The Scamdex Scam Email Archive - Generic o

Subject:  Security Measure
From:  PayPal <notice@ics2.com>
Date:  Wed, 25 Jun 2014 11:44:26 -0700

A Scam Email with the Subject "Security Measure" was received in one of Scamdex's honeypot email accounts on Wed, 25 Jun 2014 11:44:26 -0700 and has been classified as a Generic Scam. The sender was PayPal <notice@ics2.com>, although it may have been spoofed.

http://images.paypal.com/en_GB/GB/i/logo/paypal_logo.gif

PayPal Account System Upgrade Verification.

Technical services of the PayPal Inc. are carrying out a planned system upgrade. We earnestly ask you to start with
the procedure of confirmation on customers data.
 
This email has been sent to all PayPal members, and we ask a few minutes of your online experience. We have sent
you an attachment form through this email. Please download and open it in your web browser.
 
Your personal information is protected by state-of-the-art technology. After you have filled in all the required fields in
the form, our verification system will automatically update your account records.
 
We apologize for any inconvenience.
 
Thank you for using PayPal.

Please do not reply to this email. This mailbox is not monitored and you will not receive a response. For assistance, log in to your PayPal account and click Help in the top right corner of any PayPal page.

Copyright © 1999-2014 PayPal. All rights reserved.


Since you’re here …
we have a small favour to ask. More people are visting Scamdex and Scamalot than ever but advertising revenues are falling fast and we have no 'product' to sell. And unlike many informational websites, we haven’t put up a paywall or membership barrier – we want to keep our site as open as we can. So you can see why we need to ask for your help. Scamdex/Scamalot websites takes a lot of time, money and hard work to keep running. We do this because we hate to see our fellow humans getting scammed out of their hard-earned money by low-lives.
Consider switching off your AdBlocker (if you use one) or contributing directly by one of the links below. Thank you for reading!