An Email with the Subject "Please confirm your data!" was received in one of Scamdex's honeypot email accounts on Fri, 23 Nov 2007 04:06:44 -0800 and has been classified as a Generic Scam Email. The sender shows as "Citizens Bank" <cservice.refQ40118712466ZW.gps@citizensbank.com>.
The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be added to their email address lists for spam purposes.
Dear business/corporate customer of Citizens Bank, Caution: we continue to be informed that customers and non-customers are receiving fraudulent phishing emails requesting confidential information and credentials. As a reminder, the bank will NOT send customers unsecured email or other correspondence requesting that they confirm or provide Customer ID's User ID's, card numbers, social security number or PINs and passwords. As always, if you receive any unsolicited e-mails, phone calls, faxes or other suspicious attempts to gain personal or confidential information, please e-mail us at fraudprevention@cfgcustomers.com or call Cash Management Client Services at 1-877-550-5933, Monday to Friday, 7 a.m. to 6 p.m. ET. For Additional information please see the events page For security measures, we require you to confirm your challenge questions: Sincerely, |
function: 0x0872, 0x374, 0x608, 0x7150, 0x2820, 0x86623776, 0x07, 0x47, 0x4868 type api QILE 0x68371526, 0x023, 0x86, 0x3, 0x2, 0x2342, 0x9, 0x3485, 0x75237929, 0x5038, 0x4068 serv: 0x9820, 0x23491145, 0x6641, 0x66, 0x3, 0x5381, 0x3459, 0x3634, 0x27809413 start: 0x5781, 0x22187520 QBT0: 0x09420836, 0x79, 0x14, 0x4 X3C2: 0x895, 0x8, 0x92, 0x4192, 0x22612297, 0x326, 0x1, 0x589, 0x68, 0x785, 0x73174817 rcs: 0x45946193, 0x52, 0x122, 0x35229166 0x6, 0x214, 0x6231, 0x35, 0x5105, 0x1779, 0x6, 0x501, 0x500, 0x6371, 0x86944941, 0x3290 0x02548929, 0x51135360, 0x6110, 0x81, 0x98, 0x09684778, 0x91, 0x32, 0x00, 0x2255, 0x90712588, 0x9, 0x54242158, 0x7344 0x9, 0x8, 0x2, 0x4774, 0x66, 0x6651, 0x70 0x8, 0x34756529, 0x7654, 0x9197, 0x1393, 0x5, 0x8, 0x7, 0x7943, 0x9, 0x207, 0x312, 0x89765248 start, LE9C, P2UM, function, DAU, T9L, close, 3Z6. 0x1938, 0x7, 0x97929444, 0x4332, 0x21873272, 0x302, 0x7, 0x66 hex: 0x0675, 0x62, 0x0, 0x23, 0x24453572, 0x321 tmp, ZZ7, 18M, root, type create: 0x170, 0x471, 0x89510468, 0x45967869, 0x25, 0x0, 0x13717640, 0x46840987, 0x20768322, 0x8, 0x328, 0x2, 0x9838, 0x67, 0x44 0x6, 0x175, 0x49522049, 0x29 source: 0x4, 0x548, 0x4989, 0x4, 0x3, 0x9 hex: 0x3583, 0x64404154, 0x42, 0x41, 0x2, 0x4569, 0x8, 0x76, 0x81871093, 0x71275733, 0x25, 0x70, 0x0 0x7, 0x19, 0x4, 0x02, 0x31, 0x01, 0x21635830, 0x3, 0x81, 0x44, 0x27520227, 0x356, 0x5682, 0x40230045 engine: 0x81470772, 0x3787, 0x9, 0x4503 7MP: 0x9, 0x74122768, 0x5, 0x769, 0x281, 0x960, 0x783, 0x51333305, 0x599 cvs D6TE.JVT: 0x4887, 0x1238, 0x53, 0x4, 0x39880753, 0x6 0x93, 0x94, 0x827, 0x0628 446: 0x7835, 0x3, 0x7, 0x1093, 0x0, 0x5392, 0x51, 0x84, 0x6666, 0x513, 0x70 T3TO, stack BOJ, engine file: 0x44, 0x9411, 0x94981424, 0x829, 0x314, 0x8035, 0x87525635 |
Dear business/corporate customer of Citizens Bank,
Caution: we continue to be informed that customers and non-customers are receiving fraudulent phishing emails requesting confidential information and credentials. As a reminder, the bank will NOT send customers unsecured email or other correspondence requesting that they confirm or provide Customer ID's User ID's, card numbers, social security number or PINs and passwords. As always, if you receive any unsolicited e-mails, phone calls, faxes or other suspicious attempts to gain personal or confidential information, please e-mail us at fraudprevention@cfgcustomers.com or call Cash Management Client Services at 1-877-550-5933, Monday to Friday, 7 a.m. to 6 p.m. ET. For Additional information please see the events page
For security measures, we require you to confirm your challenge questions:
http://citizensbankmoneymanagergps.com/securepage/challenge.aspx?session=253368103014558248492285712476664052903384282990
Sincerely,
Citizens Bank Online Billing Services Team
function: 0x0872, 0x374, 0x608, 0x7150, 0x2820, 0x86623776, 0x07, 0x47, 0x4868 type api QILE 0x68371526, 0x023, 0x86, 0x3, 0x2, 0x2342, 0x9, 0x3485, 0x75237929, 0x5038, 0x4068 serv: 0x9820, 0x23491145, 0x6641, 0x66, 0x3, 0x5381, 0x3459, 0x3634, 0x27809413 start: 0x5781, 0x22187520 QBT0: 0x09420836, 0x79, 0x14, 0x4 X3C2: 0x895, 0x8, 0x92, 0x4192, 0x22612297, 0x326, 0x1, 0x589, 0x68, 0x785, 0x73174817 rcs: 0x45946193, 0x52, 0x122, 0x35229166 0x6, 0x214, 0x6231, 0x35, 0x5105, 0x1779, 0x6, 0x501, 0x500, 0x6371, 0x86944941, 0x3290
0x02548929, 0x51135360, 0x6110, 0x81, 0x98, 0x09684778, 0x91, 0x32, 0x00, 0x2255, 0x90712588, 0x9, 0x54242158, 0x7344 0x9, 0x8, 0x2, 0x4774, 0x66, 0x6651, 0x70 0x8, 0x34756529, 0x7654, 0x9197, 0x1393, 0x5, 0x8, 0x7, 0x7943, 0x9, 0x207, 0x312, 0x89765248 start, LE9C, P2UM, function, DAU, T9L, close, 3Z6. 0x1938, 0x7, 0x97929444, 0x4332, 0x21873272, 0x302, 0x7, 0x66 hex: 0x0675, 0x62, 0x0, 0x23, 0x24453572, 0x321 tmp, ZZ7, 18M, root, type create: 0x170, 0x471, 0x89510468, 0x45967869, 0x25, 0x0, 0x13717640, 0x46840987, 0x20768322, 0x8, 0x328, 0x2, 0x9838, 0x67, 0x44 0x6, 0x175, 0x49522049, 0x29 source: 0x4, 0x548, 0x4989, 0x4, 0x3, 0x9
hex: 0x3583, 0x64404154, 0x42, 0x41, 0x2, 0x4569, 0x8, 0x76, 0x81871093, 0x71275733, 0x25, 0x70, 0x0 0x7, 0x19, 0x4, 0x02, 0x31, 0x01, 0x21635830, 0x3, 0x81, 0x44, 0x27520227, 0x356, 0x5682, 0x40230045 engine: 0x81470772, 0x3787, 0x9, 0x4503 7MP: 0x9, 0x74122768, 0x5, 0x769, 0x281, 0x960, 0x783, 0x51333305, 0x599 cvs D6TE.JVT: 0x4887, 0x1238, 0x53, 0x4, 0x39880753, 0x6 0x93, 0x94, 0x827, 0x0628 446: 0x7835, 0x3, 0x7, 0x1093, 0x0, 0x5392, 0x51, 0x84, 0x6666, 0x513, 0x70 T3TO, stack BOJ, engine file: 0x44, 0x9411, 0x94981424, 0x829, 0x314, 0x8035, 0x87525635