An
Email with the Subject "Belangrijke mededeling" was
received in one of Scamdex's honeypot email accounts on Fri, 13 Sep 2013 07:22:28 -0700 (PDT)
and has been classified as a Generic Scam Email.
The sender shows as BNP <direprotacna@regiontacna.gob.pe>.
The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in
this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be
added to their email address lists for spam purposes.
Scam TagCloud
bankcontactaccountserviceclientonlineach
NO CHART DATA - EMAIL HAS NOT YET BEEN ANALYSED
Scam Email Headers
This a (redacted) view of the raw email headers of this scam email.
Personally Identifiable Information (PII) has been suppressed, but can be
supplied as received to appropriate investigating or law enforcement agencies on request.
EEEEEstdClass Object
(
[delivered-to:] => scamdex@gmail.com
[received:] => Array
(
[0] => by 10.50.62.5 with SMTP id u5csp78097igr; Fri, 13 Sep 2013 07:22:28 -0700 (PDT)
[1] => from mail.regiontacna.gob.pe (mail.regiontacna.gob.pe. [200.37.179.83]) by mx.google.com with ESMTP id a48si5356683yhd.232.1969.12.31.16.00.00; Fri, 13 Sep 2013 07:22:26 -0700 (PDT)
[2] => from localhost (localhost.localdomain [127.0.0.1])by mail.regiontacna.gob.pe (Postfix) with ESMTP id 57B097F18FF8;Fri, 13 Sep 2013 09:21:20 -0500 (PET)
[3] => from mail.regiontacna.gob.pe ([127.0.0.1])by localhost (mail.regiontacna.gob.pe [127.0.0.1]) (amavisd-new, port 10024)with ESMTP id hUPhFREobJJ9; Fri, 13 Sep 2013 09:21:19 -0500 (PET)
[4] => from mail.regiontacna.gob.pe (mail.regiontacna.gob.pe [192.168.1.2])by mail.regiontacna.gob.pe (Postfix) with ESMTP id 2D32E7F18FE9;Fri, 13 Sep 2013 09:21:18 -0500 (PET)
)
[x-received:] => by 10.236.87.202 with SMTP id y50mr80184yhe.235.1379082146958; Fri, 13 Sep 2013 07:22:26 -0700 (PDT)
[return-path:] =>
[received-spf:] => pass (google.com: domain of direprotacna@regiontacna.gob.pe designates 200.37.179.83 as permitted sender) client-ip=200.37.179.83;
[authentication-results:] => mx.google.com; spf=pass (google.com: domain of direprotacna@regiontacna.gob.pe designates 200.37.179.83 as permitted sender) smtp.mail=direprotacna@regiontacna.gob.pe
[x-virus-scanned:] => amavisd-new at regiontacna.gob.pe
[date:] => Fri, 13 Sep 2013 09:21:17 -0500 (PET)
[from:] => BNP
[message-id:] => <693653369.9607.1379082077794.JavaMail.root@mail.regiontacna.gob.pe>
[subject:] => Belangrijke mededeling
[mime-version:] => 1.0
[content-type:] => multipart/alternative; boundary="----=_Part_9606_8602074.1379082077790"
[x-originating-ip:] => [192.168.1.2]
[x-mailer:] => Zimbra 6.0.8_GA_2661 (zclient/6.0.8_GA_2661)
[to:] => undisclosed-recipients:;
)
Domain Names used for collecting scam email ("Honeypot email accounts") have been obscured and replaced with the token 'HUN1P0T'
Community Action - SPAM/non-Scam Report
Occasionally, incorrectly categorized emails get into the Scamdex Scam Email Database and need to be removed. If this
email has Personally Identifiable Information (PII), or is, in your opinion, from a bona-fide entity, let us know.
Scamdex will, as soon as is practicable, take-down any emails that in our opinion should not
be in our database. Note that ALL emails in the Scamdex Scam Email Database were received as Unsolicited Commercial Email, aka UCE or
SPAM, via unpublished 'Honeypot' email addresses.
Houdt u er
rekening mee dat de toegang tot uw online-account dreigt te verlopen.Om
de toegang tot uw online account actief te houden, vragen wij u dan
gelieve om zo snel mogelijk in te loggen.Gebruik de onderstaande link om
verder te gaan en toegang te krijgen tot uw account.
Nadat
u gebruik heeft gemaakt van de onderstaande link zal er door ÃÃn van
onze medewerkers nog contact met u worden opgenomen om het gehele proces
te voltooien. Wanneer het gehele proces gereed is zal u weer als
vanouds gebruik kunnen maken van uw BNP PARIBAS FORTIS-online.
Met
toegang tot uw BNP PARIBAS FORTIS online kunt u het grootste gedeelte
van uw bankverrichtingen uitvoeren door u aan te melden op het
onlinebankieren.
Wij willen u alvast bedanken voor uw medewerking BNP PARIBAS FORTIS.
Hoogachtend, Klantenservice
Geachte BNP PARIBAS FORTIS Client,
Houdt u er
rekening mee dat de toegang tot uw online-account dreigt te verlopen.Om
de toegang tot uw online account actief te houden, vragen wij u dan
gelieve om zo snel mogelijk in te loggen.Gebruik de onderstaande link om
verder te gaan en toegang te krijgen tot uw account. Klik hier Nadat
u gebruik heeft gemaakt van de onderstaande link zal er door ÃÃn van
onze medewerkers nog contact met u worden opgenomen om het gehele proces
te voltooien. Wanneer het gehele proces gereed is zal u weer als
vanouds gebruik kunnen maken van uw BNP PARIBAS FORTIS-online.
Met
toegang tot uw BNP PARIBAS FORTIS online kunt u het grootste gedeelte
van uw bankverrichtingen uitvoeren door u aan te melden op het
onlinebankieren.
Wij willen u alvast bedanken voor uw medewerking BNP PARIBAS FORTIS.