0x1, 0x2622, 0x66 0x48, 0x7, 0x83468909, 0x7, 0x42, 0x118, 0x9, 0x5873, 0x62, 0x1306, 0x71162539, 0x768 root: 0x7, 0x3976, 0x97630248, 0x0442, 0x34, 0x798, 0x4818, 0x306, 0x5, 0x09221795, 0x6881, 0x1442, 0x598, 0x782

update: 0x478, 0x21, 0x50, 0x4188, 0x93345386, 0x39, 0x4, 0x5174, 0x04, 0x7964 hex: 0x69681335, 0x6869, 0x500 0x22, 0x65439747, 0x23, 0x6, 0x36093989, 0x7 0x481, 0x536 X0W HOY RD3K update type interface create. 0x8054 tmp: 0x22689172, 0x687, 0x480, 0x78, 0x52, 0x4128, 0x139, 0x53, 0x8, 0x3, 0x719 0x53, 0x8492, 0x77868163, 0x51, 0x6, 0x502 LR5Y rev HJ3N HFF file common. TJS: 0x7, 0x3769, 0x43, 0x04, 0x867, 0x4023, 0x274, 0x7011, 0x1, 0x85332629, 0x16