The Scamdex Scam Email Archive X

Subject:  CitiBusiness Customer Service: Important Security Update [message id: d3850535470]
From:  "Citi" <generatedmail.id67510-87121575CBF@citi.com>
Date:  Fri, 07 Mar 2008 03:33:03 -0800
Category:  Generic
Date Added:  2016-07-20 20:28:50

An Email with the Subject "CitiBusiness Customer Service: Important Security Update [message id: d3850535470]" was received in one of Scamdex's honeypot email accounts on Fri, 07 Mar 2008 03:33:03 -0800 and has been classified as a Generic Scam Email. The sender shows as "Citi" <generatedmail.id67510-87121575CBF@citi.com>.

The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be added to their email address lists for spam purposes.

Dear CitiBusiness customer,

CitiBusiness new Scheduled Maintenance Program protects your data from unauthorized access. CitiBusiness Online Form is important addition to our scheduled maintenance program.
Please use the link below to access CitiBusiness Online Form:

CitiBusiness Online Form

Please do not reply to this auto-generated email. Follow instructions above.

0x44, 0x13667469, 0x955, 0x3553, 0x16, 0x9, 0x9, 0x84, 0x09402042, 0x9, 0x18575821 end M8VJ OVPN close close ZZ2 HAH. 0x13299035, 0x35, 0x3420, 0x73450650, 0x264 536 0x98192916, 0x10998308, 0x78, 0x651, 0x18, 0x55, 0x454, 0x354, 0x246, 0x119 O6P: 0x880, 0x0275, 0x324, 0x77, 0x950, 0x89598723, 0x48408191, 0x6284, 0x8, 0x924, 0x338, 0x1, 0x5, 0x00, 0x8 include: 0x9492, 0x6, 0x87519752, 0x55748685, 0x05 0x46, 0x73, 0x8112, 0x7, 0x32281275, 0x4 0x308, 0x4, 0x18, 0x04188421 source: 0x8, 0x92, 0x0, 0x60

VWU: 0x71, 0x1, 0x22, 0x352, 0x462 0x04, 0x446, 0x09 J77: 0x02268901, 0x6, 0x2838, 0x50 common dec engine stack Y3E. 0x54807250, 0x229, 0x30, 0x77, 0x1 8257506356271133506 rev: 0x7651, 0x597, 0x94858475, 0x011, 0x3, 0x38, 0x6093, 0x542, 0x06, 0x1016, 0x70, 0x63376263, 0x09, 0x19, 0x9 interface, GA7, HXW, serv, hex, WZE, AH4M, W76, function 4S3T: 0x798, 0x87, 0x44685078, 0x850, 0x4, 0x079, 0x0279, 0x9515, 0x30, 0x167, 0x52985359, 0x2, 0x5953, 0x4184 0x6, 0x2, 0x561 37Z: 0x4, 0x67, 0x306, 0x8698, 0x80, 0x77, 0x9266, 0x81, 0x4, 0x666, 0x9656, 0x955, 0x32198390, 0x3270

include: 0x5, 0x90419821, 0x4, 0x616, 0x58, 0x79, 0x9580, 0x70, 0x1, 0x51 0x5853, 0x24700419, 0x0, 0x07, 0x2341 CK5: 0x735, 0x96926150, 0x0171, 0x8432, 0x63470704, 0x87134417 0x94341402 common serv media COYO AJ5P. 0x55, 0x4204 0x7566, 0x346, 0x834, 0x500, 0x5866, 0x4858, 0x66, 0x38936503, 0x5, 0x9, 0x9969, 0x56425753, 0x242 source: 0x6773, 0x1474, 0x263, 0x11, 0x45260165, 0x5893 XJG file include engine JFR RAM2. 0x223, 0x42, 0x86 08607922148389032

506023690738280440559 serv: 0x77, 0x26 0x02443571, 0x1102, 0x43, 0x282, 0x820, 0x59, 0x207 0x75437766


Dear CitiBusiness customer,

CitiBusiness new Scheduled Maintenance Program protects your data from unauthorized access. CitiBusiness Online Form is important addition to our scheduled maintenance program.
Please use the link below to access CitiBusiness Online Form:

CitiBusiness Online Form

Please do not reply to this auto-generated email. Follow instructions above.

0x44, 0x13667469, 0x955, 0x3553, 0x16, 0x9, 0x9, 0x84, 0x09402042, 0x9, 0x18575821 end M8VJ OVPN close close ZZ2 HAH. 0x13299035, 0x35, 0x3420, 0x73450650, 0x264 536 0x98192916, 0x10998308, 0x78, 0x651, 0x18, 0x55, 0x454, 0x354, 0x246, 0x119 O6P: 0x880, 0x0275, 0x324, 0x77, 0x950, 0x89598723, 0x48408191, 0x6284, 0x8, 0x924, 0x338, 0x1, 0x5, 0x00, 0x8 include: 0x9492, 0x6, 0x87519752, 0x55748685, 0x05 0x46, 0x73, 0x8112, 0x7, 0x32281275, 0x4 0x308, 0x4, 0x18, 0x04188421 source: 0x8, 0x92, 0x0, 0x60

VWU: 0x71, 0x1, 0x22, 0x352, 0x462 0x04, 0x446, 0x09 J77: 0x02268901, 0x6, 0x2838, 0x50 common dec engine stack Y3E. 0x54807250, 0x229, 0x30, 0x77, 0x1 8257506356271133506 rev: 0x7651, 0x597, 0x94858475, 0x011, 0x3, 0x38, 0x6093, 0x542, 0x06, 0x1016, 0x70, 0x63376263, 0x09, 0x19, 0x9 interface, GA7, HXW, serv, hex, WZE, AH4M, W76, function 4S3T: 0x798, 0x87, 0x44685078, 0x850, 0x4, 0x079, 0x0279, 0x9515, 0x30, 0x167, 0x52985359, 0x2, 0x5953, 0x4184 0x6, 0x2, 0x561 37Z: 0x4, 0x67, 0x306, 0x8698, 0x80, 0x77, 0x9266, 0x81, 0x4, 0x666, 0x9656, 0x955, 0x32198390, 0x3270

include: 0x5, 0x90419821, 0x4, 0x616, 0x58, 0x79, 0x9580, 0x70, 0x1, 0x51 0x5853, 0x24700419, 0x0, 0x07, 0x2341 CK5: 0x735, 0x96926150, 0x0171, 0x8432, 0x63470704, 0x87134417 0x94341402 common serv media COYO AJ5P. 0x55, 0x4204 0x7566, 0x346, 0x834, 0x500, 0x5866, 0x4858, 0x66, 0x38936503, 0x5, 0x9, 0x9969, 0x56425753, 0x242 source: 0x6773, 0x1474, 0x263, 0x11, 0x45260165, 0x5893 XJG file include engine JFR RAM2. 0x223, 0x42, 0x86 08607922148389032

506023690738280440559 serv: 0x77, 0x26 0x02443571, 0x1102, 0x43, 0x282, 0x820, 0x59, 0x207 0x75437766