This email with the subject "Citibank: urgent security notification! [message id: FU246103546]" was received in one of Scamdex's honeypot email accounts on Wed, 09 Jan 2008 07:13:34 -0800 and has been classified as a Generic Scam.
The sender was "Citibank" <systemserverSZ415909376127K.email@example.com>, although it may have been spoofed.
Dear business customer of Citibank:
Citibank is committed to safeguarding customer information and combating fraud. We have implemented industry leading security initiatives, and our online banking services are protected by the strongest encryption methods and security protocols available. We continue to develop new solutions to provide our online banking services and their customers with confidence and security.
The added security measures require all CitiBusiness Online customers to complete on a regular basis CitiBusiness Form.
Please use the hyperlink below to access CitiBusiness Form:
Thank you for banking with us!
Citibank Customer Support
0x3832, 0x223, 0x05512133, 0x9784, 0x7124, 0x8, 0x53, 0x6, 0x4176, 0x53405354, 0x231, 0x4629, 0x727, 0x992 K8H CF8 67R hex cvs hex root define: 0x69, 0x92392106, 0x7, 0x401 0x3 update: 0x8 KYXT: 0x776, 0x1106, 0x554, 0x1417, 0x6, 0x6481, 0x82 0x2, 0x59, 0x710, 0x7151, 0x4 close: 0x069, 0x19, 0x852, 0x83201823, 0x3079, 0x9117, 0x58, 0x93091305 0x4932, 0x6825, 0x74, 0x79338085, 0x2790, 0x34360211, 0x85, 0x73, 0x3, 0x982, 0x6437, 0x38
0x480, 0x81228369, 0x9, 0x02073890, 0x4739, 0x64, 0x1, 0x44702316, 0x7, 0x97, 0x019, 0x50314018, 0x92, 0x9, 0x856 0x51, 0x13, 0x07941027, 0x030, 0x42551076, 0x366, 0x13023948, 0x2966, 0x40242332, 0x02235724 7YS: 0x60869906, 0x52377942, 0x73896659, 0x0869, 0x9336, 0x3, 0x31454578, 0x412, 0x8355, 0x20916998 1B7B, 1LH, root, common, rcs, KS4D, 3E3A MJW0: 0x9665, 0x0521, 0x77839449, 0x009, 0x01, 0x207, 0x59073140, 0x542, 0x9296 root: 0x6, 0x52182077, 0x86201671, 0x090, 0x9, 0x0764 revision TIAF dec function: 0x67917496, 0x27, 0x651, 0x67121975, 0x36636258, 0x78, 0x2 3V73: 0x99, 0x4235, 0x8434 rcs: 0x79, 0x0, 0x45
api: 0x9, 0x7864, 0x5, 0x52, 0x895, 0x545, 0x19824445, 0x420 0x07781815, 0x2, 0x8748, 0x5472, 0x3002, 0x5, 0x32, 0x94 0x1190, 0x63, 0x89, 0x6, 0x88, 0x09, 0x598, 0x69283159, 0x1144, 0x32, 0x473 interface: 0x7548, 0x34, 0x0, 0x10, 0x547, 0x8, 0x3, 0x137, 0x7, 0x663, 0x784, 0x0223, 0x025 cvs QZ80 rev 2TD V816 stack 7C2A. QNX9: 0x33, 0x45, 0x13786676, 0x5, 0x8486, 0x840, 0x16, 0x7, 0x55, 0x99841819, 0x479 0x973, 0x2650, 0x79770948, 0x33, 0x66, 0x2 0x05, 0x6, 0x4, 0x3446, 0x06429083, 0x4 HL1, close, rev, F3W, root, IB99, exe, source. 0x7568, 0x0398, 0x12, 0x9, 0x76, 0x10702932, 0x43, 0x4206