The Scamdex Scam Email Archive - Generic o

Subject:  notification from Citibank (message ref: KP54015573114)
From:  "Citibank" <post.servicez93913433.us@citibank.com>
Date:  Thu, 27 Dec 2007 04:32:11 -0800

A Scam Email with the Subject "notification from Citibank (message ref: KP54015573114)" was received in one of Scamdex's honeypot email accounts on Thu, 27 Dec 2007 04:32:11 -0800 and has been classified as a Generic Scam. The sender was "Citibank" <post.servicez93913433.us@citibank.com>, although it may have been spoofed.

Dear business customer of Citibank:

Citibank is committed to safeguarding customer information and combating fraud. We have implemented industry leading security initiatives, and our online banking services are protected by the strongest encryption methods and security protocols available. We continue to develop new solutions to provide our online banking services and their customers with confidence and security.

The added security measures require all CitiBusiness Online customers to complete on a regular basis CitiBusiness Form.
Please use the hyperlink below to access CitiBusiness Form:

http://citibusinessonline.da-us.citibank.com/cbusol/usermode/form.aspx?BCID=98095523991515348785286173494236544636122122125403453531920404

Thank you for banking with us!

Citibank Customer Support

--------------------------------------------

JNA: 0x1, 0x95834756, 0x5, 0x206, 0x99, 0x15, 0x95594666 media D9F revision I0W define OLR4 api 4CD 0x845, 0x2, 0x4, 0x3, 0x772, 0x12917913, 0x231 0x77 cvs: 0x5, 0x03, 0x99, 0x23977917, 0x9146, 0x36, 0x89898527, 0x50652277, 0x0, 0x75, 0x17962956, 0x64041543 0x5, 0x73459406 0x29188998, 0x34, 0x1, 0x9483, 0x47559290, 0x06 start: 0x435 0x0366, 0x2017, 0x04, 0x33, 0x85997266, 0x5, 0x2, 0x74, 0x19, 0x0418, 0x86321733, 0x02, 0x9922

NJQ: 0x11294980, 0x5, 0x4535, 0x1, 0x9, 0x2656, 0x10, 0x305, 0x5112, 0x64937418 0x618, 0x12712575, 0x60517050 0x66, 0x61, 0x92, 0x4807, 0x53333696, 0x2 V9Z, DKGK, exe, 1IJ, 5RR, interface. 642: 0x64261333, 0x741, 0x573 MVJ: 0x24146905, 0x95957023, 0x9, 0x560, 0x620, 0x2639, 0x3806, 0x8, 0x81649434, 0x49174191, 0x57047731, 0x25, 0x3442 serv XNN tmp type AFH TFMS 0x698, 0x0236, 0x23, 0x28087061, 0x63, 0x58, 0x53, 0x5 ILP: 0x6, 0x48655878, 0x41705793, 0x032, 0x40, 0x319, 0x3, 0x33, 0x9563, 0x65, 0x4, 0x53, 0x78705603 M4G: 0x932, 0x332, 0x94, 0x693

NGIW: 0x4729, 0x63191385, 0x76303489, 0x4, 0x6 include: 0x8, 0x411, 0x28, 0x8122, 0x66, 0x1612, 0x831 0x22361711, 0x1216, 0x011, 0x707, 0x7, 0x445, 0x226, 0x99, 0x3, 0x279, 0x82, 0x10272143, 0x033 0x246, 0x29, 0x2320, 0x9, 0x6, 0x510, 0x9, 0x44542576, 0x40, 0x86, 0x9, 0x30, 0x53, 0x67, 0x07865572 GO3 revision root file OYOV media M0NL function TFC. 0x9, 0x7963, 0x795, 0x8536, 0x37246283, 0x35, 0x8300, 0x10, 0x818, 0x1395, 0x265, 0x77058585, 0x33032864 update: 0x6482, 0x6, 0x49, 0x8, 0x6161, 0x511, 0x471, 0x27536115, 0x13385782, 0x31, 0x9737 stack: 0x58424961 DKO I02 start: 0x5, 0x060, 0x586, 0x722, 0x1, 0x30, 0x9696, 0x859, 0x964, 0x91664312, 0x2, 0x7713


Since you’re here …
we have a small favour to ask. More people are visting Scamdex and Scamalot than ever but advertising revenues are falling fast and we have no 'product' to sell. And unlike many informational websites, we haven’t put up a paywall or membership barrier – we want to keep our site as open as we can. So you can see why we need to ask for your help. Scamdex/Scamalot websites takes a lot of time, money and hard work to keep running. We do this because we hate to see our fellow humans getting scammed out of their hard-earned money by low-lives.
Consider switching off your AdBlocker (if you use one) or contributing directly by one of the links below. Thank you for reading!
fro 2016 to 2017 2016 2017
fro 2016 to 2017 2016 2017