The Scamdex Scam Email Archive - Generic o

Subject:  Fw: National Westminster Bank United Kingdom New Security Features Activation
From:  "stuart miller" <stuma@hotmail.co.uk>
Date:  Thu, 17 Jan 2008 02:35:18 -0800

A Scam Email with the Subject "Fw: National Westminster Bank United Kingdom New Security Features Activation" was received in one of Scamdex's honeypot email accounts on Thu, 17 Jan 2008 02:35:18 -0800 and has been classified as a Generic Scam. The sender was "stuart miller" <stuma@hotmail.co.uk>, although it may have been spoofed.

 

Sent: Wednesday, January 16, 2008 4:14 PM
Subject: National Westminster Bank United Kingdom New Security Features Activation

Dear Natwest OnLine Banking user!

Our Technical Division is running an arranged Digital Banking Service update

By following the link below you will launch the procedure of the customer details authorization:

http://www8.natwest.co.uk/default.aspx?token=19envbcDwhnbczyOkhOvp

These directions are to be sent and followed by all members of the National Westminster Bank OnLine Banking

Natwest does apologize for any inconveniences caused, and is very grateful for your cooperation.

If you are not user of National Westminster Bank Direct and Digital Banking please ignore this notice!

*** This is automatically generated e-mail please do not respond ***

(C) 2007 National Westminster Bank Internet Banking. All Rights Reserved.


Since you’re here …
we have a small favour to ask. More people are visting Scamdex and Scamalot than ever but advertising revenues are falling fast and we have no 'product' to sell. And unlike many informational websites, we haven’t put up a paywall or membership barrier – we want to keep our site as open as we can. So you can see why we need to ask for your help. Scamdex/Scamalot websites takes a lot of time, money and hard work to keep running. We do this because we hate to see our fellow humans getting scammed out of their hard-earned money by low-lives.
Consider switching off your AdBlocker (if you use one) or contributing directly by one of the links below. Thank you for reading!