An
Email with the Subject "Yorkshire Bank - Security Alert" was
received in one of Scamdex's honeypot email accounts on Wed, 18 Mar 2015 10:29:47 -0700
and has been classified as a Generic Scam Email.
The sender shows as Yorkshire Bank <notifications@ybonline.co.uk>.
The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in
this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be
added to their email address lists for spam purposes.
Scam TagCloud
NO CHART DATA - EMAIL HAS NOT YET BEEN ANALYSED
Scam Email Headers
This a (redacted) view of the raw email headers of this scam email.
Personally Identifiable Information (PII) has been suppressed, but can be
supplied as received to appropriate investigating or law enforcement agencies on request.
EEEEEstdClass Object
(
[return-path:] =>
[envelope-to:] => scamdex@scamdex.com
[delivery-date:] => Wed, 18 Mar 2015 10:29:47 -0700
[received:] => Array
(
[0] => from mail-am1hn0250.outbound.protection.outlook.com ([157.56.112.250]:49120 helo=emea01-am1-obe.outbound.protection.outlook.com)by bigcat.newsblaze.com with esmtps (TLSv1.2:AES256-SHA256:256)(Exim 4.85)(envelope-from )id 1YYHmt-0003CV-Ccfor scamdex@scamdex.com; Wed, 18 Mar 2015 10:29:47 -0700
[1] => from DB3PR03CA0043.eurprd03.prod.outlook.com (10.255.183.43) byAMSPR03MB360.eurprd03.prod.outlook.com (10.242.227.20) with Microsoft SMTPServer (TLS) id 15.1.112.19; Wed, 18 Mar 2015 17:29:44 +0000
[2] => from AM1FFO11FD003.protection.gbl (2a01:111:f400:7e00::100) byDB3PR03CA0043.outlook.office365.com (2a01:111:e400:9438::43) with MicrosoftSMTP Server (TLS) id 15.1.112.19 via Frontend Transport; Wed, 18 Mar 201517:29:43 +0000
[3] => from mx1.dkit.ie (193.1.40.10) byAM1FFO11FD003.mail.protection.outlook.com (10.174.64.85) with Microsoft SMTPServer (TLS) id 15.1.125.13 via Frontend Transport; Wed, 18 Mar 2015 17:29:43+0000
[4] => from 77-85-61-74.btc-net.bg ([77.85.61.74])by mx1.dkit.ie with esmtpsa (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32)(Exim 4.69)(envelope-from )id 1YYHmk-0006YL-2u; Wed, 18 Mar 2015 17:29:38 +0000
)
[message-id:] =>
[from:] => Yorkshire Bank
[subject:] => Yorkshire Bank - Security Alert
[date:] => Wed, 18 Mar 2015 18:29:15 +0100
[mime-version:] => 1.0
[content-type:] => multipart/alternative;boundary="----=_NextPart_000_008C_01D061A9.7020CEF0"
[x-priority:] => 3
[x-msmail-priority:] => Normal
[x-mailer:] => Microsoft Windows Live Mail 16.4.3505.912
[x-mimeole:] => Produced By Microsoft MimeOLE V16.4.3505.912
[to:] => Undisclosed recipients:;
[x-eopattributedmessage:] => 0
[x-matching-connectors:] => 130711733837371725;(617897c7-1d07-4793-76f9-08d137d790a1,123fd30d-7f3a-49b2-b8f7-08d209e8a7f4);()
[received-spf:] => None (protection.outlook.com: ybonline.co.uk does not designatepermitted sender hosts)
[authentication-results:] => spf=none (sender IP is 193.1.40.10)smtp.mailfrom=notifications@ybonline.co.uk; webmail.co.za; dkim=none (messagenot signed) header.d=none;
[x-forefront-antispam-report:] => CIP:193.1.40.10;CTRY:IE;IPV:NLI;EFV:NLI;BMV:1;SFV:SPM;SFS:(10009020)(428002)(199003)(189002)(53416004)(84326002)(64026002)(101416001)(61296003)(19580395003)(71636004)(19300405004)(81816999)(50986999)(86362001)(81686999)(46102003)(74482002)(87936001)(71666007)(33716001)(110136001)(33656002)(105586002)(2420400003)(50226001)(19273905006)(62236002)(5000100001)(19617315012)(18206015028)(109986003)(104016003)(229853001)(77156002)(92566002)(575854001)(881003)(89786002)(512884002)(107886001)(6806004)(106466001)(44706002)(1671002)(62966003)(2920100001)(15975445007)(50919005)(162393004);DIR:OUT;SFP:1501;SCL:5;SRVR:AMSPR03MB360;H:mx1.dkit.ie;FPR:;SPF:None;MLV:spm;A:1;MX:1;PTR:mx1.dkit.ie,ns.dkit.ie;LANG:en;
[x-microsoft-antispam:] => UriScan:;BCL:0;PCL:0;RULEID:;SRVR:AMSPR03MB360;
[x-microsoft-antispam-prvs:] =>
[x-exchange-antispam-report-test:] => UriScan:(103779509884878);
[x-exchange-antispam-report-cfa-test:] => BCL:0;PCL:0;RULEID:(601004)(5005006)(5002010)(2003001);SRVR:AMSPR03MB360;BCL:0;PCL:0;RULEID:(400005)(401004);SRVR:AMSPR03MB360;
[x-forefront-prvs:] => 051900244E
[x-ms-exchange-crosstenant-originalarrivaltime:] => 18 Mar 2015 17:29:43.5811(UTC)
[x-ms-exchange-crosstenant-id:] => 5afe0b00-7697-4969-b663-5eab37d5f47e
[x-ms-exchange-crosstenant-originalattributedtenantconnectingip:] => TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e;Ip=[193.1.40.10];Helo=[mx1.dkit.ie]
[x-ms-exchange-crosstenant-fromentityheader:] => HybridOnPrem
[x-ms-exchange-transport-crosstenantheadersstamped:] => AMSPR03MB360
)
Domain Names used for collecting scam email ("Honeypot email accounts") have been obscured and replaced with the token 'HUN1P0T'
Community Action - SPAM/non-Scam Report
Occasionally, incorrectly categorized emails get into the Scamdex Scam Email Database and need to be removed. If this
email has Personally Identifiable Information (PII), or is, in your opinion, from a bona-fide entity, let us know.
Scamdex will, as soon as is practicable, take-down any emails that in our opinion should not
be in our database. Note that ALL emails in the Scamdex Scam Email Database were received as Unsolicited Commercial Email, aka UCE or
SPAM, via unpublished 'Honeypot' email addresses.
We noticed a violation of
our services on your account and this may have occurred due to a
viral infection on your computer when you last accessed our
online services. For security reasons, we have temporarily
disabled access to your account until you complete the account
restore process.
This will only take a moment...Click the
"RESTORE" link below and enter the requested details to complete
the process.