An
Email with the Subject "HSBC Payment" was
received in one of Scamdex's honeypot email accounts on Fri, 06 Mar 2015 02:06:38 -0800
and has been classified as a Generic Scam Email.
The sender shows as "HSBC" <no-replay@hsbc.co.uk>.
The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in
this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be
added to their email address lists for spam purposes.
Scam TagCloud
NO CHART DATA - EMAIL HAS NOT YET BEEN ANALYSED
Scam Email Headers
This a (redacted) view of the raw email headers of this scam email.
Personally Identifiable Information (PII) has been suppressed, but can be
supplied as received to appropriate investigating or law enforcement agencies on request.
EEEEEstdClass Object
(
[return-path:] =>
[envelope-to:] => weebix@o7e.net
[delivery-date:] => Fri, 06 Mar 2015 02:06:38 -0800
[received:] => from [175.45.28.174] (port=60245 helo=hsbc.co.uk)by bigcat.newsblaze.com with esmtp (Exim 4.85)(envelope-from )id 1YTp93-00044Z-6tfor weebix@o7e.net; Fri, 06 Mar 2015 02:06:38 -0800
[mime-version:] => 1.0
[content-type:] => multipart/mixed;boundary="=_62787c2d4446820adc69d1dfd6a4c8b7"
[date:] => Fri, 6 Mar 2015 10:01:09 +0000
[from:] => "HSBC"
[to:] =>
[subject:] => HSBC Payment
[message-id:] => <017285374110560115910394433283695@hsbc.co.uk>
[user-agent:] => Roundcube Webmail/1.1.0
[x-spam-status:] => No, score=3.5
[x-spam-score:] => 35
[x-spam-bar:] => +++
[x-ham-report:] => Spam detection software, running on the system "bigcat.newsblaze.com",has NOT identified this incoming email as spam. The originalmessage has been attached to this so you can view it or labelsimilar future email. If you have any questions, seeroot\@localhost for details.Content preview: Sir/Madam Upon your request, attached please find payment e-Advice for your reference. HSBC [...] Content analysis details: (3.5 points, 4.5 required) pts rule name description---- ---------------------- -------------------------------------------------- 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: hsbc.com.hk] 1.2 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in bl.spamcop.net [Blocked - see ] 1.0 SPF_SOFTFAIL SPF: sender does not match SPF record (softfail) 1.3 RDNS_NONE Delivered to internal network by a host with no rDNS
[x-spam-flag:] => NO
)
Domain Names used for collecting scam email ("Honeypot email accounts") have been obscured and replaced with the token 'HUN1P0T'
Community Action - SPAM/non-Scam Report
Occasionally, incorrectly categorized emails get into the Scamdex Scam Email Database and need to be removed. If this
email has Personally Identifiable Information (PII), or is, in your opinion, from a bona-fide entity, let us know.
Scamdex will, as soon as is practicable, take-down any emails that in our opinion should not
be in our database. Note that ALL emails in the Scamdex Scam Email Database were received as Unsolicited Commercial Email, aka UCE or
SPAM, via unpublished 'Honeypot' email addresses.
Sir/Madam
Upon your request, attached please find payment e-Advice for your
reference.
HSBC
***************************************************************************
We maintain strict security standards and procedures to prevent
unauthorised access to information about you. HSBC will never contact
you by e-mail or otherwise to ask you to validate personal information
such as your user ID, password, or account numbers. If you receive such
a request, please call our Direct Financial Services hotline.
Please do not reply to this e-mail. Should you wish to contact us,
please send your e-mail to commercialbanking@hsbc.com.hk and we will
respond to you.
Note: it is important that you do not provide your account or credit
card numbers, or convey any confidential information or banking
instructions, in your reply mail.
Copyright. The Hongkong and Shanghai Banking Corporation Limited 2015.
All rights reserved.
***************************************************************************