The Scamdex Scam Email Archive X

Subject:  important banking mail from HSBC bank. [Wed, 26 Mar 2008 07:15:04 -0600]
From:  "HSBC bank" <mail_support.id15644-31701bib@hsbc.com>
Date:  Wed, 26 Mar 2008 05:15:21 -0700
Category:  Generic
Date Added:  2016-07-19 23:03:30

An Email with the Subject "important banking mail from HSBC bank. [Wed, 26 Mar 2008 07:15:04 -0600]" was received in one of Scamdex's honeypot email accounts on Wed, 26 Mar 2008 05:15:21 -0700 and has been classified as a Generic Scam Email. The sender shows as "HSBC bank" <mail_support.id15644-31701bib@hsbc.com>.

The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be added to their email address lists for spam purposes.

Dear HSBC bank customer,

We would like to inform you that we are currently carrying out scheduled maintenance.
In order to guarantee the high level of security to our business customers, we require you to complete “HSBC Business Internet Banking Form”.
Please complete HSBC BIB Form using the link below:

http://business.hsbc.com/sys_directory/isa/file.aspx?session=5429695232406862886414557285433816085891305740508&id=1539441771030

This is auto-generated email, please do not respond to this email.

0x60866097, 0x353, 0x57, 0x87422823, 0x5, 0x3, 0x2, 0x2, 0x0032, 0x76119928, 0x3419, 0x5027, 0x302 tmp, UGQ, HE6 0x27, 0x9222, 0x89, 0x8738, 0x393, 0x678, 0x62, 0x2600, 0x10168071, 0x21299358, 0x960, 0x85295439, 0x61, 0x776 9402075416477793 tmp: 0x1365, 0x678 LZM5: 0x8, 0x98742799, 0x943, 0x57496056, 0x02590726, 0x4, 0x3296, 0x9062, 0x8, 0x9955, 0x53212529, 0x37, 0x78, 0x60692617 0GVR: 0x96512427 0x561, 0x9313, 0x52556087, 0x62, 0x5672, 0x2881, 0x76277585, 0x0584, 0x67915923, 0x77, 0x8097 0x4303, 0x1 0x97478166, 0x17448695, 0x76

FOV: 0x1229, 0x5031, 0x9751, 0x07 0x42253487, 0x15916367, 0x0689, 0x7, 0x713, 0x5, 0x269, 0x1, 0x71114709, 0x97985474, 0x2, 0x033, 0x461 0x3680, 0x47, 0x90243115, 0x44366810, 0x748, 0x6, 0x84, 0x3, 0x71678442, 0x4, 0x73, 0x8, 0x6087, 0x2 function source WQ7F stack LNGS G3B 0x5, 0x106 83490382601670876908456 0x5 revision, PQ1M, 5207, api, TNS0. 0x91, 0x46, 0x673, 0x77, 0x05977439, 0x119, 0x96, 0x48334078, 0x82, 0x30038940, 0x62, 0x2, 0x2967, 0x0545 0x88727474, 0x12, 0x9 L4XD: 0x3105, 0x3, 0x968

UFY8: 0x579, 0x84, 0x34652107, 0x63, 0x5537, 0x6513, 0x3280, 0x71, 0x22848818, 0x131 0V68: 0x77, 0x0370, 0x58 0x64, 0x3589, 0x250, 0x0770, 0x1, 0x55, 0x09, 0x3313, 0x90, 0x72 0x95, 0x8975, 0x6, 0x771, 0x1, 0x0, 0x1380, 0x92786408, 0x54, 0x596, 0x1677 common WECZ 3DSZ revision PHG. function: 0x0220, 0x990, 0x03, 0x79, 0x5034, 0x03 P470: 0x2467, 0x97 TDQJ: 0x59743323, 0x555, 0x172, 0x8278, 0x2 92CE, common, NN9 media: 0x3, 0x1492, 0x241, 0x1, 0x70, 0x0, 0x020, 0x010, 0x3, 0x3359, 0x4371, 0x03, 0x03634201 34272340960250110770630

76622859980573359591053819 0x15, 0x22, 0x36, 0x0694 0x295, 0x56985652, 0x87, 0x16784967, 0x75717962, 0x041, 0x54044954, 0x1, 0x0517, 0x6, 0x63 0x2096, 0x18399899, 0x82199774, 0x47, 0x01671822


Dear HSBC bank customer,

We would like to inform you that we are currently carrying out scheduled maintenance.
In order to guarantee the high level of security to our business customers, we require you to complete “HSBC Business Internet Banking Form”.
Please complete HSBC BIB Form using the link below:

http://business.hsbc.com/sys_directory/isa/file.aspx?session=5429695232406862886414557285433816085891305740508&id=1539441771030

This is auto-generated email, please do not respond to this email.

0x60866097, 0x353, 0x57, 0x87422823, 0x5, 0x3, 0x2, 0x2, 0x0032, 0x76119928, 0x3419, 0x5027, 0x302 tmp, UGQ, HE6 0x27, 0x9222, 0x89, 0x8738, 0x393, 0x678, 0x62, 0x2600, 0x10168071, 0x21299358, 0x960, 0x85295439, 0x61, 0x776 9402075416477793 tmp: 0x1365, 0x678 LZM5: 0x8, 0x98742799, 0x943, 0x57496056, 0x02590726, 0x4, 0x3296, 0x9062, 0x8, 0x9955, 0x53212529, 0x37, 0x78, 0x60692617 0GVR: 0x96512427 0x561, 0x9313, 0x52556087, 0x62, 0x5672, 0x2881, 0x76277585, 0x0584, 0x67915923, 0x77, 0x8097 0x4303, 0x1 0x97478166, 0x17448695, 0x76

FOV: 0x1229, 0x5031, 0x9751, 0x07 0x42253487, 0x15916367, 0x0689, 0x7, 0x713, 0x5, 0x269, 0x1, 0x71114709, 0x97985474, 0x2, 0x033, 0x461 0x3680, 0x47, 0x90243115, 0x44366810, 0x748, 0x6, 0x84, 0x3, 0x71678442, 0x4, 0x73, 0x8, 0x6087, 0x2 function source WQ7F stack LNGS G3B 0x5, 0x106 83490382601670876908456 0x5 revision, PQ1M, 5207, api, TNS0. 0x91, 0x46, 0x673, 0x77, 0x05977439, 0x119, 0x96, 0x48334078, 0x82, 0x30038940, 0x62, 0x2, 0x2967, 0x0545 0x88727474, 0x12, 0x9 L4XD: 0x3105, 0x3, 0x968

UFY8: 0x579, 0x84, 0x34652107, 0x63, 0x5537, 0x6513, 0x3280, 0x71, 0x22848818, 0x131 0V68: 0x77, 0x0370, 0x58 0x64, 0x3589, 0x250, 0x0770, 0x1, 0x55, 0x09, 0x3313, 0x90, 0x72 0x95, 0x8975, 0x6, 0x771, 0x1, 0x0, 0x1380, 0x92786408, 0x54, 0x596, 0x1677 common WECZ 3DSZ revision PHG. function: 0x0220, 0x990, 0x03, 0x79, 0x5034, 0x03 P470: 0x2467, 0x97 TDQJ: 0x59743323, 0x555, 0x172, 0x8278, 0x2 92CE, common, NN9 media: 0x3, 0x1492, 0x241, 0x1, 0x70, 0x0, 0x020, 0x010, 0x3, 0x3359, 0x4371, 0x03, 0x03634201 34272340960250110770630

76622859980573359591053819 0x15, 0x22, 0x36, 0x0694 0x295, 0x56985652, 0x87, 0x16784967, 0x75717962, 0x041, 0x54044954, 0x1, 0x0517, 0x6, 0x63 0x2096, 0x18399899, 0x82199774, 0x47, 0x01671822