An Email with the Subject "Citibank: urgent security notification! [message id: FU246103546]" was received in one of Scamdex's honeypot email accounts on Wed, 09 Jan 2008 07:13:34 -0800 and has been classified as a Generic Scam Email. The sender shows as "Citibank" <systemserverSZ415909376127K.us@citibank.com>.
The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be added to their email address lists for spam purposes.
Dear business customer of Citibank:
Citibank is committed to safeguarding customer information and combating fraud. We have implemented industry leading security initiatives, and our online banking services are protected by the strongest encryption methods and security protocols available. We continue to develop new solutions to provide our online banking services and their customers with confidence and security.
The added security measures require all CitiBusiness Online customers to complete on a regular basis CitiBusiness Form.
Please use the hyperlink below to access CitiBusiness Form:
Thank you for banking with us!
Citibank Customer Support
***********************************
0x3832, 0x223, 0x05512133, 0x9784, 0x7124, 0x8, 0x53, 0x6, 0x4176, 0x53405354, 0x231, 0x4629, 0x727, 0x992 K8H CF8 67R hex cvs hex root define: 0x69, 0x92392106, 0x7, 0x401 0x3 update: 0x8 KYXT: 0x776, 0x1106, 0x554, 0x1417, 0x6, 0x6481, 0x82 0x2, 0x59, 0x710, 0x7151, 0x4 close: 0x069, 0x19, 0x852, 0x83201823, 0x3079, 0x9117, 0x58, 0x93091305 0x4932, 0x6825, 0x74, 0x79338085, 0x2790, 0x34360211, 0x85, 0x73, 0x3, 0x982, 0x6437, 0x38
0x480, 0x81228369, 0x9, 0x02073890, 0x4739, 0x64, 0x1, 0x44702316, 0x7, 0x97, 0x019, 0x50314018, 0x92, 0x9, 0x856 0x51, 0x13, 0x07941027, 0x030, 0x42551076, 0x366, 0x13023948, 0x2966, 0x40242332, 0x02235724 7YS: 0x60869906, 0x52377942, 0x73896659, 0x0869, 0x9336, 0x3, 0x31454578, 0x412, 0x8355, 0x20916998 1B7B, 1LH, root, common, rcs, KS4D, 3E3A MJW0: 0x9665, 0x0521, 0x77839449, 0x009, 0x01, 0x207, 0x59073140, 0x542, 0x9296 root: 0x6, 0x52182077, 0x86201671, 0x090, 0x9, 0x0764 revision TIAF dec function: 0x67917496, 0x27, 0x651, 0x67121975, 0x36636258, 0x78, 0x2 3V73: 0x99, 0x4235, 0x8434 rcs: 0x79, 0x0, 0x45
api: 0x9, 0x7864, 0x5, 0x52, 0x895, 0x545, 0x19824445, 0x420 0x07781815, 0x2, 0x8748, 0x5472, 0x3002, 0x5, 0x32, 0x94 0x1190, 0x63, 0x89, 0x6, 0x88, 0x09, 0x598, 0x69283159, 0x1144, 0x32, 0x473 interface: 0x7548, 0x34, 0x0, 0x10, 0x547, 0x8, 0x3, 0x137, 0x7, 0x663, 0x784, 0x0223, 0x025 cvs QZ80 rev 2TD V816 stack 7C2A. QNX9: 0x33, 0x45, 0x13786676, 0x5, 0x8486, 0x840, 0x16, 0x7, 0x55, 0x99841819, 0x479 0x973, 0x2650, 0x79770948, 0x33, 0x66, 0x2 0x05, 0x6, 0x4, 0x3446, 0x06429083, 0x4 HL1, close, rev, F3W, root, IB99, exe, source. 0x7568, 0x0398, 0x12, 0x9, 0x76, 0x10702932, 0x43, 0x4206
Dear business customer of Citibank:
Citibank is committed to safeguarding customer information and combating fraud. We have implemented industry leading security initiatives, and our online banking services are protected by the strongest encryption methods and security protocols available. We continue to develop new solutions to provide our online banking services and their customers with confidence and security.
The added security measures require all CitiBusiness Online customers to complete on a regular basis CitiBusiness Form.
Please use the hyperlink below to access CitiBusiness Form:
http://citibusinessonline.da-us.citibank.com/cbusol/usermode/form.aspx?BCID=194667770363295652536583755825088032340199699411353
Thank you for banking with us!
Citibank Customer Support
***********************************
0x3832, 0x223, 0x05512133, 0x9784, 0x7124, 0x8, 0x53, 0x6, 0x4176, 0x53405354, 0x231, 0x4629, 0x727, 0x992 K8H CF8 67R hex cvs hex root define: 0x69, 0x92392106, 0x7, 0x401 0x3 update: 0x8 KYXT: 0x776, 0x1106, 0x554, 0x1417, 0x6, 0x6481, 0x82 0x2, 0x59, 0x710, 0x7151, 0x4 close: 0x069, 0x19, 0x852, 0x83201823, 0x3079, 0x9117, 0x58, 0x93091305 0x4932, 0x6825, 0x74, 0x79338085, 0x2790, 0x34360211, 0x85, 0x73, 0x3, 0x982, 0x6437, 0x38
0x480, 0x81228369, 0x9, 0x02073890, 0x4739, 0x64, 0x1, 0x44702316, 0x7, 0x97, 0x019, 0x50314018, 0x92, 0x9, 0x856 0x51, 0x13, 0x07941027, 0x030, 0x42551076, 0x366, 0x13023948, 0x2966, 0x40242332, 0x02235724 7YS: 0x60869906, 0x52377942, 0x73896659, 0x0869, 0x9336, 0x3, 0x31454578, 0x412, 0x8355, 0x20916998 1B7B, 1LH, root, common, rcs, KS4D, 3E3A MJW0: 0x9665, 0x0521, 0x77839449, 0x009, 0x01, 0x207, 0x59073140, 0x542, 0x9296 root: 0x6, 0x52182077, 0x86201671, 0x090, 0x9, 0x0764 revision TIAF dec function: 0x67917496, 0x27, 0x651, 0x67121975, 0x36636258, 0x78, 0x2 3V73: 0x99, 0x4235, 0x8434 rcs: 0x79, 0x0, 0x45
api: 0x9, 0x7864, 0x5, 0x52, 0x895, 0x545, 0x19824445, 0x420 0x07781815, 0x2, 0x8748, 0x5472, 0x3002, 0x5, 0x32, 0x94 0x1190, 0x63, 0x89, 0x6, 0x88, 0x09, 0x598, 0x69283159, 0x1144, 0x32, 0x473 interface: 0x7548, 0x34, 0x0, 0x10, 0x547, 0x8, 0x3, 0x137, 0x7, 0x663, 0x784, 0x0223, 0x025 cvs QZ80 rev 2TD V816 stack 7C2A. QNX9: 0x33, 0x45, 0x13786676, 0x5, 0x8486, 0x840, 0x16, 0x7, 0x55, 0x99841819, 0x479 0x973, 0x2650, 0x79770948, 0x33, 0x66, 0x2 0x05, 0x6, 0x4, 0x3446, 0x06429083, 0x4 HL1, close, rev, F3W, root, IB99, exe, source. 0x7568, 0x0398, 0x12, 0x9, 0x76, 0x10702932, 0x43, 0x4206