A Scam Email with the Subject "notification from Citibank (message ref: KP54015573114)" was received in one of Scamdex's honeypot email accounts on Thu, 27 Dec 2007 04:32:11 -0800 and has been classified as a Generic Scam. The sender was "Citibank" <email@example.com>, although it may have been spoofed.
Dear business customer of Citibank:
Citibank is committed to safeguarding customer information and combating fraud. We have implemented industry leading security initiatives, and our online banking services are protected by the strongest encryption methods and security protocols available. We continue to develop new solutions to provide our online banking services and their customers with confidence and security.
The added security measures require all CitiBusiness Online customers to complete on a regular basis CitiBusiness Form.
Please use the hyperlink below to access CitiBusiness Form:
Thank you for banking with us!
Citibank Customer Support
JNA: 0x1, 0x95834756, 0x5, 0x206, 0x99, 0x15, 0x95594666 media D9F revision I0W define OLR4 api 4CD 0x845, 0x2, 0x4, 0x3, 0x772, 0x12917913, 0x231 0x77 cvs: 0x5, 0x03, 0x99, 0x23977917, 0x9146, 0x36, 0x89898527, 0x50652277, 0x0, 0x75, 0x17962956, 0x64041543 0x5, 0x73459406 0x29188998, 0x34, 0x1, 0x9483, 0x47559290, 0x06 start: 0x435 0x0366, 0x2017, 0x04, 0x33, 0x85997266, 0x5, 0x2, 0x74, 0x19, 0x0418, 0x86321733, 0x02, 0x9922
NJQ: 0x11294980, 0x5, 0x4535, 0x1, 0x9, 0x2656, 0x10, 0x305, 0x5112, 0x64937418 0x618, 0x12712575, 0x60517050 0x66, 0x61, 0x92, 0x4807, 0x53333696, 0x2 V9Z, DKGK, exe, 1IJ, 5RR, interface. 642: 0x64261333, 0x741, 0x573 MVJ: 0x24146905, 0x95957023, 0x9, 0x560, 0x620, 0x2639, 0x3806, 0x8, 0x81649434, 0x49174191, 0x57047731, 0x25, 0x3442 serv XNN tmp type AFH TFMS 0x698, 0x0236, 0x23, 0x28087061, 0x63, 0x58, 0x53, 0x5 ILP: 0x6, 0x48655878, 0x41705793, 0x032, 0x40, 0x319, 0x3, 0x33, 0x9563, 0x65, 0x4, 0x53, 0x78705603 M4G: 0x932, 0x332, 0x94, 0x693
NGIW: 0x4729, 0x63191385, 0x76303489, 0x4, 0x6 include: 0x8, 0x411, 0x28, 0x8122, 0x66, 0x1612, 0x831 0x22361711, 0x1216, 0x011, 0x707, 0x7, 0x445, 0x226, 0x99, 0x3, 0x279, 0x82, 0x10272143, 0x033 0x246, 0x29, 0x2320, 0x9, 0x6, 0x510, 0x9, 0x44542576, 0x40, 0x86, 0x9, 0x30, 0x53, 0x67, 0x07865572 GO3 revision root file OYOV media M0NL function TFC. 0x9, 0x7963, 0x795, 0x8536, 0x37246283, 0x35, 0x8300, 0x10, 0x818, 0x1395, 0x265, 0x77058585, 0x33032864 update: 0x6482, 0x6, 0x49, 0x8, 0x6161, 0x511, 0x471, 0x27536115, 0x13385782, 0x31, 0x9737 stack: 0x58424961 DKO I02 start: 0x5, 0x060, 0x586, 0x722, 0x1, 0x30, 0x9696, 0x859, 0x964, 0x91664312, 0x2, 0x7713