 Doctor FourMy other vehicle is a TARDISPremium join:2000-09-05 Dallas, TX | reply to nwrickert
Re: [Phish] Telephone phishing threadPentagon Federal Credit Union PhishAs before, the only thing changed was the name in the X-Apparently-To header. X-Apparently-To: x@yahoo.com via 66.163.178.140; Thu, 27 Mar 2008 19:46:30 -0700
X-YahooFilteredBulk:65.105.120.87
X-Originating-IP:[65.105.120.87]
Return-Path:<service@penfed.org>
Authentication-Results:mta506.mail.mud.yahoo.com from=penfed.org; domainkeys=neutral (no sig)
Received:from 65.105.120.87 (EHLO webmail.iconnectu.net) (65.105.120.87) by mta506.mail.mud.yahoo.com with SMTP; Thu, 27 Mar 2008 19:46:30 -0700
Received:from User [207.166.116.186] by webmail.iconnectu.net with ESMTP (SMTPD32-6.06) id AC88B3DC004A; Thu, 27 Mar 2008 21:48:40 -0500
Reply-to:<service@penfed.org>
From:"service@penfed.org" <service@penfed.org> Add Mobile Alert
Subject:Pentagon Federal Credit Union Account Suspended
Date:Fri, 28 Mar 2008 10:40:50 -0400
MIME-Version:1.0
Content-Type:text/plain; charset="_iso-2022-jp$ESC"
Content-Transfer-Encoding:7bit
X-Priority:1
X-MSMail-Priority:High
X-Mailer:Microsoft Outlook Express 6.00.2800.1081
X-MimeOLE:Produced By Microsoft MimeOLE V6.00.2800.1081
Message-Id:<200803272149182.SM02700@User>
Content-Length:284
Dear Pentagon Federal Credit Union Customer,
ACCOUNT SUSPENDED
Your account has been suspended for invalid billing information
provided.
To activate your account please call the security department at
856-431-1109
Thank You
Pentagon Federal Credit Union Security Department
-- "The trouble with computers, of course, is that they are very sophisticated idiots." - Doctor Who (from Robot)
|
|
 removedPremium,VIP join:2002-02-08 Houston, TX kudos:37 | reply to nwrickert VISA - local number to me in Houston. Scary.
quote: > VISA Security Department temporary disabled your account.
Verified by VISA will never ask you any information via e-mail. Call this number (832)772-7857 - Toll Free
You must reactivate your account immediately, or you won't be able to use your cards again.
> Sorry for any inconvenience this may cause and thank you for your patience.
> To reactivate your account call us: 832-772-7857- Toll Free
© 2001-2008 Visa. All Rights Reserved.
This message was sent to Email Id :
WPTLLOFITJBTPCIRFUNZMICCCONJSFMEEMUDLO
Headers:
X-Greylist: delayed 870 seconds by postgrey-1.23 at coral.dslreports.com; Fri, 28 Mar 2008 12:49:54 EDT
Received: from costanzosbakery.com (mail.costanzosbakery.com [72.45.146.150])
by mail.dslr.net (Postfix) with ESMTP id 4CF4D4374F
for <removed@dslr.net>; Fri, 28 Mar 2008 12:49:54 -0400 (EDT)
Received: from User ([209.132.209.130]) by costanzosbakery.com with Microsoft SMTPSVC(6.0.3790.1830);
Fri, 28 Mar 2008 12:11:22 -0400
Reply-To: <do-not-reply@visa.com>
From: "VISA"<security@visa.com>
Subject: VISA Security Department temporary disabled your account.
Date: Fri, 28 Mar 2008 09:11:21 -0700
MIME-Version: 1.0
Content-Type: text/plain;
charset="Windows-1251"
Content-Transfer-Encoding: 7bit
X-Priority: 1
X-MSMail-Priority: High
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
Message-ID: <SERVER2003HrdZ6Vzvd00006939@costanzosbakery.com>
X-OriginalArrivalTime: 28 Mar 2008 16:11:22.0725 (UTC) FILETIME=[5D9D1150:01C890EE]
To: undisclosed-recipients:;
-- irc.removed.us - #dslr | DSLR Phishtracker | Email: removed@dslr.net |
|
 nwrickertsand groperPremium,MVM join:2004-09-04 Geneva, IL kudos:7 Reviews:
·AT&T U-Verse
| reply to nwrickert
[Phish] Credit Union 1 vish (ATM card)Card Deactivation Message from: Customer Service Date: 04/02/2008 We detected irregular activity on your ATM/Check Card on 04/02/2008. For your protection we have had to suspend any future authorizations being conducted with your card. For your security we have deactivate your card. How to activate/re-activate your card ? You may stop by your branch or call our Activation Center.
Activation Center: (866) 722-3235 (24 Hour Line) Our automated system allows you to quickly activate your card. We apologize for any inconvenience this may cause. Copyright © 2008 Credit Union 1. All Rights Reserved.
Return-Path: <creditunion1@membersecurity.com>
Received: from delagarzafence.com (2003-sbs.delagarzafence.com [68.91.246.105])
by mp.cs.niu.edu (8.14.2/8.14.2) with ESMTP id m32INure009129
for <munged@cs.niu.edu>; Wed, 2 Apr 2008 13:24:01 -0500 (CDT)
Received: from User ([65.66.160.78]) by delagarzafence.com with Microsoft SMTPSVC(6.0.3790.3959);
Wed, 2 Apr 2008 11:52:13 -0500
Reply-To: <noreply@membersecurity.com>
From: "Credit Union 1"<creditunion1@membersecurity.com>
Subject: Card Deactivation
Date: Wed, 2 Apr 2008 11:53:00 -0500
MIME-Version: 1.0
Content-Type: text/html;
charset="Windows-1251"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
Bcc:
Message-ID: <2003-SBS5W3xNbMrRn00000073e@delagarzafence.com>
X-OriginalArrivalTime: 02 Apr 2008 16:52:13.0280 (UTC) FILETIME=[E652D600:01C894E1]
<p><font face="Arial"> <img src="http://boxbownow.com/a/header.gif" width="339" height="92"></font></p>
<p><font face="Arial"> </font><font face="Arial"> <font size="2"><strong>Card Deactivation <br />
</strong></font></font><strong><font size="2" face="Arial"> Message from: Customer Service<br />
Date: 04/02/2008</font></strong></p>
<p><font face="Arial"> <font size="2"> We detected irregular activity on your ATM/Check Card on 04/02/2008.<br />
</font></font><font face="Arial"> <font size="2"> </font></font><font size="2" face="Arial">For your protection we have had to suspend any future authorizations<b
r>
being conducted with
your card</font><font size="2">.</font></p>
<p><font size="2" face="Arial"> For your security we have deactivate your card.</font></p>
<p><font size="2" face="Arial"> How to activate/re-activate your card ?</font></p>
<p><font size="2" face="Arial"> You may stop by your branch or call our Activation Center. <br>
<br>
<strong><font color="#CC0000">Activation Center: (866) 722-3235 (24 Hour Line)</font></strong></font></p>
<p><font size="2" face="Arial"> Our automated system allows you to quickly activate your card.<br />
We apologize for any inconvenience this may cause<font size="1">.</font></font></p>
<p><font size="2" face="Arial"> Copyright © 2008 Credit Union 1. All Rights Reserved.</font><font face="Arial"><br />
</font><br>
</p>
-- AT&T dsl; Westell 327w modem/router; SuSE 10.1; firefox 2.0.0.13 |
|
 Doctor FourMy other vehicle is a TARDISPremium join:2000-09-05 Dallas, TX | reply to nwrickert
Re: [Phish] Telephone phishing threadThis one apparently from CUNA regarding the Wal-Mart data breach seems to be quite suspicious. It had me fooled for a minute, until I looked more closely at the headers. Nice try. As before, the only thing changed is the name in the X- Apparently-To: header: X-Apparently-To: x@yahoo.com via 66.163.178.135; Sun, 06 Apr 2008 10:14:58 -0700
X-YahooFilteredBulk:217.40.42.57
X-Originating-IP:[217.40.42.57]
Return-Path:<customerservice@cona.com>
Authentication-Results:mta134.mail.re3.yahoo.com from=; domainkeys=neutral (no sig)
Received:from 217.40.42.57 (EHLO erissrv1.eris.org.uk) (217.40.42.57) by mta134.mail.re3.yahoo.com with SMTP; Sun, 06 Apr 2008 10:14:57 -0700
Received:from cona.com ([74.7.27.50]) by erissrv1.eris.org.uk with Microsoft SMTPSVC(5.0.2195.6713); Sun, 6 Apr 2008 17:36:49 +0100
From:CUNA@ Add Mobile Alert
To:nataleemorse@yahoo.com
Subject:Wal-Mart Stores, Inc. Data Breach Announcment
Date:06 Apr 2008 11:36:39 -0500
Message-ID:<20080406113639.BCE6A283E7E711F5@from.header.has.no.domain>
MIME-Version:1.0
Content-Type:text/html; charset="iso-8859-1"
Content-Transfer-Encoding:quoted-printable
Return-Path:customerservice@cona.com
X-OriginalArrivalTime:06 Apr 2008 16:36:49.0531 (UTC) FILETIME=[6960ECB0:01C89804]
Content-Length:2742
WAL-MART STORES, INC. DATA BREACH ANNOUNCMENT
April/06/2008
CUNA is aware of the recent data breach at Wal-Mart Stores, Inc. and is taking
proactive steps to address the situation. The Customer Security Team at CUNA
is currently gathering information regarding the data breach and will react swiftly
in the best interests of its customers, including the re-issue of compromised
cards if necessary.
It is important to note that CUNA has effective fraud monitoring systems in
place and is constantly reviewing our accounts for fraudulent and/or suspicious
activity. The security of your account is very important to us.
Moving forward, we recommend that all CUNA customers review their account
activity on an ongoing basis and report to us any suspicious activity. In addition,
it is recommended that customers activate "Enhanced Card Security" to block
Please call Customer Care at 1-800-794-9672, to activate (Enhanced Card Security)
for your debit or credit card.
Due to the extensive news coverage of this event, there have been reports of other
scams. If you receive a phone call or email from someone claiming to be from
Visa, or MasterCard DO NOT provide them with any personal or account information
Please visit http://www.nophishing.org/ for further information regarding fraud.
Finally, you may continue to use your debit card. Customers who have been affected
by the data breach will be notified, and be given further instructions via postal mail. If
you have immediate questions regarding your account, please contact Customer Care
at 1-800-794-9672, option 1.
-- "The trouble with computers, of course, is that they are very sophisticated idiots." - Doctor Who (from Robot)
|
|
 DC DSLThere's a reason I'm Command.Premium join:2000-07-30 Washington, DC kudos:2 Reviews:
·Covad Communicat..
·Verizon Online DSL
| reply to nwrickert I got a Franklin. I called the number. There's a semi-realistic TRS on it that asks for the card number, PIN, expiration date.
I put in completely bogus info (like 1234567812345678 for the card number). After a brief pause, it came back with "card, PIN or expiration are not valid, please reenter." So, I made up different info. It took it, said the card is now active and valid worldwide and ended.
I called back a few more times. Sometimes I gave it identical data, others not. It took it all just the same.
It seems that it tries to make it seem legit to get someone to reenter the info to make sure they've got a live one. However, they farkled it and it doesn't catch mismatches.
This would be great rainy-day fun wasting their time and flooding them with bogus data if it wasn't a toll-free number that captures the number you're calling from regardless of caller id blocking. (Anyone near a pay phone wanna give it a go and see if they're stupid enough to not have blocked pay station callers?)
=====
Return-Path: Received: from mail.im3.com [216.201.16.126] by mail.ultimahosts.com with SMTP; Fri, 11 Apr 2008 16:25:02 -0400 Received: from User (unverified [72.28.171.9]) by cartman.im3.com (Vircom SMTPRS 4.4.568.66) with ESMTP id ; Fri, 11 Apr 2008 15:53:41 -0400 X-Modus-BlackList: bankfranklin@franklinsecurity.com=OK X-Modus-Audit: FALSE;0;0;0 Reply-To: From: "Franklin Bank" Subject: Card Deactivation Date: Fri, 11 Apr 2008 15:53:36 -0400 MIME-Version: 1.0 Content-Type: text/html; charset="Windows-1251" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2600.0000 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000 X-Rcpt-To: X-SmarterMail-Spam: SPF_None
Card Deactivation Message from: Customer Service Date: 04/10/2008 We detected irregular activity on your ATM/Check Card on 04/10/2008. For your protection we have had to suspend any future authorizations being conducted with your card. For your security we have deactivate your card. How to activate/re-activate your card ? You may stop by your branch or call our Activation Center.
Activation Center: (866) 578-0984 (24 Hour Line)
Our automated system allows you to quickly activate your card. We apologize for any inconvenience this may cause. Copyright © 2006 Franklin Bank. All Rights Reserved. -- There is no giant fur-bearing trout. |
|
 Doctor FourMy other vehicle is a TARDISPremium join:2000-09-05 Dallas, TX | reply to nwrickert
Another Franklin Bank one: X-Apparently-To: x@yahoo.com via 66.163.178.135; Tue, 15 Apr 2008 09:09:54 -0700
X-YahooFilteredBulk:64.34.200.180
X-Originating-IP:[64.34.200.180]
Return-Path:<bankfranklin@franklin.com>
Authentication-Results:mta112.mail.re3.yahoo.com from=franklin.com; domainkeys=neutral (no sig)
Received:from 64.34.200.180 (EHLO web420.linux-hosting.com) (64.34.200.180) by mta112.mail.re3.yahoo.com with SMTP; Tue, 15 Apr 2008 09:09:53 -0700
Received:from User (72-28-171-009-dhcp.aik.sc.atlanticbb.net [72.28.171.9]) (authenticated bits=0) by web420.linux-hosting.com (8.13.1/8.13.1) with ESMTP id m3FFmMlk010716; Tue, 15 Apr 2008 21:18:22 +0530
Message-Id:<200804151548.m3FFmMlk010716@web420.linux-hosting.com>
Reply-to:<noreply@franklinsecurity.com>
From:"Franklin Bank" <bankfranklin@franklin.com> Add Mobile Alert
Subject:Card Deactivation
Date:Tue, 15 Apr 2008 12:01:07 -0400
MIME-Version:1.0
Content-Type:text/plain; charset="Windows-1251"
Content-Transfer-Encoding:7bit
X-Priority:3
X-MSMail-Priority:Normal
X-Mailer:Microsoft Outlook Express 6.00.2600.0000
X-MimeOLE:Produced By Microsoft MimeOLE V6.00.2600.0000
Content-Length:563
Card Deactivation
Message from: Customer Service
Date: 04/15/2008
We detected irregular activity on your ATM/Check Card on 04/15/2008.
For your protection we have had to suspend any future authorizations
being conducted with your card.
For your security we have deactivate your card.
How to activate/re-activate your card ?
You may stop by your branch or call our Activation Center:
Activation Center: (866) 797-5640 (24 Hour Line)
Our automated system allows you to quickly activate your card.
We apologize for any inconvenience this may cause..
-- "The trouble with computers, of course, is that they are very sophisticated idiots." - Doctor Who (from Robot)
|
|
|
|
 SnowymIRC unix.ro UnderNetPremium join:2003-04-05 Kailua, HI kudos:6 Reviews:
·RoadRunner Cable
·Clearwire Wireless
| reply to nwrickert
Lizz_Vish_Archived X-Apparently-To: myemail@pacbell.net via 209.191.85.225; Tue, 15 Apr 2008 10:39:54 -0700 X-Originating-IP:[212.85.249.132] Return-Path: Authentication-Results:mta121.sbc.mail.mud.yahoo.com from=franklin.com; domainkeys=neutral (no sig) Received:from 207.115.36.53 (EHLO nlpi024.prodigy.net) (207.115.36.53) by mta121.sbc.mail.mud.yahoo.com with SMTP; Tue, 15 Apr 2008 10:39:52 -0700 X-Header-Overseas:Mail.from.Overseas.source.212.85.249.132 X-Originating-IP:[212.85.249.132] Received:from node-2.minx.net.uk (node-2.minx.net.uk [212.85.249.132]) by nlpi024.prodigy.net (8.13.8 inb regex/8.13.8) with ESMTP id m3FHdoDY014536 for ; Tue, 15 Apr 2008 12:39:50 -0500 Received:from [195.82.101.89] (helo=mail.QuantumFittedFurniture.co.uk) by node-2.minx.net.uk with esmtp (Exim 4.60) (envelope-from ) id 1JlpIR-0005rN-Og for myemail@pacbell.net; Tue, 15 Apr 2008 18:50:20 +0100 Received:from User ([192.168.0.250] RDNS failed) by mail.QuantumFittedFurniture.co.uk with Microsoft SMTPSVC(6.0.3790.3959); Tue, 15 Apr 2008 18:29:09 +0100 Reply-to: From:"Franklin Bank" Add to Address BookAdd to Address Book Add Mobile Alert Subject:Card Deactivation Date:Tue, 15 Apr 2008 13:39:36 -0400 MIME-Version:1.0 Content-Type:text/plain; charset="Windows-1251" Content-Transfer-Encoding:7bit X-Priority:3 X-MSMail-Priority:Normal X-Mailer:Microsoft Outlook Express 6.00.2600.0000 X-MimeOLE:Produced By Microsoft MimeOLE V6.00.2600.0000 Bcc: Message-ID: X-OriginalArrivalTime:15 Apr 2008 17:29:10.0078 (UTC) FILETIME=[37021DE0:01C89F1E] X-MINX-Orig-IP:195.82.101.89 X-Spam-Score:2.9 (++) X-Spam-Level:++ Content-Length:563
Card Deactivation Message from: Customer Service Date: 04/15/2008
We detected irregular activity on your ATM/Check Card on 04/15/2008. For your protection we have had to suspend any future authorizations being conducted with your card.
For your security we have deactivate your card.
How to activate/re-activate your card ?
You may stop by your branch or call our Activation Center:
Activation Center: (866) 797-5640 (24 Hour Line) |
|
 Doctor FourMy other vehicle is a TARDISPremium join:2000-09-05 Dallas, TX | reply to nwrickert
Re: [Phish] Telephone phishing threadYet another Franklin Bank one, trying to look legitimate by warning recipients of phishing scams. They're not fooling me. The phone number's likely bogus, and the IP address 72.28.171.9 is likely a botnet zombie (it certainly isn't one of Franklin's IPs). The Corporate Office address is real, however. X-Apparently-To: x@yahoo.com via 66.163.178.140; Mon, 21 Apr 2008 12:15:14 -0700
X-YahooFilteredBulk:8.10.184.138
X-Originating-IP:[8.10.184.138]
Return-Path:<franklinbank@ddsadsa.com>
Authentication-Results:mta250.mail.re3.yahoo.com from=ddsadsa.com; domainkeys=neutral (no sig)
Received:from 8.10.184.138 (EHLO mail.wghco.com) (8.10.184.138) by mta250.mail.re3.yahoo.com with SMTP; Mon, 21 Apr 2008 12:15:14 -0700
Received:from User ([72.28.171.9]) by mail.wghco.com with Microsoft SMTPSVC(6.0.3790.3959); Mon, 21 Apr 2008 11:49:39 -0700
From:"Franklin Bank" <franklinbank@ddsadsa.com> Add Mobile Alert
Subject:SECURITY ALERT!
Date:Mon, 21 Apr 2008 14:48:37 -0400
MIME-Version:1.0
Content-Type:text/html; charset="Windows-1251"
Content-Transfer-Encoding:7bit
X-Priority:3
X-MSMail-Priority:Normal
X-Mailer:Microsoft Outlook Express 6.00.2600.0000
X-MimeOLE:Produced By Microsoft MimeOLE V6.00.2600.0000
Bcc:
Return-Path:franklinbank@ddsadsa.com
Message-ID:<HENSCHEN7n0swXX1sPt00000677@mail.wghco.com>
X-OriginalArrivalTime:21 Apr 2008 18:49:39.0703 (UTC) FILETIME=[742AE870:01C8A3E0]
X-TM-AS-Product-Ver:SMEX-7.5.0.1243-5.0.1023-15864.001
X-TM-AS-Result:Yes-21.877000-4.000000-31
X-TM-AS-User-Approved-Sender:No
X-TM-AS-User-Blocked-Sender:No
Content-Length:1586
Dear Franklin Bank Customer,
Franklin Bank is aware of new phishing e-mails that are circulating.
These e-mails request consumers to click a link due to a compromise of a
credit card account. You should not respond to this message.
Due to unusual levels of fraud we have had to suspend any future authorizations
being conducted with your Visa ATM/Check Card.
For your security we have deactivate your card.
How to activate/re-activate your card ?
Call our Card Department: (866) 797-5643
Our automated system allows you to quickly activate your card.
We apologize for any inconvenience this may cause.
Corporate Office
9800 Richmond, Suite 680
Houston, TX 77042
Copyright © 2006 Franklin Bank. All Rights Reserved.
-- "The trouble with computers, of course, is that they are very sophisticated idiots." - Doctor Who (from Robot)
|
|
 Doctor FourMy other vehicle is a TARDISPremium join:2000-09-05 Dallas, TX | reply to nwrickert
Another Franklin Bank one, same phone number as before: X-Apparently-To: x@yahoo.com via 66.163.178.138; Tue, 22 Apr 2008 15:07:58 -0700
X-YahooFilteredBulk:74.52.162.130
X-Originating-IP:[74.52.162.130]
Return-Path:<franklinbank@mesanetworks.net>
Authentication-Results:mta209.mail.re4.yahoo.com from=; domainkeys=neutral (no sig)
Received:from 74.52.162.130 (EHLO mx11.mesanetworks.net) (74.52.162.130) by mta209.mail.re4.yahoo.com with SMTP; Tue, 22 Apr 2008 15:07:56 -0700
Received:(qmail 9582 invoked by uid 509); 22 Apr 2008 11:26:37 -0600
Received:from 72.19.158.63 by mx11.mesanetworks.net (envelope-from <franklinbank@mesanetworks.net>, uid 508) with qmail-scanner-1.25-st-qms (clamdscan: 0.87/2133. spamassassin: 3.0.6. perlscan: 1.25-st-qms. Clear:RC:1(72.19.158.63):. Processed in 0.525889 secs); 22 Apr 2008 17:26:37 -0000
X-Antivirus-MESANETWORKS-Mail-From:franklinbank@mesanetworks.net via mx11.mesanetworks.net
X-Antivirus-MESANETWORKS:1.25-st-qms (Clear:RC:1(72.19.158.63):. Processed in 0.525889 secs Process 9540)
Received:from 72-19-158-63.static.mesanetworks.net (HELO User) (72.19.158.63) by mx11.mesanetworks.net with SMTP; 22 Apr 2008 11:26:36 -0600
Reply-to:<noreply@mesanetworks.net>
From:"Franklin Bank" <franklinbank@mesanetworks.net> Add Mobile Alert
Subject:SECURITY ALERT!
Date:Tue, 22 Apr 2008 11:26:31 -0600
MIME-Version:1.0
Content-Type:text/html; charset="Windows-1251"
Content-Transfer-Encoding:7bit
X-Priority:3
X-MSMail-Priority:Normal
X-Mailer:Microsoft Outlook Express 6.00.2600.0000
X-MimeOLE:Produced By Microsoft MimeOLE V6.00.2600.0000
X-Antivirus-MESANETWORKS-Message-ID:<120888519710709540@mx11.mesanetworks.net>
Content-Length:1584
Dear Franklin Bank Customer,
Franklin Bank is aware of new phishing e-mails that are circulating.
These e-mails request consumers to click a link due to a compromise of a
credit card account. You should not respond to this message.
Due to unusual levels of fraud we have had to suspend any future authorizations
being conducted with your Visa ATM/Check Card.
For your security we have deactivate your card.
How to activate/re-activate your card ?
Call our Card Department: (866) 797-5643
Our automated system allows you to quickly activate your card.
We apologize for any inconvenience this may cause.
Corporate Office
9800 Richmond, Suite 680
Houston, TX 77042
Copyright © 2006 Franklin Bank. All Rights Reserved.
-- "The trouble with computers, of course, is that they are very sophisticated idiots." - Doctor Who (from Robot)
|
|
 Doctor FourMy other vehicle is a TARDISPremium join:2000-09-05 Dallas, TX 3 edits | reply to nwrickert
Amarillo National Bank vish: X-Apparently-To: x@yahoo.com via 66.163.178.133; Thu, 24 Apr 2008 07:31:59 -0700
X-Originating-IP:[65.104.246.242]
Return-Path:<customer_service@anb.com>
Authentication-Results:mta101.mail.re3.yahoo.com from=; domainkeys=neutral (no sig)
Received:from 65.104.246.242 (EHLO mail.kwp.org) (65.104.246.242) by mta101.mail.re3.yahoo.com with SMTP; Thu, 24 Apr 2008 07:31:57 -0700
Received:from ([]) by mail.kwp.org (Merak 4.2.3) with SMTP id KPJ36965 for <x@yahoo.com>; Thu, 24 Apr 2008 09:31:56 -0500
From:Amarillo@ Add Mobile Alert ,
To:x@yahoo.com
Subject:ANB Secure Email Notification
Date:24 Apr 2008 09:29:41 -0500
Message-ID:<20080424092941.2195C1DDD96B4626@from.header.has.no.domain>
MIME-Version:1.0
Content-Type:text/html; charset="iso-8859-1"
Content-Transfer-Encoding:quoted-printable
Content-Length:1653
URLs for both the forged ANB and Verisign logos in the body of the phish (posted as JPG as it is all html) ANB: hxxp://jeannemcallister.com/logo.gif Verisign: hxxp://jeannemcallister.com/logo-verisign.gif -- "The trouble with computers, of course, is that they are very sophisticated idiots." - Doctor Who (from Robot)
|
|
 LizzPremium join:2002-10-22 Fullerton, CA | reply to nwrickert
A vish AND a phish, all in one! (and with all the spamcatcher info in the header, ATT/Yahoo still left it in my inbox, not the bulk  ) From Bank of America Fri May 2 06:59:39 2008 X-Apparently-To: XXX@pacbell.net via 209.191.85.223; Fri, 02 May 2008 07:01:12 -0700 X-Originating-IP: [64.97.155.27] Return-Path: Authentication-Results: mta136.sbc.mail.re3.yahoo.com from=alerts.bankofamerica.com; domainkeys=neutral (no sig) Received: from 207.115.20.65 (EHLO flpi096.prodigy.net) (207.115.20.65) by mta136.sbc.mail.re3.yahoo.com with SMTP; Fri, 02 May 2008 07:01:12 -0700 X-Originating-IP: [64.97.155.27] Received: from sc2.he.tucows.com (smtpout2027.sc2.he.tucows.com [64.97.155.27]) by flpi096.prodigy.net (8.13.8 inb regex/8.13.8) with ESMTP id m42E1Bpw001455 for ; Fri, 2 May 2008 07:01:11 -0700 Received: from sc2-out04.emaildefenseservice.com (64.97.201.174) by sc2.he.tucows.com (7.3.127) id 48188F54000E71E6; Fri, 2 May 2008 13:59:46 +0000 Message-ID: (added by postmaster@globo.com) X-SpamScore: 96 X-Spamcatcher-Summary: 96,15,0,9ea1071f6304b62f,0631c5bc6dd70dd7,alert@alerts.bankofamerica.com,-, X-Spamcatcher-Explanation: (33%) BODY: mail is from Bank of America but doesn't contain any Bank of America URLS;(27%) BODY: likely phishing content;(13%) X-MAILER: mail headers not consistent with User Agent "Outlook";(13%) HTML: HTML code not consistent with User Agent "Outlook";(7%) BODY: text/html email has no html tag;(7%) BODY: content type is strictly "text/html"; Received: from User (unknown [41.223.251.88]) (Authenticated sender: atm05@globo.com) by sc2-out04.emaildefenseservice.com (Postfix) with ESMTP; Fri, 2 May 2008 13:59:19 +0000 (UTC) From: "Bank of America" Add to Address BookAdd to Address Book Add Mobile Alert Subject: Online Banking Verification Date: Fri, 2 May 2008 14:59:39 +0100 MIME-Version: 1.0 Content-Type: text/html; charset="Windows-1251" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2600.0000 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000 Content-Length: 2867 Dear Valued Bank of America Online Customer: IMPORTANT: Your online account information must be confirmed and verified to ensure uninterrupted service. To enhance the level of service you receive with Bank of America Online Services, we regularly review the online banking accounts. We have issued this warning message to inform you that we have detected a slight error in your account information. This might be due to either of the following reasons:. bullet A recent change in your personal information ( i.e.change of address). bullet Submiting invalid information during the initial sign up process. bullet An inability to accurately verify your selected option of payment due to an internal error within our processors. As a result, we require you to confirm and verify your account information By Clicking Here and completing the confirmation process. Note However, failure to confirm and verify your account information will result in temporarily account suspension. Please understand that this is a security measure intended to help protect you and your account. We apologize for any inconvenience. If you have any question regarding this, please call us at 888-692-5949, 24 hours a day, seven days a week. or simply Sign In to Online Banking and click on "Help". Thank you for banking at Bank of America. We look forward to serving your financial needs for many years to come. |
|
 LizzPremium join:2002-10-22 Fullerton, CA | So you all don't think I'm nuts, the "simply sign on" is a link to a phishing site which DOES show in phishtracker. |
|
 SnowymIRC unix.ro UnderNetPremium join:2003-04-05 Kailua, HI kudos:6 Reviews:
·RoadRunner Cable
·Clearwire Wireless
| reply to nwrickert
Delivered-To: no.job.needed@gmail.com
Received: by 10.142.155.4 with SMTP id c4cs16970wfe;
Wed, 14 May 2008 08:55:10 -0700 (PDT)
Received: by 10.35.28.12 with SMTP id f12mr2105619pyj.45.1210780510055;
Wed, 14 May 2008 08:55:10 -0700 (PDT)
Return-Path: <test@telus.net>
Received: from defout.telus.net (defout.telus.net [199.185.220.240])
by mx.google.com with ESMTP id f24si4254145pyh.26.2008.05.14.08.55.09;
Wed, 14 May 2008 08:55:09 -0700 (PDT)
Received-SPF: pass (google.com: domain of test@telus.net designates 199.185.220.240 as permitted sender) client-ip=199.185.220.240;
Authentication-Results: mx.google.com; spf=pass (google.com: domain of test@telus.net designates 199.185.220.240 as permitted sender) smtp.mail=test@telus.net
Received: from priv-edtnaa16.telusplanet.net ([206.116.132.29])
by priv-edtnes25.telusplanet.net
(InterMail vM.7.08.02.02 201-2186-121-104-20070414) with ESMTP
id <20080514155450.QWUB16573.priv-edtnes25.telusplanet.net@priv-edtnaa16.telusplanet.net>;
Wed, 14 May 2008 09:54:50 -0600
Received: from User (d206-116-132-29.bchsia.telus.net [206.116.132.29])
by priv-edtnaa16.telusplanet.net (BorderWare MXtreme Infinity Mail Firewall) with SMTP
id 83448V1ULV; Wed, 14 May 2008 09:55:09 -0600 (MDT)
From: "test" <test@telus.net>
Subject: fdfdfdfdfd55
Date: Wed, 14 May 2008 08:55:10 -0700
MIME-Version: 1.0
Content-Type: text/plain;
charset="Windows-1251"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
Message-Id: <20080514155509.83448V1ULV@priv-edtnaa16.telusplanet.net>
To: undisclosed-recipients:;
Dear MasterCard customer,
We regret to inform you that we have received numerous fraudulent emails which ask for personal
account information. The emails contained links to fraudulent pages that looked legit.
Please remember that we will never ask for personal account information via email or web pages.
Because of this we are launching a new security system to make MasterCard accounts more secure
and safe. To take advatage of our new consumer Identity Theft Protection Program we had to
deactivate access to your card account.
To activate it please call us immediately at (615) 348-6681
Activation is free of charge and will take place as soon as you finish the activation process.
? 1994-2008 MasterCard. All rights reserved.
|
|
 nwrickertsand groperPremium,MVM join:2004-09-04 Geneva, IL kudos:7 Reviews:
·AT&T U-Verse
| reply to nwrickert
EPPIcard vish 772-924-0104Email message text:
Dear EPPICard member,
We recently reviewed your account, and suspect that your EPPICard account may have been accessed from an unauthorized computer. This may be due to changes in your IP address or location. Protecting the security of your account and the EPPICard network is our primary concern. Therefor, we have temporarily blocked your banking account.
To unlock your account call our toll free number: 772-924-0104
To protect your account please follow the instructions below: - NEVER SHARE YOUR PASSWORD with other persons - ALWAYS LOG OFF after using your online account - NEVER access EPPICard`s website by clicking on a link provided in an e-mail
We apologize for any inconvenience this may cause, and appreciate your assistance in helping us maintaining the integrity of the entire EPPICard System.
Thank you, EPPICard Security Advisor.
Copyright 2008 EPPICard - The safe and secure way to acces your payments.
Headers:
Return-Path: <notice@eppicard.com>
Received: from NYSWEB.COM ([64.65.53.19])
by mp.cs.niu.edu (8.14.3/8.14.3) with ESMTP id m4LFYOsj010468
(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT)
for <x@x>; Wed, 21 May 2008 10:34:29 -0500 (CDT)
Message-Id: <200805211534.m4LFYOsj010468@mp.cs.niu.edu>
Received: (qmail 19262 invoked from network); 21 May 2008 10:52:33 -0400
Received: from tutlani.com (HELO User) (207.210.93.11)
by nacentertainment.com with SMTP; 21 May 2008 10:52:33 -0400
Reply-To: <do-not-reply@eppicard.com>
From: "EPPICard"<notice@eppicard.com>
To: x@x, x@x, x@x,
x@x, x@x, x@x,
x@x, x@x,
x@x, x@x
Subject: Urgent Notification!
Date: Wed, 21 May 2008 10:52:33 -0400
MIME-Version: 1.0
Content-Type: text/plain;
charset="Windows-1251"
Content-Transfer-Encoding: 7bit
X-Priority: 1
X-MSMail-Priority: High
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
-- AT&T dsl; Westell 327w modem/router; SuSE 10.1; firefox 2.0.0.14 |
|
 Doctor FourMy other vehicle is a TARDISPremium join:2000-09-05 Dallas, TX 1 edit | reply to nwrickert
Re: [Phish] Telephone phishing threadAA/Citibank Vish ( also submitted to Phishtracker - see below) - posted here because there's also a telephone number. X-Apparently-To: x@yahoo.com via 66.163.178.133; Thu, 29 May 2008 15:13:17 -0700
X-YahooFilteredBulk:71.165.227.158
X-Originating-IP:[71.165.227.158]
Return-Path:<american.airlines@aa.com>
Authentication-Results:mta361.mail.mud.yahoo.com from=aa.com; domainkeys=neutral (no sig)
Received:from 71.165.227.158 (EHLO rlmurawski.com) (71.165.227.158) by mta361.mail.mud.yahoo.com with SMTP; Thu, 29 May 2008 15:13:17 -0700
Received:from aa.com ([71.170.119.34]) by rlmurawski.com with Microsoft SMTPSVC(6.0.3790.211); Thu, 29 May 2008 15:05:34 -0700
Reply-to:American.Airlines@aas.com
From:American.Airlines@aa.com
To:x@yahoo.com
Subject:Citi / AAdvantage MasterCard (Alerting Service)
Date:29 May 2008 16:55:03 -0500
Message-ID:<20080529165503.DE8515CF9B566BEF@aa.com>
MIME-Version:1.0
Content-Type:text/html; charset="iso-8859-1"
Content-Transfer-Encoding:quoted-printable
Return-Path:American.Airlines@aa.com
X-OriginalArrivalTime:29 May 2008 22:05:34.0265 (UTC) FILETIME=[1E213A90:01C8C1D8]
Content-Length:2060
Edit: This did not successfully get parsed by Phishtracker. The link first leads to hxxp://mail.mrfood.com/logo_servis.gif, but then redirects to hxxp://mail.opt-al.com/www.citicards.com/cards/wv/copy.doscreenID1214.htm (The second link has already been reported to Google as a web forgery, and is still active as of the time of this post.) -- "The trouble with computers, of course, is that they are very sophisticated idiots." - Doctor Who (from Robot)
|
|
 Doctor FourMy other vehicle is a TARDISPremium join:2000-09-05 Dallas, TX | reply to nwrickert A Point Bank vish that arrived today:
Return-Path: <info@pointbank.com>
Authentication-Results: mta156.mail.re1.yahoo.com from=pointbank.com; domainkeys=neutral (no sig)
Received: from 99.129.23.5 (EHLO web.mavcomp.com) (99.129.23.5) by mta156.mail.re1.yahoo.com with SMTP; Fri, 30 May 2008 05:51:48 -0700
Received: from User ([68.213.182.38]) by web.mavcomp.com with Microsoft SMTPSVC(6.0.3790.3959); Fri, 30 May 2008 07:51:04 -0500
From:
"PointBank"<info@pointbank.com>
Add sender to Contacts
Subject: Contact Us
Date: Fri, 30 May 2008 08:03:10 -0500
MIME-Version: 1.0
Content-Type: text/html; charset="Windows-1251"
Content-Transfer-Encoding: 7bit
Bcc:
Return-Path: info@pointbank.com
Message-ID: <WEBNXGjjuH9z7frxNkm00000121@web.mavcomp.com>
Content-Length: 833
Dear CardHolder, Your debit card has open issues Contact us immediately for assistance. Toll Free Line: 1-(877)- 596-6749
-- "The trouble with computers, of course, is that they are very sophisticated idiots." - Doctor Who (from Robot)
|
|
 Doctor FourMy other vehicle is a TARDISPremium join:2000-09-05 Dallas, TX | reply to nwrickert One from WAMU:
From: "WAMU" <office@wamu.com>
To: undisclosed-recipients
Return-Path: <office@wamu.com>
Authentication-Results: mta289.mail.re2.yahoo.com from=wamu.com; domainkeys=neutral (no sig)
Received: from 70.158.128.6 (EHLO POP.brmemc.net) (70.158.128.6) by mta289.mail.re2.yahoo.com with SMTP; Wed, 16 Jul 2008 22:48:25 -0700
Received: from User (unverified [141.164.8.38]) by POP.brmemc.net (Vircom SMTPRS 4.5.654.13) with ESMTP id <B0187023259@POP.brmemc.net>; Wed, 16 Jul 2008 13:51:49 -0400
Reply-To: <do-not-reply@wamu.com>
From:
"WAMU"<office@wamu.com>
Add sender to Contacts
Subject: Urgent Notification
Date: Wed, 16 Jul 2008 12:50:52 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset="Windows-1251"
Content-Transfer-Encoding: 7bit
Content-Length: 385
This part of the message is invisible. I found it by checking the page source:
"To activate your account please call urgent at 713-481-1635."
-- "The trouble with computers, of course, is that they are very sophisticated idiots." - Doctor Who (from Robot)
|
|
 jaykaykay4 Ever YoungPremium,MVM join:2000-04-13 Scottsdale, AZ kudos:22 | reply to nwrickert Ooops. I guess I am a bit late! I just posted a thread about this in the Security Forum. Oh well. The more that hear about it, the better. |
|
 nwrickertsand groperPremium,MVM join:2004-09-04 Geneva, IL kudos:7 Reviews:
·AT&T U-Verse
| Not a problem.
This thread is mainly for reporting specific instances. So discussing the phenomenon in a different thread is fine.
I'll add a link to your other thread: »Criminals have now gone 'vishing' -- AT&T dsl; Westell 327w modem/router; openSuSE 11.0; firefox 3.0.1 |
|