An
Email with the Subject "How to reset your PayPal password" was
received in one of Scamdex's honeypot email accounts on Mon, 14 Nov 2011 05:38:38 -0800
and has been classified as a Generic Scam Email.
The sender shows as "PayPal" <security@onlineupdate.com>.
The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in
this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be
added to their email address lists for spam purposes.
This a (redacted) view of the raw email headers of this scam email.
Personally Identifiable Information (PII) has been suppressed, but can be
supplied as received to appropriate investigating or law enforcement agencies on request.
EEEEEstdClass Object
(
[return-path:] =>
[envelope-to:] => gas@scamdex.com
[delivery-date:] => Mon, 14 Nov 2011 05:38:38 -0800
[received:] => Array
(
[0] => from [62.177.213.246] (helo=gsu-s001.Graphiset.loc)by lester.newsblaze.com with smtp (Exim 4.69)(envelope-from )id 1RPwk9-0000sP-KUfor gas@scamdex.com; Mon, 14 Nov 2011 05:38:38 -0800
[1] => from onlineupdate.com ([74.120.47.134]) by gsu-s001.Graphiset.loc with Microsoft SMTPSVC(6.0.3790.4675); Mon, 14 Nov 2011 14:38:35 +0100
)
[thread-index:] => Acyi0rVNSyfMK2KWRyuwTSasCsEXGw==
[from:] => "PayPal"
[to:] =>
[content-class:] => urn:content-classes:message
[importance:] => normal
[priority:] => normal
[x-mimeole:] => Produced By Microsoft MimeOLE V6.00.3790.4862
[subject:] => How to reset your PayPal password
[date:] => 14 Nov 2011 08:38:34 -0500
[message-id:] => <20111114083834.6C82495D4B58967C@onlineupdate.com>
[mime-version:] => 1.0
[content-type:] => text/html;charset="iso-8859-1"
[content-transfer-encoding:] => quoted-printable
[x-originalarrivaltime:] => 14 Nov 2011 13:38:35.0490 (UTC) FILETIME=[B5448420:01CCA2D2]
[x-spam-subject:] => ***SPAM*** How to reset your PayPal password
[x-spam-status:] => Yes, score=4.2
[x-spam-score:] => 42
[x-spam-bar:] => ++++
[x-spam-report:] => Spam detection software, running on the system "lester.newsblaze.com", hasidentified this incoming email as possible spam. The original messagehas been attached to this so you can view it (if it isn't spam) or labelsimilar future email. If you have any questions, seethe administrator of that system for details.Content preview: Hello, You indicated that you forgot your PayPal password.Click on the link below to check email address and create a new password:https://www.paypal.ca/ca/cgi-bin/webscr?cmd=_login-run&dispatch=5885d80a13c0db1fca8cb0621aa94a5f6fa451543ea8737723e84f3b2eb6e293[...] Content analysis details: (4.2 points, 4.0 required)pts rule name description---- ---------------------- --------------------------------------------------1.6 RCVD_IN_BRBL_LASTEXT RBL: RCVD_IN_BRBL_LASTEXT[62.177.213.246 listed in bb.barracudacentral.org]0.0 HTML_MESSAGE BODY: HTML included in message1.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts0.0 MIME_QP_LONG_LINE RAW: Quoted-printable line longer than 76 chars0.6 HTML_MIME_NO_HTML_TAG HTML-only message, but there is no HTML tag1.3 RDNS_NONE Delivered to internal network by a host with no rDNS1.2 FROM_12LTRDOM From a 12-letter domain-1.6 AWL AWL: From: address is in the auto white-list
[x-spam-flag:] => YES
)
Domain Names used for collecting scam email ("Honeypot email accounts") have been obscured and replaced with the token 'HUN1P0T'
Community Action - SPAM/non-Scam Report
Occasionally, incorrectly categorized emails get into the Scamdex Scam Email Database and need to be removed. If this
email has Personally Identifiable Information (PII), or is, in your opinion, from a bona-fide entity, let us know.
Scamdex will, as soon as is practicable, take-down any emails that in our opinion should not
be in our database. Note that ALL emails in the Scamdex Scam Email Database were received as Unsolicited Commercial Email, aka UCE or
SPAM, via unpublished 'Honeypot' email addresses.
You indicated that you forgot your PayPal
password.
Click on the link below to check
email address and create a new password:
https://www.paypal.ca/ca/cgi-bin/webscr?cmd=_login-run&dispatch=5885d80a13c0db1fca8cb0621aa94a5f6fa451543ea8737723e84f3b2eb6e293