An
Email with the Subject "Egg Bank: Invalid login attempts on your account" was
received in one of Scamdex's honeypot email accounts on Thu, 03 Jan 2008 03:36:05 -0800
and has been classified as a Generic Scam Email.
The sender shows as Egg Bank <support@egg.com>.
The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in
this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be
added to their email address lists for spam purposes.
Scam TagCloud
banklogincheckaccountcustomeraccesscustombank negg bank egg bank securitydearhttps://new.egg.com/secur...
NO CHART DATA - EMAIL HAS NOT YET BEEN ANALYSED
Scam Email Headers
This a (redacted) view of the raw email headers of this scam email.
Personally Identifiable Information (PII) has been suppressed, but can be
supplied as received to appropriate investigating or law enforcement agencies on request.
EEEEEstdClass Object
(
[return-path:] =>
[envelope-to:] => submissions@scamdex.com
[delivery-date:] => Thu, 03 Jan 2008 03:36:05 -0800
[received:] => Array
(
[0] => from smtpweb101.aruba.it ([62.149.158.101] helo=smtpsmart3.aruba.it)by bartok.o7e.net with smtp (Exim 4.68)(envelope-from )id 1JAOMb-0006eL-Vufor submissions@scamdex.com; Thu, 03 Jan 2008 03:36:05 -0800
[1] => (qmail 14411 invoked by uid 89); 3 Jan 2008 11:35:48 -0000
[2] => by simscan 1.2.0 ppid: 13973, pid: 13988, t: 4.3435s scanners: clamav: 0.88.4/m:40/d:1945 spam: 3.1.4
[3] => from unknown (HELO webs10.aruba.it) (62.149.130.20) by smtpsmart3.fe.aruba.it with SMTP; 3 Jan 2008 11:35:43 -0000
[4] => from webs10 ([127.0.0.1]) by webs10.aruba.it with Microsoft SMTPSVC(6.0.3790.3959); Thu, 3 Jan 2008 12:35:45 +0100
)
[x-spam-checker-version:] => SpamAssassin 3.1.4 (2006-07-25) on smtpsmart3.fe.aruba.it
[x-spam-level:] => ***
[x-spam-status:] => Array
(
[0] => No, score=3.4 required=4.0 tests=HTML_IMAGE_ONLY_12,HTML_MESSAGE,HTML_MIME_NO_HTML_TAG,MIME_HTML_ONLY,SARE_HTML_URI_2SLASH autolearn=disabled version=3.1.4
[1] => No, score=4.7
)
[date:] => Thu, 03 Jan 2008 12:35:45 +0100
[subject:] => Egg Bank: Invalid login attempts on your account
[to:] => submissions@scamdex.com
[from:] => Egg Bank
[reply-to:] => support@egg.com
[mime-version:] => 1.0
[content-type:] => text/html
[content-transfer-encoding:] => 8bit
[x-mailer:] =>
[x-originalarrivaltime:] => 03 Jan 2008 11:35:45.0602 (UTC) FILETIME=[C79B9A20:01C84DFC]
[x-spam-score:] => 47
[x-spam-bar:] => ++++
[x-spam-flag:] => NO
[message-id:] =>
[x-scamdex-scores:] => S:38 P:41 A:44 L:34 E:39 G:34
[x-scamdex-classtype:] => A
[x-scamdex-classscore:] => 44
[x-scamdex-totscore:] => 230
[x-scamdex-kw:] => access,account,bank,check,customer,login,plc
[x-scamdex-em:] => support@egg.com
[x-scamdex-dir:] => P
[x-scamdex-id:] => P1204769177.M543403P20228V
[x-scamdex-copyright:] => This Email is Copyright Scamdex.com 2009, Reproduction Prohibited
)
Domain Names used for collecting scam email ("Honeypot email accounts") have been obscured and replaced with the token 'HUN1P0T'
Community Action - SPAM/non-Scam Report
Occasionally, incorrectly categorized emails get into the Scamdex Scam Email Database and need to be removed. If this
email has Personally Identifiable Information (PII), or is, in your opinion, from a bona-fide entity, let us know.
Scamdex will, as soon as is practicable, take-down any emails that in our opinion should not
be in our database. Note that ALL emails in the Scamdex Scam Email Database were received as Unsolicited Commercial Email, aka UCE or
SPAM, via unpublished 'Honeypot' email addresses.
During our routine check we noticed a log of invalid login attempts on your account. We believe there is a problem. As a preventive measure, we have temporary limited access to sensitive account features.
Please Reconfirm Account Access by clicking the link below:
During our routine check we noticed a log of invalid login attempts on your account. We believe there is a problem. As a preventive measure, we have temporary limited access to sensitive account features.
Please Reconfirm Account Access by clicking the link below: