An
Email with the Subject "Re-instate" was
received in one of Scamdex's honeypot email accounts on Thu, 13 Aug 2015 01:41:29 -0700
and has been classified as a Generic Scam Email.
The sender shows as Barclays Bank PLC<cvkstj@customer-service.com>.
The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in
this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be
added to their email address lists for spam purposes.
Scam TagCloud
barclaybanksuspendendedsafeaccountcustomerservicecustomonlinemailbank online banknbarclays bank regardsbarclays bank security
NO CHART DATA - EMAIL HAS NOT YET BEEN ANALYSED
Scam Email Headers
This a (redacted) view of the raw email headers of this scam email.
Personally Identifiable Information (PII) has been suppressed, but can be
supplied as received to appropriate investigating or law enforcement agencies on request.
EEEEEstdClass Object
(
[return-path:] =>
[envelope-to:] => scams@scamdex.com
[delivery-date:] => Thu, 13 Aug 2015 01:41:29 -0700
[received:] => Array
(
[0] => from mta04.svc.cra.dublin.eircom.net ([159.134.118.171]:46292)by bigcat.newsblaze.com with smtp (Exim 4.85)(envelope-from )id 1ZPo4n-00012w-Ehfor scams@scamdex.com; Thu, 13 Aug 2015 01:41:29 -0700
[1] => (qmail 5593 messnum 9705961 invoked from network[213.94.190.11/avas00.vendorsvc.cra.dublin.eircom.net]); 13 Aug 2015 08:14:49 -0000
[2] => from avas00.vendorsvc.cra.dublin.eircom.net (213.94.190.11) by mta04.svc.cra.dublin.eircom.net (qp 5593) with SMTP; 13 Aug 2015 08:14:49 -0000
[3] => from User ([86.45.166.168])by avas00.vendorsvc.cra.dublin.eircom.net with Cloudmark Gatewayid 48ET1r00d3eKMuW018EXau; Thu, 13 Aug 2015 09:14:49 +0100
)
[reply-to:] => cvkstj@customer-service.com
[from:] => Barclays Bank PLC
[subject:] => Re-instate
[date:] => Thu, 13 Aug 2015 01:16:08 -0700
[mime-version:] => 1.0
[content-type:] => text/html;charset="Windows-1251"
[content-transfer-encoding:] => 7bit
[x-priority:] => 3
[x-msmail-priority:] => Normal
[x-mailer:] => Microsoft Outlook Express 6.00.2600.0000
[x-mimeole:] => Produced By Microsoft MimeOLE V6.00.2600.0000
)
Domain Names used for collecting scam email ("Honeypot email accounts") have been obscured and replaced with the token 'HUN1P0T'
Community Action - SPAM/non-Scam Report
Occasionally, incorrectly categorized emails get into the Scamdex Scam Email Database and need to be removed. If this
email has Personally Identifiable Information (PII), or is, in your opinion, from a bona-fide entity, let us know.
Scamdex will, as soon as is practicable, take-down any emails that in our opinion should not
be in our database. Note that ALL emails in the Scamdex Scam Email Database were received as Unsolicited Commercial Email, aka UCE or
SPAM, via unpublished 'Honeypot' email addresses.
We believe it's important to keep you up to date with the latest online security measures. We are committed to keeping you and your online service with us safe.To protect your accounts, our monitoring recently suspended your online service. Please click below to reinstate your online banking. Re-instate Regards
Barclays Bank Online Helpdesk Please do not reply to this e-mail, this is not a monitored e-mail address and we are unable to respond.
Valued Account Holder,
We believe it's important to keep you up to date with the latest online security measures. We are committed to keeping you and your online service with us safe.To protect your accounts, our monitoring recently suspended your online service. Please click below to reinstate your online banking.
Re-instate
Regards
Barclays Bank Online Helpdesk
Please do not reply to this e-mail, this is not a monitored e-mail address and we are unable to respond.