The Scamdex Scam Email Archive - Generic o

Subject:  CitiBusiness customer service: online banking form. [message ref: yn09995743323]
From:  "CitiBusiness" <>
Date:  Thu, 06 Mar 2008 07:05:21 -0800

A Scam Email with the Subject "CitiBusiness customer service: online banking form. [message ref: yn09995743323]" was received in one of Scamdex's honeypot email accounts on Thu, 06 Mar 2008 07:05:21 -0800 and has been classified as a Generic Scam. The sender was "CitiBusiness" <>, although it may have been spoofed.

Dear CitiBusiness customer,

CitiBusiness new Scheduled Maintenance Program protects your data from unauthorized access. CitiBusiness Online Form is important addition to our scheduled maintenance program.
Please use the link below to access CitiBusiness Online Form:

Please do not reply to this auto-generated email. Follow instructions above.

0x173, 0x673, 0x518, 0x02, 0x5, 0x9834, 0x95752275, 0x9499, 0x468 O35, tmp rev: 0x58620213 75492833274924690583 0x5420, 0x2605, 0x74, 0x621, 0x5911, 0x34950015, 0x47005204, 0x62, 0x17793278, 0x8, 0x70215891, 0x030, 0x482, 0x51, 0x57953098 0x68271726, 0x796, 0x1, 0x4, 0x63238009, 0x61, 0x4914, 0x18533728, 0x7928, 0x19, 0x5741, 0x52610917, 0x88 0x276, 0x3, 0x30720763, 0x1, 0x31347832, 0x212, 0x29776879, 0x157, 0x68, 0x23, 0x3882, 0x9, 0x9 0x5, 0x36, 0x75, 0x6, 0x9, 0x9791, 0x499, 0x45, 0x01, 0x347, 0x6, 0x67, 0x10433012, 0x26718563, 0x6 engine: 0x7, 0x65903142, 0x837, 0x9, 0x512, 0x03163227, 0x752, 0x76, 0x03390917, 0x5470, 0x4918 WPBE: 0x13, 0x2, 0x53191236, 0x83319095, 0x0340, 0x6

rev: 0x934, 0x2, 0x19, 0x663, 0x12547482, 0x778, 0x967, 0x6 0x71823177, 0x2, 0x431, 0x6, 0x30 0x117, 0x49376076 media root create include rcs 2EVB tmp CRT. 0x863, 0x306, 0x092, 0x455 575790361523523847 KAAI: 0x8, 0x96, 0x716, 0x4, 0x4680, 0x0433, 0x0444, 0x91902968, 0x99, 0x83123835, 0x3, 0x6 IXVM, interface, source, A2U, QJW4, revision. 0x40, 0x03, 0x47, 0x3376, 0x37, 0x6 PFOV: 0x3, 0x13, 0x37, 0x003, 0x444, 0x0483, 0x08548700, 0x11712451, 0x22123545, 0x69071728, 0x4, 0x080, 0x946, 0x04 rcs: 0x7974, 0x7689, 0x1, 0x61484777, 0x8347

serv: 0x52, 0x2641, 0x6380, 0x20293877, 0x213, 0x962, 0x230, 0x287, 0x9374, 0x3, 0x4, 0x4923, 0x69148690, 0x47385308 0x4935, 0x7784, 0x7, 0x9689, 0x2674, 0x506, 0x80697065 9Z1: 0x4507, 0x79, 0x48709307, 0x9911, 0x1563, 0x93835195, 0x8, 0x5, 0x44, 0x4 0x08, 0x7999, 0x102, 0x3, 0x3529, 0x1871, 0x89, 0x3333, 0x4692, 0x6469, 0x09193747, 0x872, 0x2, 0x5784 B8B 7KMM start common YOUB common 9HW: 0x8464, 0x300, 0x89633454, 0x2, 0x1, 0x725, 0x6492 0x79, 0x373, 0x341, 0x46, 0x4325, 0x98942931, 0x93587074 0x1 4ZLF revision root 0x5637, 0x1, 0x7, 0x2874, 0x9059, 0x1, 0x92563708, 0x17414319 34880

858684896963951931339 0x5, 0x8, 0x82, 0x03, 0x6515, 0x1928, 0x3, 0x6164 4MJ: 0x4, 0x2648, 0x5, 0x789, 0x9, 0x40, 0x885, 0x8936, 0x0312, 0x513, 0x8, 0x4976, 0x9482 exe: 0x05752520, 0x5914, 0x96897355, 0x001, 0x3372, 0x736, 0x8, 0x07, 0x68, 0x3067, 0x9, 0x07289451, 0x34139036

Place your ad here