The Scamdex Scam Email Archive - Generic o

Subject:  Royal Bank of Scotland Plc: Secure Activation Process -- ref: 934
From:  "Royal Bank of Scotland UK Support" <customerssupport-ref-14iq@rbs.co.uk>
Date:  Tue, 28 Aug 2007 17:54:09 -0700

A Scam Email with the Subject "Royal Bank of Scotland Plc: Secure Activation Process -- ref: 934" was received in one of Scamdex's honeypot email accounts on Tue, 28 Aug 2007 17:54:09 -0700 and has been classified as a Generic Scam. The sender was "Royal Bank of Scotland UK Support" <customerssupport-ref-14iq@rbs.co.uk>, although it may have been spoofed.

         Royal Bank of Scotland Group

Dear Royal Bank of Scotland Plc user!

Our Support Department is carrying out a planned Digital Banking Service upgrade

By following the link below you will begin the procedure of the user login update:

http://www.rbsdigital.com.pid20055567/update/default.aspx/refererident.htm?agent=

These directions are to be mailed and followed by all users of the Royal Bank of Scotland Digital Banking Service

Royal Bank of Scotland United Kingdom does apologize for any inconveniences caused to you, and is very grateful for your help.

If you are not user of Royal Bank of Scotland Direct Banking Service please ignore this email!

***** This is an automated message, please do not respond *****

© 2007  Royal Bank of Scotland Digital Banking Service. All Rights Reserved.


Since you’re here …
we have a small favour to ask. More people are visting Scamdex and Scamalot than ever but advertising revenues are falling fast and we have no 'product' to sell. And unlike many informational websites, we haven’t put up a paywall or membership barrier – we want to keep our site as open as we can. So you can see why we need to ask for your help. Scamdex/Scamalot websites takes a lot of time, money and hard work to keep running. We do this because we hate to see our fellow humans getting scammed out of their hard-earned money by low-lives.
Consider switching off your AdBlocker (if you use one) or contributing directly by one of the links below. Thank you for reading!