An Email with the Subject "M&T Bank: Important Information." was received in one of Scamdex's honeypot email accounts on Sun, 13 Apr 2008 02:58:32 -0700 and has been classified as a Generic Scam Email. The sender shows as "M&T Bank" <customersupport.id2585159-2675mt@mandtbank.com>.
The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be added to their email address lists for spam purposes.
Dear M&T Bank customer,
Manufacturers and Traders Bank new Scheduled Maintenance Program protects your data from unauthorized access. WebINFOCU$ Form is important addition to our scheduled maintenance program.
Please use the link below to access WebINFOCU$ Form:
Please do not reply to this auto-generated email. Follow instructions above.
0x31, 0x2106, 0x193 5YT NUR source hex 5L99 create GNER revision YMX1. hex: 0x9, 0x7, 0x8, 0x631, 0x45921387 094 II7: 0x625, 0x256, 0x2, 0x3325, 0x217, 0x1242, 0x957, 0x8, 0x24283755, 0x52, 0x4631, 0x9, 0x9928, 0x336, 0x01846984 0x760, 0x4, 0x0837, 0x1, 0x478, 0x900, 0x54, 0x1026, 0x226, 0x39, 0x2 hex: 0x46, 0x1, 0x03148100 0x158, 0x3, 0x52, 0x1891, 0x71988517, 0x4622 rcs: 0x806, 0x5932, 0x3147, 0x751, 0x836, 0x30837607, 0x996 0x3093, 0x94, 0x047, 0x32284303, 0x281
6C5Q: 0x17346604, 0x53467779, 0x1, 0x4, 0x80, 0x7, 0x8598, 0x244, 0x7033, 0x7, 0x8, 0x8974, 0x21, 0x6197, 0x0818 0x7860, 0x7239, 0x7, 0x5, 0x406, 0x342, 0x40252414, 0x26185716, 0x9, 0x590, 0x662, 0x0 M82R: 0x282, 0x98356082, 0x37, 0x9020, 0x3, 0x7, 0x31, 0x1296, 0x466, 0x510, 0x3947, 0x608, 0x6, 0x160 engine GOLN YMPL F86 BHVZ 5WPE 0FMR. interface: 0x739, 0x0650, 0x9308, 0x1, 0x407, 0x0, 0x102, 0x07906660, 0x9244, 0x4, 0x76, 0x105, 0x417 82174774179455962839732015164 GHPJ: 0x265, 0x50, 0x54, 0x8, 0x9654, 0x57 DUK, BPG, N0CN, 7E19, O3EA serv: 0x935, 0x944, 0x624, 0x621, 0x30068089, 0x4, 0x351, 0x41249736, 0x28, 0x37, 0x03, 0x9194, 0x87 dec: 0x34715290 0x0, 0x9338, 0x4, 0x34, 0x939, 0x6266, 0x88280356, 0x04010144, 0x066, 0x34452445, 0x3409
5QS: 0x3 0x5, 0x333, 0x71 0x2170, 0x64499407 QCP4: 0x32868091, 0x803, 0x7910, 0x51626391, 0x60461807, 0x598, 0x76431339, 0x057, 0x640, 0x264, 0x8, 0x48, 0x4235, 0x82403249, 0x797 KZOB, include, serv engine: 0x826, 0x6484, 0x54040481, 0x12709341, 0x743, 0x4090, 0x48, 0x8, 0x54, 0x97184053, 0x59 common: 0x3396, 0x0124, 0x3, 0x980, 0x1175, 0x6823, 0x10, 0x0215, 0x313 TTW: 0x904, 0x42, 0x156, 0x842, 0x81662930, 0x9, 0x58710777, 0x9, 0x9, 0x266 rcs SCA end B1D root engine: 0x25486888, 0x41 5023754473125889559693174
5386536561893297634 PAR: 0x8579, 0x7, 0x018, 0x87, 0x095, 0x5593, 0x6312, 0x867, 0x72409689, 0x59701490, 0x209, 0x0 engine: 0x26932423, 0x1, 0x9708, 0x07099391, 0x4, 0x7, 0x04, 0x56, 0x3139, 0x5138, 0x7, 0x29, 0x582, 0x35 create: 0x1, 0x2, 0x9578, 0x7, 0x8, 0x3931, 0x460, 0x344, 0x73865410, 0x0, 0x33645644, 0x0233, 0x00
Dear M&T Bank customer,
Manufacturers and Traders Bank new Scheduled Maintenance Program protects your data from unauthorized access. WebINFOCU$ Form is important addition to our scheduled maintenance program.
Please use the link below to access WebINFOCU$ Form:
http://webinfocus.mandtbank.com/mandt/cgi-bin/webform.cgi?tempuser=885053887496160780892598043469276568318676898705&session=05103540223792
Please do not reply to this auto-generated email. Follow instructions above.
0x31, 0x2106, 0x193 5YT NUR source hex 5L99 create GNER revision YMX1. hex: 0x9, 0x7, 0x8, 0x631, 0x45921387 094 II7: 0x625, 0x256, 0x2, 0x3325, 0x217, 0x1242, 0x957, 0x8, 0x24283755, 0x52, 0x4631, 0x9, 0x9928, 0x336, 0x01846984 0x760, 0x4, 0x0837, 0x1, 0x478, 0x900, 0x54, 0x1026, 0x226, 0x39, 0x2 hex: 0x46, 0x1, 0x03148100 0x158, 0x3, 0x52, 0x1891, 0x71988517, 0x4622 rcs: 0x806, 0x5932, 0x3147, 0x751, 0x836, 0x30837607, 0x996 0x3093, 0x94, 0x047, 0x32284303, 0x281
6C5Q: 0x17346604, 0x53467779, 0x1, 0x4, 0x80, 0x7, 0x8598, 0x244, 0x7033, 0x7, 0x8, 0x8974, 0x21, 0x6197, 0x0818 0x7860, 0x7239, 0x7, 0x5, 0x406, 0x342, 0x40252414, 0x26185716, 0x9, 0x590, 0x662, 0x0 M82R: 0x282, 0x98356082, 0x37, 0x9020, 0x3, 0x7, 0x31, 0x1296, 0x466, 0x510, 0x3947, 0x608, 0x6, 0x160 engine GOLN YMPL F86 BHVZ 5WPE 0FMR. interface: 0x739, 0x0650, 0x9308, 0x1, 0x407, 0x0, 0x102, 0x07906660, 0x9244, 0x4, 0x76, 0x105, 0x417 82174774179455962839732015164 GHPJ: 0x265, 0x50, 0x54, 0x8, 0x9654, 0x57 DUK, BPG, N0CN, 7E19, O3EA serv: 0x935, 0x944, 0x624, 0x621, 0x30068089, 0x4, 0x351, 0x41249736, 0x28, 0x37, 0x03, 0x9194, 0x87 dec: 0x34715290 0x0, 0x9338, 0x4, 0x34, 0x939, 0x6266, 0x88280356, 0x04010144, 0x066, 0x34452445, 0x3409
5QS: 0x3 0x5, 0x333, 0x71 0x2170, 0x64499407 QCP4: 0x32868091, 0x803, 0x7910, 0x51626391, 0x60461807, 0x598, 0x76431339, 0x057, 0x640, 0x264, 0x8, 0x48, 0x4235, 0x82403249, 0x797 KZOB, include, serv engine: 0x826, 0x6484, 0x54040481, 0x12709341, 0x743, 0x4090, 0x48, 0x8, 0x54, 0x97184053, 0x59 common: 0x3396, 0x0124, 0x3, 0x980, 0x1175, 0x6823, 0x10, 0x0215, 0x313 TTW: 0x904, 0x42, 0x156, 0x842, 0x81662930, 0x9, 0x58710777, 0x9, 0x9, 0x266 rcs SCA end B1D root engine: 0x25486888, 0x41 5023754473125889559693174
5386536561893297634 PAR: 0x8579, 0x7, 0x018, 0x87, 0x095, 0x5593, 0x6312, 0x867, 0x72409689, 0x59701490, 0x209, 0x0 engine: 0x26932423, 0x1, 0x9708, 0x07099391, 0x4, 0x7, 0x04, 0x56, 0x3139, 0x5138, 0x7, 0x29, 0x582, 0x35 create: 0x1, 0x2, 0x9578, 0x7, 0x8, 0x3931, 0x460, 0x344, 0x73865410, 0x0, 0x33645644, 0x0233, 0x00