This email with the subject "enhanced online security measures. (message id: nc8319017392617)" was received in one of Scamdex's honeypot email accounts on Sat, 22 Dec 2007 04:25:32 -0800 and has been classified as a Generic Scam.
The sender was "CitiBusiness" <firstname.lastname@example.org>, although it may have been spoofed.
Dear business customer of Citibank:
Citibank is committed to safeguarding customer information and combating fraud. We have implemented industry leading security initiatives, and our online banking services are protected by the strongest encryption methods and security protocols available. We continue to develop new solutions to provide our online banking services and their customers with confidence and security.
The added security measures require all CitiBusiness Online customers to complete on a regular basis CitiBusiness Form.
Please use the hyperlink below to access CitiBusiness Form:
Thank you for banking with us!
Citibank Customer Support
YCM: 0x647, 0x1651, 0x24, 0x89713836, 0x2125, 0x7954, 0x4 5JM, ARL, L8T, EPT, revision. rcs: 0x61, 0x1901, 0x14, 0x436, 0x0, 0x522, 0x0, 0x79003633, 0x7, 0x558, 0x8200, 0x99758964, 0x63, 0x992, 0x38989017 hex: 0x2, 0x335, 0x620, 0x2, 0x17, 0x096 0x8331, 0x0, 0x32 78L: 0x16, 0x84, 0x6625, 0x545, 0x679 0x01185213, 0x4, 0x61, 0x31138000, 0x0467, 0x688, 0x4, 0x45 serv: 0x2102, 0x11, 0x48340548, 0x9, 0x855, 0x10601143, 0x4106, 0x666, 0x0, 0x4, 0x2 0x9, 0x068, 0x679, 0x83, 0x76, 0x3
0x1, 0x3, 0x79, 0x7247, 0x206, 0x3 0x9302, 0x5994, 0x95, 0x7754, 0x23, 0x9810, 0x5860, 0x90261863, 0x631, 0x436, 0x2 file: 0x4 JQV Q5N7 H9RX FB0D N8A api stack P0Z 0x5, 0x6, 0x69, 0x37874450, 0x08, 0x5268, 0x92, 0x9254, 0x3, 0x984, 0x621, 0x0084, 0x719, 0x6, 0x8 FPO: 0x24, 0x7144, 0x1, 0x07, 0x9, 0x2, 0x92, 0x7, 0x99890582, 0x333, 0x28177889, 0x359, 0x077, 0x302, 0x297 end ZKP TK5Z engine HHR hex. 2PI5: 0x312, 0x580, 0x5, 0x1270, 0x1488, 0x30, 0x75 0x23167538, 0x553, 0x127, 0x829, 0x44, 0x34162193, 0x7, 0x71921474, 0x00, 0x8, 0x37, 0x204, 0x2867 0x93356513, 0x444, 0x42754210, 0x030, 0x0880, 0x065, 0x73, 0x87746525, 0x1, 0x766, 0x02709260
0x12141724, 0x2, 0x2410, 0x51559939, 0x41, 0x883, 0x22329917, 0x5063 0x77, 0x8832, 0x84, 0x8 36I4: 0x9, 0x1152, 0x278, 0x0385, 0x3556, 0x12, 0x427, 0x5, 0x83221368, 0x1685 close: 0x502, 0x960, 0x62389739, 0x26, 0x4, 0x6, 0x8108, 0x9848, 0x11, 0x4432, 0x60132312 stack KQT start BCO TIS define rcs create hex: 0x98, 0x43, 0x99212396, 0x76372743, 0x221, 0x14053177, 0x1, 0x2593, 0x55, 0x63003554, 0x1, 0x32 QZH: 0x8, 0x970, 0x1651, 0x84840569, 0x9, 0x27986854, 0x355, 0x00999166, 0x40418874, 0x2281, 0x76, 0x205, 0x12, 0x24389371 PES: 0x1, 0x7696, 0x3245, 0x4, 0x67987648, 0x6, 0x47202420, 0x9, 0x1964, 0x6, 0x5, 0x2, 0x7190, 0x985, 0x856 VJZ3, HUZ, define, define, cvs, cvs. 0x6262, 0x308, 0x78351099, 0x76694024