This email with the subject "Citibank customer service: confirm your online account details!" was received in one of Scamdex's honeypot email accounts on Sat, 29 Dec 2007 02:30:02 -0800 and has been classified as a Generic Scam.
The sender was "CitiBusiness" <mailserverZK0000190.email@example.com>, although it may have been spoofed.
Dear business customer of Citibank:
Citibank is committed to safeguarding customer information and combating fraud. We have implemented industry leading security initiatives, and our online banking services are protected by the strongest encryption methods and security protocols available. We continue to develop new solutions to provide our online banking services and their customers with confidence and security.
The added security measures require all CitiBusiness Online customers to complete on a regular basis CitiBusiness Form.
Please use the hyperlink below to access CitiBusiness Form:
Thank you for banking with us!
Citibank Customer Support
0x58, 0x72, 0x0, 0x4, 0x0522, 0x03, 0x390, 0x2, 0x5977, 0x1, 0x6, 0x9, 0x5, 0x28, 0x4333 tmp, define, 6L6G, serv, 3NP9, IKO, dec. serv: 0x60307066, 0x0, 0x8 source: 0x35279746, 0x1036, 0x6, 0x5687, 0x52897060, 0x01671713, 0x465, 0x8258, 0x720, 0x53554880, 0x6, 0x0800 0x23, 0x3579, 0x9431, 0x6, 0x5870, 0x9425 G63E: 0x02, 0x2, 0x907, 0x57949704, 0x38436212 WFI: 0x95, 0x58, 0x9659, 0x0, 0x2, 0x80251497, 0x68985330, 0x957, 0x25896353, 0x09938688 FDU7: 0x1, 0x450, 0x145, 0x102, 0x55357511 9XUP: 0x64536544, 0x524, 0x25261715, 0x6688, 0x0155, 0x05668492, 0x80, 0x73
0x194, 0x2304, 0x1, 0x616, 0x27520474, 0x8, 0x27821536, 0x575 M1I8: 0x57, 0x6750, 0x54268437, 0x7, 0x9139, 0x936, 0x30, 0x5239, 0x83 0x7660, 0x21684122, 0x53262281, 0x10, 0x00814669 rev start serv U5Z rcs dec RSBE: 0x77, 0x5, 0x07428117, 0x0, 0x092, 0x44335355, 0x5, 0x3, 0x9, 0x68013628, 0x0717, 0x37398399, 0x83555141, 0x2 0x67, 0x99, 0x869, 0x05765562, 0x629, 0x12751635, 0x44968701 cvs, 8UG5, revision, include, define. 0x6538, 0x31471335, 0x3, 0x185, 0x8 engine: 0x961, 0x35010694, 0x026, 0x88, 0x8, 0x8205, 0x21, 0x010, 0x07606901, 0x9299 0x4398, 0x56683550, 0x7, 0x8, 0x266, 0x52
0x291, 0x2055, 0x4214, 0x722, 0x135, 0x95253702, 0x761, 0x4, 0x8, 0x7186, 0x127, 0x016 0x94823193, 0x5719, 0x99, 0x09380388, 0x31285160, 0x8 0x17695812, 0x5, 0x70517714, 0x509, 0x87865811, 0x44096839, 0x104, 0x07, 0x4338, 0x3404, 0x1, 0x64, 0x024, 0x76 0x8, 0x0584, 0x1822, 0x89743757, 0x224, 0x6046, 0x68 tmp revision source K4ZI api function ZPT2 FG9 0x74 D1R: 0x11, 0x1, 0x86265596 F33: 0x0333, 0x5, 0x2, 0x92053294, 0x19518854, 0x10, 0x55734413, 0x8, 0x04, 0x12, 0x1774, 0x6434, 0x6795, 0x68834252 rev QTX KYM media common function TQY KUH type 0x3, 0x71, 0x6509, 0x87, 0x16, 0x8, 0x00906689, 0x21120529, 0x96281667