The Scamdex Scam Email Archive - Generic o

Subject:  CitiBusiness Customer Service: Important Security Update [message id: d3850535470]
From:  "Citi" <generatedmail.id67510-87121575CBF@citi.com>
Date:  Fri, 07 Mar 2008 03:33:03 -0800

A Scam Email with the Subject "CitiBusiness Customer Service: Important Security Update [message id: d3850535470]" was received in one of Scamdex's honeypot email accounts on Fri, 07 Mar 2008 03:33:03 -0800 and has been classified as a Generic Scam. The sender was "Citi" <generatedmail.id67510-87121575CBF@citi.com>, although it may have been spoofed.

Dear CitiBusiness customer,

CitiBusiness new Scheduled Maintenance Program protects your data from unauthorized access. CitiBusiness Online Form is important addition to our scheduled maintenance program.
Please use the link below to access CitiBusiness Online Form:

CitiBusiness Online Form

Please do not reply to this auto-generated email. Follow instructions above.

0x44, 0x13667469, 0x955, 0x3553, 0x16, 0x9, 0x9, 0x84, 0x09402042, 0x9, 0x18575821 end M8VJ OVPN close close ZZ2 HAH. 0x13299035, 0x35, 0x3420, 0x73450650, 0x264 536 0x98192916, 0x10998308, 0x78, 0x651, 0x18, 0x55, 0x454, 0x354, 0x246, 0x119 O6P: 0x880, 0x0275, 0x324, 0x77, 0x950, 0x89598723, 0x48408191, 0x6284, 0x8, 0x924, 0x338, 0x1, 0x5, 0x00, 0x8 include: 0x9492, 0x6, 0x87519752, 0x55748685, 0x05 0x46, 0x73, 0x8112, 0x7, 0x32281275, 0x4 0x308, 0x4, 0x18, 0x04188421 source: 0x8, 0x92, 0x0, 0x60

VWU: 0x71, 0x1, 0x22, 0x352, 0x462 0x04, 0x446, 0x09 J77: 0x02268901, 0x6, 0x2838, 0x50 common dec engine stack Y3E. 0x54807250, 0x229, 0x30, 0x77, 0x1 8257506356271133506 rev: 0x7651, 0x597, 0x94858475, 0x011, 0x3, 0x38, 0x6093, 0x542, 0x06, 0x1016, 0x70, 0x63376263, 0x09, 0x19, 0x9 interface, GA7, HXW, serv, hex, WZE, AH4M, W76, function 4S3T: 0x798, 0x87, 0x44685078, 0x850, 0x4, 0x079, 0x0279, 0x9515, 0x30, 0x167, 0x52985359, 0x2, 0x5953, 0x4184 0x6, 0x2, 0x561 37Z: 0x4, 0x67, 0x306, 0x8698, 0x80, 0x77, 0x9266, 0x81, 0x4, 0x666, 0x9656, 0x955, 0x32198390, 0x3270

include: 0x5, 0x90419821, 0x4, 0x616, 0x58, 0x79, 0x9580, 0x70, 0x1, 0x51 0x5853, 0x24700419, 0x0, 0x07, 0x2341 CK5: 0x735, 0x96926150, 0x0171, 0x8432, 0x63470704, 0x87134417 0x94341402 common serv media COYO AJ5P. 0x55, 0x4204 0x7566, 0x346, 0x834, 0x500, 0x5866, 0x4858, 0x66, 0x38936503, 0x5, 0x9, 0x9969, 0x56425753, 0x242 source: 0x6773, 0x1474, 0x263, 0x11, 0x45260165, 0x5893 XJG file include engine JFR RAM2. 0x223, 0x42, 0x86 08607922148389032

506023690738280440559 serv: 0x77, 0x26 0x02443571, 0x1102, 0x43, 0x282, 0x820, 0x59, 0x207 0x75437766


Since you’re here …
we have a small favour to ask. More people are visting Scamdex and Scamalot than ever but advertising revenues are falling fast and we have no 'product' to sell. And unlike many informational websites, we haven’t put up a paywall or membership barrier – we want to keep our site as open as we can. So you can see why we need to ask for your help. Scamdex/Scamalot websites takes a lot of time, money and hard work to keep running. We do this because we hate to see our fellow humans getting scammed out of their hard-earned money by low-lives.
Consider switching off your AdBlocker (if you use one) or contributing directly by one of the links below. Thank you for reading!