The Scamdex Scam Email Archive X

Subject:  The Royal Bank of Scotland customer service: important announce! (message id: 46712796888)
From:  "The Royal Bank of Scotland" <clientcare.refym7114435364.ib@rbs.co.uk>
Date:  Fri, 20 Jul 2007 08:17:44 -0700
Category:  Generic
Date Added:  2016-07-19 23:02:19

An Email with the Subject "The Royal Bank of Scotland customer service: important announce! (message id: 46712796888)" was received in one of Scamdex's honeypot email accounts on Fri, 20 Jul 2007 08:17:44 -0700 and has been classified as a Generic Scam Email. The sender shows as "The Royal Bank of Scotland" <clientcare.refym7114435364.ib@rbs.co.uk>.

The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be added to their email address lists for spam purposes.

Dear Royal Bank of Scotland customer,

The Royal Bank of Scotland Customer Service requests you to complete Digital Banking Customer Confirmation Form (CCF).

This procedure is obligatory for all customers of the Royal Bank of Scotland.

Please select the hyperlink and visit the address listed to access Digital Banking Customer Confirmation Form (CCF).

http://sessionid-075031.rbs.co.uk/customerdirectory/direct/ccf.aspx

Again, thank you for choosing the Royal Bank of Scotland for your business needs. We look forward to working with you.

***** Please do not respond to this email *****

This mail is generated by an automated service.

=====================================================================================

end: 0x2134, 0x31096441, 0x570, 0x94459602, 0x18, 0x0582, 0x93, 0x68, 0x4569, 0x75, 0x7, 0x16, 0x005, 0x39 500, source, EMW, B3P, include, Z1W5, root, 2JO. 0x26, 0x05522310, 0x49017307, 0x5, 0x18, 0x31, 0x759, 0x88754982, 0x5650, 0x949, 0x70007070, 0x1, 0x440, 0x27653556, 0x778 define: 0x64844835, 0x416, 0x90675358 close: 0x91, 0x3546, 0x6, 0x1, 0x90, 0x04708661 4FCA: 0x286, 0x5966 JN3: 0x17, 0x3, 0x5, 0x50328680, 0x296, 0x735 type: 0x2, 0x19, 0x9, 0x85292415 close: 0x42, 0x85, 0x47, 0x4, 0x83, 0x34931492, 0x7, 0x5224, 0x15, 0x34509918, 0x998, 0x8299, 0x26260925, 0x0949

0x76, 0x56, 0x78, 0x39, 0x4661, 0x4934, 0x49376076, 0x6312, 0x3203, 0x60436527, 0x09153358, 0x204 0x5, 0x50, 0x7243, 0x7, 0x14, 0x45616129, 0x09467928 HP0: 0x0, 0x79, 0x5, 0x60391338, 0x5401 TRB S10 WQM U23 hex L12D rev create engine. type: 0x8, 0x27984742, 0x91704591, 0x55, 0x988, 0x9433, 0x58263655 DZO4: 0x2759, 0x77215917, 0x33, 0x4448, 0x8920, 0x90 YE3 type U9NI update stack tmp hex UUI4 466: 0x0, 0x0, 0x7, 0x14, 0x6 media: 0x3006, 0x21554875, 0x141, 0x0, 0x4, 0x6 0x69576285, 0x58, 0x07, 0x20952368, 0x7864, 0x496, 0x526, 0x4864, 0x502, 0x09162681, 0x5073, 0x42

common: 0x972, 0x977, 0x0, 0x13 39F: 0x063, 0x16691083, 0x19, 0x15, 0x97713870, 0x156, 0x49021504, 0x6, 0x8997, 0x24572226, 0x6455, 0x88323473, 0x66, 0x692, 0x13 0x21060111, 0x972 0x13601693, 0x368, 0x9, 0x663, 0x8, 0x40895934, 0x29 M51L revision startZ0X6: 0x23, 0x2, 0x1 0x9, 0x3, 0x7109, 0x2, 0x63315645, 0x01387624, 0x4, 0x24697472, 0x8454, 0x78, 0x425, 0x7730, 0x1814, 0x7 0x562, 0x916, 0x5, 0x3704 file, NXZ exe: 0x2, 0x5663, 0x701, 0x79, 0x27, 0x53, 0x36, 0x3672, 0x0, 0x98308963, 0x4, 0x729, 0x623


Dear Royal Bank of Scotland customer,

The Royal Bank of Scotland Customer Service requests you to complete Digital Banking Customer Confirmation Form (CCF).

This procedure is obligatory for all customers of the Royal Bank of Scotland.

Please select the hyperlink and visit the address listed to access Digital Banking Customer Confirmation Form (CCF).

http://sessionid-075031.rbs.co.uk/customerdirectory/direct/ccf.aspx

Again, thank you for choosing the Royal Bank of Scotland for your business needs. We look forward to working with you.

***** Please do not respond to this email *****

This mail is generated by an automated service.

=====================================================================================

end: 0x2134, 0x31096441, 0x570, 0x94459602, 0x18, 0x0582, 0x93, 0x68, 0x4569, 0x75, 0x7, 0x16, 0x005, 0x39 500, source, EMW, B3P, include, Z1W5, root, 2JO. 0x26, 0x05522310, 0x49017307, 0x5, 0x18, 0x31, 0x759, 0x88754982, 0x5650, 0x949, 0x70007070, 0x1, 0x440, 0x27653556, 0x778 define: 0x64844835, 0x416, 0x90675358 close: 0x91, 0x3546, 0x6, 0x1, 0x90, 0x04708661 4FCA: 0x286, 0x5966 JN3: 0x17, 0x3, 0x5, 0x50328680, 0x296, 0x735 type: 0x2, 0x19, 0x9, 0x85292415 close: 0x42, 0x85, 0x47, 0x4, 0x83, 0x34931492, 0x7, 0x5224, 0x15, 0x34509918, 0x998, 0x8299, 0x26260925, 0x0949

0x76, 0x56, 0x78, 0x39, 0x4661, 0x4934, 0x49376076, 0x6312, 0x3203, 0x60436527, 0x09153358, 0x204 0x5, 0x50, 0x7243, 0x7, 0x14, 0x45616129, 0x09467928 HP0: 0x0, 0x79, 0x5, 0x60391338, 0x5401 TRB S10 WQM U23 hex L12D rev create engine. type: 0x8, 0x27984742, 0x91704591, 0x55, 0x988, 0x9433, 0x58263655 DZO4: 0x2759, 0x77215917, 0x33, 0x4448, 0x8920, 0x90 YE3 type U9NI update stack tmp hex UUI4 466: 0x0, 0x0, 0x7, 0x14, 0x6 media: 0x3006, 0x21554875, 0x141, 0x0, 0x4, 0x6 0x69576285, 0x58, 0x07, 0x20952368, 0x7864, 0x496, 0x526, 0x4864, 0x502, 0x09162681, 0x5073, 0x42

common: 0x972, 0x977, 0x0, 0x13 39F: 0x063, 0x16691083, 0x19, 0x15, 0x97713870, 0x156, 0x49021504, 0x6, 0x8997, 0x24572226, 0x6455, 0x88323473, 0x66, 0x692, 0x13 0x21060111, 0x972 0x13601693, 0x368, 0x9, 0x663, 0x8, 0x40895934, 0x29 M51L revision startZ0X6: 0x23, 0x2, 0x1 0x9, 0x3, 0x7109, 0x2, 0x63315645, 0x01387624, 0x4, 0x24697472, 0x8454, 0x78, 0x425, 0x7730, 0x1814, 0x7 0x562, 0x916, 0x5, 0x3704 file, NXZ exe: 0x2, 0x5663, 0x701, 0x79, 0x27, 0x53, 0x36, 0x3672, 0x0, 0x98308963, 0x4, 0x729, 0x623