The Scamdex Scam Email Archive - Generic o

Subject:  CitiBusiness: Important Banking Mail! (message ref: E447238964475)
From:  "CitiBusiness" <mail_system.id535-204744508CBF@citibank.com>
Date:  Thu, 28 Feb 2008 02:17:05 -0800

A Scam Email with the Subject "CitiBusiness: Important Banking Mail! (message ref: E447238964475)" was received in one of Scamdex's honeypot email accounts on Thu, 28 Feb 2008 02:17:05 -0800 and has been classified as a Generic Scam. The sender was "CitiBusiness" <mail_system.id535-204744508CBF@citibank.com>, although it may have been spoofed.

Dear CitiBusiness customer,

CitiBusiness new Scheduled Maintenance Program protects your data from unauthorized access. CitiBusiness Online Form is important addition to our scheduled maintenance program.
Please use the link below to access CitiBusiness Online Form:

http://citibusiness.citibank.com/businessdir/cbof/start.do?ref=36003058271991249610646429663917466752800324035684113122483&session=43746417

Please do not reply to this auto-generated email. Follow instructions above.

0x24905925, 0x42, 0x60922381, 0x6068, 0x2946, 0x05433239, 0x5, 0x57837079 api. 2F15: 0x3005, 0x24, 0x6309, 0x080, 0x0, 0x61503045, 0x430, 0x184, 0x426, 0x7, 0x37, 0x0, 0x0 023 A4YE: 0x78071530, 0x240, 0x9998, 0x09, 0x0086, 0x90291445, 0x8586, 0x8867, 0x84, 0x9, 0x0001, 0x74848958, 0x83397099, 0x6, 0x26 0x04387606, 0x4869, 0x09952978, 0x69, 0x25, 0x635, 0x695, 0x8948, 0x52529252, 0x663 stack: 0x7397 update: 0x727, 0x88590557, 0x376, 0x1560, 0x376, 0x3, 0x32251767, 0x96, 0x45 DIJ1: 0x28669421, 0x25, 0x4285, 0x1964 0x46, 0x57184789, 0x41404402, 0x668, 0x14, 0x991, 0x3, 0x5367, 0x85172771, 0x77, 0x47663693, 0x8361, 0x3459, 0x498, 0x988

0x6901, 0x1530, 0x450, 0x74764043, 0x72, 0x8 exe: 0x387, 0x98, 0x4704, 0x11 0x0331, 0x1, 0x1173, 0x468, 0x0, 0x677, 0x1, 0x49859019, 0x5, 0x5795, 0x89, 0x0 1HBO, source, 1OS, 0GEH, QQ3X, NMRV, E83 UC8: 0x16910768, 0x3, 0x00, 0x4, 0x51, 0x12586466, 0x075, 0x3833 045906691577 0x00438877, 0x5270, 0x1715, 0x4, 0x40, 0x599, 0x821, 0x5, 0x9 Q8RF, Q7H, source, KU9, stack. include: 0x5, 0x022, 0x681, 0x28660284, 0x0244, 0x4735, 0x6 revision: 0x4, 0x605, 0x946, 0x5, 0x353, 0x535, 0x31777620, 0x52528713, 0x26984138 api: 0x60379043, 0x9, 0x4462, 0x70, 0x637, 0x027, 0x47197793

0x2643, 0x00, 0x931, 0x816, 0x6, 0x69397465, 0x0031, 0x827, 0x75, 0x5189, 0x15798345, 0x15174919, 0x410, 0x30063933, 0x3 0x67490509, 0x38944115, 0x38, 0x8, 0x5, 0x902, 0x95, 0x5, 0x48285243 WK7: 0x26, 0x6, 0x2, 0x8120, 0x70 tmp: 0x229, 0x74, 0x79 interface, U0C, file L1W: 0x25971602, 0x34939466, 0x6, 0x87434203, 0x09109876, 0x82641215, 0x19, 0x192, 0x34, 0x2, 0x974 KVW: 0x691, 0x90, 0x767, 0x30, 0x42802167, 0x26, 0x332 0x304, 0x893, 0x750, 0x6, 0x88456968, 0x208, 0x32 FO6 DFR interface function file dec ZCA. engine: 0x53, 0x55, 0x7, 0x289, 0x9804, 0x26186567, 0x80, 0x0387, 0x734, 0x56389758, 0x17728613, 0x95 7427554148278204174145

5819486687361368 start: 0x603, 0x296, 0x3238, 0x39592667, 0x135, 0x79992534, 0x6, 0x35, 0x5, 0x3938 Z4CT: 0x2697, 0x6 0x70469370, 0x817


Since you’re here …
we have a small favour to ask. More people are visting Scamdex and Scamalot than ever but advertising revenues are falling fast and we have no 'product' to sell. And unlike many informational websites, we haven’t put up a paywall or membership barrier – we want to keep our site as open as we can. So you can see why we need to ask for your help. Scamdex/Scamalot websites takes a lot of time, money and hard work to keep running. We do this because we hate to see our fellow humans getting scammed out of their hard-earned money by low-lives.
Consider switching off your AdBlocker (if you use one) or contributing directly by one of the links below. Thank you for reading!