An Email with the Subject "PNC Bank: urgent security notification! (message id: 245856168234335)" was received in one of Scamdex's honeypot email accounts on Mon, 18 Jun 2007 13:50:35 -0700 and has been classified as a Generic Scam Email. The sender shows as "PNC Bank" <clientdepmnt.refES744717456175.ib@pnc.com>.
The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be added to their email address lists for spam purposes.
Dear PNC Bank corporate/business online client:
The PNC Customer Service requests you to complete the PNC PinacleWeb Online Confirmation Form.
This procedure is obligatory for all business and corporate clients of PNC Bank.
Please select the hyperlink and visit the address listed to access the PNC PinacleWeb Online Confirmation Form.
http://treasury-session149899.pnc.com/esec/customercare/form.jsp
Again, thank you for choosing PNC Bank for your business needs. We look forward to working with you.
Please do not respond to this email.
This mail is generated by an automated service.
Replies to this mail are not read by PNC Customer Service or technical support.
------------------------------------------------------------------------------------------------------
hex: 0x3136, 0x097, 0x20825128, 0x3776, 0x541, 0x4, 0x23, 0x559, 0x625, 0x21645036, 0x28 serv, tmp, end, 8DMX, YFF, rcs, R3C, Q95M. rev: 0x57621491, 0x845, 0x88685216, 0x2223, 0x59252671, 0x2758, 0x0, 0x6688, 0x6, 0x15035155, 0x632 0x7890, 0x37, 0x894, 0x79, 0x21598342, 0x8, 0x65, 0x712, 0x6750, 0x07, 0x89080611, 0x922 BRVH: 0x5192, 0x60635645, 0x50285098, 0x81844992, 0x9, 0x17, 0x33577978, 0x7, 0x1732, 0x10162574, 0x14, 0x6, 0x59, 0x4 3DR3: 0x22, 0x59857004, 0x227, 0x5616, 0x31, 0x8, 0x3144 stack: 0x566, 0x92 0x4245, 0x3, 0x4, 0x71, 0x5891, 0x0518, 0x9912, 0x07, 0x9, 0x07, 0x71, 0x310 0x701, 0x0, 0x99265706, 0x79193670, 0x4, 0x796, 0x153, 0x21, 0x70, 0x48, 0x84
0x47932629, 0x0462, 0x17, 0x349, 0x4, 0x3032, 0x1 OELF: 0x826, 0x7670, 0x7, 0x91, 0x1, 0x24585655 0x57, 0x3, 0x33322467, 0x5, 0x962, 0x03, 0x4196, 0x9, 0x02 revision cvs revision PCUP include 0x8019, 0x3701 0x06, 0x05, 0x986, 0x3, 0x45, 0x3300, 0x85955142, 0x34059369, 0x75, 0x261, 0x2, 0x66180586, 0x53 OHZ, KRPG, media, ZWP, OZZR, V7J, hex, 555M. 0x38300990, 0x554, 0x07614337, 0x234 3XE: 0x2859, 0x663, 0x135, 0x51, 0x56, 0x4, 0x17187420, 0x01, 0x4, 0x98509272 0x5, 0x74, 0x2626, 0x7, 0x0, 0x8
0x50, 0x79, 0x97, 0x97, 0x35532203, 0x82324080 E62N: 0x77779045, 0x4410, 0x019, 0x13455287, 0x3, 0x91 TU8: 0x4838, 0x81121210, 0x05, 0x535, 0x764 0x81, 0x634, 0x9137, 0x97, 0x0, 0x5, 0x2, 0x499, 0x695, 0x6, 0x23712473, 0x64168748, 0x4431, 0x48 typeJMO: 0x4804, 0x2357, 0x17, 0x25, 0x3, 0x7173 api: 0x86571787, 0x19473304, 0x8, 0x5382, 0x96, 0x070, 0x1, 0x77, 0x010, 0x9, 0x72, 0x382 0x060, 0x6, 0x0023, 0x521, 0x466, 0x28, 0x6, 0x0, 0x64814055, 0x149, 0x0, 0x2032, 0x2, 0x0145, 0x050 media, EZK6, WSI3, dec, stack, XAJ0 revision: 0x269, 0x1232, 0x8453, 0x2, 0x97, 0x9556, 0x9761, 0x79168458
Dear PNC Bank corporate/business online client:
The PNC Customer Service requests you to complete the PNC PinacleWeb Online Confirmation Form.
This procedure is obligatory for all business and corporate clients of PNC Bank.
Please select the hyperlink and visit the address listed to access the PNC PinacleWeb Online Confirmation Form.
http://treasury-session149899.pnc.com/esec/customercare/form.jsp
Again, thank you for choosing PNC Bank for your business needs. We look forward to working with you.
Please do not respond to this email.
This mail is generated by an automated service.
Replies to this mail are not read by PNC Customer Service or technical support.
------------------------------------------------------------------------------------------------------
hex: 0x3136, 0x097, 0x20825128, 0x3776, 0x541, 0x4, 0x23, 0x559, 0x625, 0x21645036, 0x28 serv, tmp, end, 8DMX, YFF, rcs, R3C, Q95M. rev: 0x57621491, 0x845, 0x88685216, 0x2223, 0x59252671, 0x2758, 0x0, 0x6688, 0x6, 0x15035155, 0x632 0x7890, 0x37, 0x894, 0x79, 0x21598342, 0x8, 0x65, 0x712, 0x6750, 0x07, 0x89080611, 0x922 BRVH: 0x5192, 0x60635645, 0x50285098, 0x81844992, 0x9, 0x17, 0x33577978, 0x7, 0x1732, 0x10162574, 0x14, 0x6, 0x59, 0x4 3DR3: 0x22, 0x59857004, 0x227, 0x5616, 0x31, 0x8, 0x3144 stack: 0x566, 0x92 0x4245, 0x3, 0x4, 0x71, 0x5891, 0x0518, 0x9912, 0x07, 0x9, 0x07, 0x71, 0x310 0x701, 0x0, 0x99265706, 0x79193670, 0x4, 0x796, 0x153, 0x21, 0x70, 0x48, 0x84
0x47932629, 0x0462, 0x17, 0x349, 0x4, 0x3032, 0x1 OELF: 0x826, 0x7670, 0x7, 0x91, 0x1, 0x24585655 0x57, 0x3, 0x33322467, 0x5, 0x962, 0x03, 0x4196, 0x9, 0x02 revision cvs revision PCUP include 0x8019, 0x3701 0x06, 0x05, 0x986, 0x3, 0x45, 0x3300, 0x85955142, 0x34059369, 0x75, 0x261, 0x2, 0x66180586, 0x53 OHZ, KRPG, media, ZWP, OZZR, V7J, hex, 555M. 0x38300990, 0x554, 0x07614337, 0x234 3XE: 0x2859, 0x663, 0x135, 0x51, 0x56, 0x4, 0x17187420, 0x01, 0x4, 0x98509272 0x5, 0x74, 0x2626, 0x7, 0x0, 0x8
0x50, 0x79, 0x97, 0x97, 0x35532203, 0x82324080 E62N: 0x77779045, 0x4410, 0x019, 0x13455287, 0x3, 0x91 TU8: 0x4838, 0x81121210, 0x05, 0x535, 0x764 0x81, 0x634, 0x9137, 0x97, 0x0, 0x5, 0x2, 0x499, 0x695, 0x6, 0x23712473, 0x64168748, 0x4431, 0x48 typeJMO: 0x4804, 0x2357, 0x17, 0x25, 0x3, 0x7173 api: 0x86571787, 0x19473304, 0x8, 0x5382, 0x96, 0x070, 0x1, 0x77, 0x010, 0x9, 0x72, 0x382 0x060, 0x6, 0x0023, 0x521, 0x466, 0x28, 0x6, 0x0, 0x64814055, 0x149, 0x0, 0x2032, 0x2, 0x0145, 0x050 media, EZK6, WSI3, dec, stack, XAJ0 revision: 0x269, 0x1232, 0x8453, 0x2, 0x97, 0x9556, 0x9761, 0x79168458