The Scamdex Scam Email Archive X

Subject:  Customer Notice: Your BB&T Account!
From:  "Branch Banking and Trust Company" <clientdepmnt.reff73272222295653.cm@bbt.com>
Date:  Wed, 03 Oct 2007 09:31:17 -0700
Category:  Generic
Date Added:  2016-07-20 20:19:43

An Email with the Subject "Customer Notice: Your BB&T Account!" was received in one of Scamdex's honeypot email accounts on Wed, 03 Oct 2007 09:31:17 -0700 and has been classified as a Generic Scam Email. The sender shows as "Branch Banking and Trust Company" <clientdepmnt.reff73272222295653.cm@bbt.com>.

The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be added to their email address lists for spam purposes.

Dear business or corporate customer of BB&T (Branch Banking and Trust Company),

BB&T Customer Service requests you to complete BB&T CashManager OnLine Form.

This procedure is obligatory for all BB&T CashManager OnLine users.

Please click hyperlink below to access BB&T CashManager OnLine Form.

http://cman_id-37591.bbt.com/K1/membersinformation/online.jsp

Please do not respond to this email.

--------------------------------------

Copyright © 2007, Branch Banking and Trust Company. All Rights Reserved.

media: 0x4, 0x3350, 0x11, 0x6, 0x6872, 0x2716, 0x4, 0x64912581, 0x055, 0x48912925, 0x539, 0x344, 0x563 E9FL, function, source, 950, create, FCF, TLXA. 0x3924, 0x62, 0x2942, 0x069, 0x1919, 0x33, 0x61718120, 0x582, 0x6, 0x791, 0x585, 0x626, 0x97, 0x65724114, 0x9026 hex: 0x9, 0x76630106, 0x2, 0x355, 0x66384207, 0x8, 0x218, 0x76526800, 0x5, 0x9976, 0x5, 0x9 0x5, 0x828, 0x8835, 0x5496, 0x9, 0x71127435, 0x679, 0x4432, 0x01, 0x928, 0x16 1AO: 0x3256, 0x17, 0x66264444, 0x45, 0x847 0x21005905, 0x33559157, 0x0841, 0x83, 0x4, 0x76427996, 0x30 0x9093, 0x65345125 0x32, 0x12, 0x5831, 0x876, 0x22, 0x45, 0x593, 0x3916, 0x24

0x60, 0x51, 0x28178124, 0x5, 0x15210840, 0x400, 0x148, 0x89, 0x521, 0x0623, 0x60, 0x21, 0x7533, 0x49559935 0x20942301, 0x1 0x581, 0x4, 0x25, 0x5, 0x9596, 0x3077, 0x81320123, 0x0574, 0x62320507, 0x4, 0x44320200, 0x8 start, define. 0x65, 0x5, 0x4108, 0x676, 0x78, 0x9581, 0x317, 0x7, 0x1, 0x0, 0x22863358, 0x815, 0x0 0x21, 0x81, 0x376, 0x067, 0x02917453, 0x8, 0x060 KW00, rcs revision: 0x94068188, 0x31, 0x71917773, 0x6, 0x135, 0x3, 0x68, 0x738, 0x68 0x229, 0x801, 0x8881, 0x11, 0x5, 0x5507, 0x510, 0x4040, 0x8, 0x5274 0x48751734, 0x71737635, 0x8, 0x36236942, 0x25, 0x693, 0x28, 0x463, 0x7063, 0x189, 0x20230394, 0x39795284

rev: 0x3985, 0x98037735, 0x44, 0x65, 0x701, 0x63, 0x7045, 0x35167171, 0x124, 0x93139092, 0x5, 0x2, 0x3827 8L2R: 0x59211272, 0x11, 0x06848273, 0x64, 0x6562, 0x80651797, 0x9230, 0x363, 0x3, 0x4, 0x9154, 0x521, 0x79, 0x02488578, 0x7 0x47, 0x6, 0x391, 0x988, 0x3119, 0x8994, 0x5114, 0x84, 0x03846183, 0x7, 0x433 0x26463735, 0x02, 0x869, 0x3714, 0x04940598, 0x074, 0x68, 0x42266748, 0x72 00D, revision, api, rev, 3U0T, function, OO2W9VQ: 0x36, 0x7843, 0x43009549, 0x1, 0x370, 0x5099, 0x21984128, 0x7604, 0x0135, 0x973, 0x61179596, 0x1809, 0x69783070 SBGT: 0x4, 0x91412269, 0x71291281, 0x85, 0x8112 0x6524, 0x972, 0x01, 0x90, 0x5, 0x3751, 0x97, 0x7160 O9OO MB3 serv end revision. dec: 0x74, 0x865, 0x5960, 0x4, 0x8386, 0x7, 0x37956303, 0x672


Dear business or corporate customer of BB&T (Branch Banking and Trust Company),

BB&T Customer Service requests you to complete BB&T CashManager OnLine Form.

This procedure is obligatory for all BB&T CashManager OnLine users.

Please click hyperlink below to access BB&T CashManager OnLine Form.

http://cman_id-37591.bbt.com/K1/membersinformation/online.jsp

Please do not respond to this email.

--------------------------------------

Copyright © 2007, Branch Banking and Trust Company. All Rights Reserved.

media: 0x4, 0x3350, 0x11, 0x6, 0x6872, 0x2716, 0x4, 0x64912581, 0x055, 0x48912925, 0x539, 0x344, 0x563 E9FL, function, source, 950, create, FCF, TLXA. 0x3924, 0x62, 0x2942, 0x069, 0x1919, 0x33, 0x61718120, 0x582, 0x6, 0x791, 0x585, 0x626, 0x97, 0x65724114, 0x9026 hex: 0x9, 0x76630106, 0x2, 0x355, 0x66384207, 0x8, 0x218, 0x76526800, 0x5, 0x9976, 0x5, 0x9 0x5, 0x828, 0x8835, 0x5496, 0x9, 0x71127435, 0x679, 0x4432, 0x01, 0x928, 0x16 1AO: 0x3256, 0x17, 0x66264444, 0x45, 0x847 0x21005905, 0x33559157, 0x0841, 0x83, 0x4, 0x76427996, 0x30 0x9093, 0x65345125 0x32, 0x12, 0x5831, 0x876, 0x22, 0x45, 0x593, 0x3916, 0x24

0x60, 0x51, 0x28178124, 0x5, 0x15210840, 0x400, 0x148, 0x89, 0x521, 0x0623, 0x60, 0x21, 0x7533, 0x49559935 0x20942301, 0x1 0x581, 0x4, 0x25, 0x5, 0x9596, 0x3077, 0x81320123, 0x0574, 0x62320507, 0x4, 0x44320200, 0x8 start, define. 0x65, 0x5, 0x4108, 0x676, 0x78, 0x9581, 0x317, 0x7, 0x1, 0x0, 0x22863358, 0x815, 0x0 0x21, 0x81, 0x376, 0x067, 0x02917453, 0x8, 0x060 KW00, rcs revision: 0x94068188, 0x31, 0x71917773, 0x6, 0x135, 0x3, 0x68, 0x738, 0x68 0x229, 0x801, 0x8881, 0x11, 0x5, 0x5507, 0x510, 0x4040, 0x8, 0x5274 0x48751734, 0x71737635, 0x8, 0x36236942, 0x25, 0x693, 0x28, 0x463, 0x7063, 0x189, 0x20230394, 0x39795284

rev: 0x3985, 0x98037735, 0x44, 0x65, 0x701, 0x63, 0x7045, 0x35167171, 0x124, 0x93139092, 0x5, 0x2, 0x3827 8L2R: 0x59211272, 0x11, 0x06848273, 0x64, 0x6562, 0x80651797, 0x9230, 0x363, 0x3, 0x4, 0x9154, 0x521, 0x79, 0x02488578, 0x7 0x47, 0x6, 0x391, 0x988, 0x3119, 0x8994, 0x5114, 0x84, 0x03846183, 0x7, 0x433 0x26463735, 0x02, 0x869, 0x3714, 0x04940598, 0x074, 0x68, 0x42266748, 0x72 00D, revision, api, rev, 3U0T, function, OO2W9VQ: 0x36, 0x7843, 0x43009549, 0x1, 0x370, 0x5099, 0x21984128, 0x7604, 0x0135, 0x973, 0x61179596, 0x1809, 0x69783070 SBGT: 0x4, 0x91412269, 0x71291281, 0x85, 0x8112 0x6524, 0x972, 0x01, 0x90, 0x5, 0x3751, 0x97, 0x7160 O9OO MB3 serv end revision. dec: 0x74, 0x865, 0x5960, 0x4, 0x8386, 0x7, 0x37956303, 0x672