An
Email with the Subject "Belangrijke mededeling" was
received in one of Scamdex's honeypot email accounts on Mon, 25 Nov 2013 04:40:16 -0800 (PST)
and has been classified as a Generic Scam Email.
The sender shows as BNP PARIBAS FORTIS <ehernandez@jps.go.cr>.
The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in
this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be
added to their email address lists for spam purposes.
Scam TagCloud
bankcontactaccountserviceclientonlineach
NO CHART DATA - EMAIL HAS NOT YET BEEN ANALYSED
Scam Email Headers
This a (redacted) view of the raw email headers of this scam email.
Personally Identifiable Information (PII) has been suppressed, but can be
supplied as received to appropriate investigating or law enforcement agencies on request.
EEEEEstdClass Object
(
[delivered-to:] => scamdex@gmail.com
[received:] => Array
(
[0] => by 10.224.63.202 with SMTP id c10csp102900qai; Mon, 25 Nov 2013 04:40:16 -0800 (PST)
[1] => from relay2.jps.go.cr (relay2.jps.go.cr. [190.241.190.6]) by mx.google.com with ESMTP id m4si13968740qcr.69.2013.11.25.04.40.13 for ; Mon, 25 Nov 2013 04:40:16 -0800 (PST)
[2] => from mail.jps.go.cr ([unknown] [190.241.190.4])by relay2.jps.go.cr (Sun Java(tm) System Messaging Server 7.3-11.01 64bit(built Sep 1 2009)) with ESMTP id <0MWT00IQ7K1LHD30@relay2.jps.go.cr>; Mon,25 Nov 2013 06:29:56 -0600 (CST)
[3] => from mail.jps.go.cr (localhost [127.0.0.1])by mail.jps.go.cr (Postfix) with ESMTP id 37340621A4; Mon,25 Nov 2013 06:29:22 -0600 (CST)
[4] => from zimbra.jps.go.cr (zimbra.jps.go.cr [10.0.0.246])by mail.jps.go.cr (Postfix) with ESMTP id 639476223B; Mon,25 Nov 2013 06:29:18 -0600 (CST)
)
[x-received:] => by 10.49.131.69 with SMTP id ok5mr21550100qeb.77.1385383216256; Mon, 25 Nov 2013 04:40:16 -0800 (PST)
[return-path:] =>
[received-spf:] => pass (google.com: domain of ehernandez@jps.go.cr designates 190.241.190.6 as permitted sender) client-ip=190.241.190.6;
[authentication-results:] => mx.google.com; spf=pass (google.com: domain of ehernandez@jps.go.cr designates 190.241.190.6 as permitted sender) smtp.mail=ehernandez@jps.go.cr
[date:] => Mon, 25 Nov 2013 06:28:47 -0600 (CST)
[from:] => BNP PARIBAS FORTIS
[subject:] => Belangrijke mededeling
[x-originating-ip:] => [190.241.190.4]
[message-id:] => <350098669.1013678.1385382527700.JavaMail.root@jps.go.cr>
[mime-version:] => 1.0
[x-mailer:] => Zimbra 8.0.2_GA_5569 (zclient/8.0.2_GA_5569)
[content-type:] => multipart/alternative;boundary="Boundary_(ID_ePCDFFab0KcqCAb0ShdnqA)"
[thread-topic:] => Belangrijke mededeling
[thread-index:] => 1nsUcInDb3y6+qrpstADvrN8ulg/0Q==
)
Domain Names used for collecting scam email ("Honeypot email accounts") have been obscured and replaced with the token 'HUN1P0T'
Community Action - SPAM/non-Scam Report
Occasionally, incorrectly categorized emails get into the Scamdex Scam Email Database and need to be removed. If this
email has Personally Identifiable Information (PII), or is, in your opinion, from a bona-fide entity, let us know.
Scamdex will, as soon as is practicable, take-down any emails that in our opinion should not
be in our database. Note that ALL emails in the Scamdex Scam Email Database were received as Unsolicited Commercial Email, aka UCE or
SPAM, via unpublished 'Honeypot' email addresses.
Houdt u er rekening mee dat de toegang tot uw online-account dreigt te verlopen.Om de toegang tot uw online account actief te houden, vragen wij u dan gelieve om zo snel mogelijk in te loggen.Gebruik de onderstaande link om verder te gaan en toegang te krijgen tot uw account.
Nadat u gebruik heeft gemaakt van de onderstaande link zal er door één van onze medewerkers nog contact met u worden opgenomen om het gehele proces te voltooien. Wanneer het gehele proces gereed is zal u weer als vanouds gebruik kunnen maken van uw BNP PARIBAS FORTIS-online.
Met toegang tot uw BNP PARIBAS FORTIS online kunt u het grootste gedeelte van uw bankverrichtingen uitvoeren door u aan te melden op het onlinebankieren.
Wij willen u alvast bedanken voor uw medewerking BNP PARIBAS FORTIS.
Hoogachtend,
Klantenservice
Geachte BNP PARIBAS FORTIS Client,
Houdt u er rekening mee dat de toegang tot uw online-account dreigt te verlopen.Om de toegang tot uw online account actief te houden, vragen wij u dan gelieve om zo snel mogelijk in te loggen.Gebruik de onderstaande link om verder te gaan en toegang te krijgen tot uw account.
Nadat u gebruik heeft gemaakt van de onderstaande link zal er door één van onze medewerkers nog contact met u worden opgenomen om het gehele proces te voltooien. Wanneer het gehele proces gereed is zal u weer als vanouds gebruik kunnen maken van uw BNP PARIBAS FORTIS-online.
Klik hier
Met toegang tot uw BNP PARIBAS FORTIS online kunt u het grootste gedeelte van uw bankverrichtingen uitvoeren door u aan te melden op het onlinebankieren.
Wij willen u alvast bedanken voor uw medewerking BNP PARIBAS FORTIS.