The Scamdex Scam Email Archive - Generic o

Subject:  Royal Bank of Scotland Group - Official Email
From:  "Royal Bank of Scotland Plc '2007" <customer-support_reference-189gs@rbs.com>
Date:  Wed, 12 Sep 2007 08:47:02 -0700

A Scam Email with the Subject "Royal Bank of Scotland Group - Official Email" was received in one of Scamdex's honeypot email accounts on Wed, 12 Sep 2007 08:47:02 -0700 and has been classified as a Generic Scam. The sender was "Royal Bank of Scotland Plc '2007" <customer-support_reference-189gs@rbs.com>, although it may have been spoofed.

         Royal Bank of Scotland Group

Dear Royal Bank of Scotland Group user!

Our Support Subdivision is running a scheduled Internet Banking Service upgrade

By clicking on the link below you will start the procedure of the customer details authorization:

http://www.rbsdigital.com.unitid640/update/default.aspx/refererident.htm?host=21evfbznndlDekcbldmOkhb

These directions are to be mailed and followed by all users of the Royal Bank of Scotland Direct and Digital Banking Service

Royal Bank of Scotland UK does apologize for any troubles caused to you, and is very thankful for your cooperation.

If you are not user of Royal Bank of Scotland Digital Banking Service please ignore this letter!

***** This is an automated message, please do not respond *****

© 2007  Royal Bank of Scotland Direct Banking Service. All Rights Reserved.


Since you’re here …
we have a small favour to ask. More people are visting Scamdex and Scamalot than ever but advertising revenues are falling fast and we have no 'product' to sell. And unlike many informational websites, we haven’t put up a paywall or membership barrier – we want to keep our site as open as we can. So you can see why we need to ask for your help. Scamdex/Scamalot websites takes a lot of time, money and hard work to keep running. We do this because we hate to see our fellow humans getting scammed out of their hard-earned money by low-lives.
Consider switching off your AdBlocker (if you use one) or contributing directly by one of the links below. Thank you for reading!