dslreports logo
site
    All Forums Hot Topics Gallery
spc
Search Topic:
uniqs
56375
share rss forum feed


removed
Premium,VIP
join:2002-02-08
Houston, TX
kudos:40
reply to removed

Re: [Phish] Telephone phishing thread

February 4:
quote:
Dear Empire Bank Cardholder,

We detected irregular activity on your debit/credit card on 02/03/2008.
For your security, your online banking profile has been locked due to inactivity or because
of too many failed login attempts.

Empire Bank is serious about safeguarding your personal information online.

Unlocking your profile will take approximately one minute to complete .

To reactivate your debit/credit card :

Immediately call 1-(800) 929-3209 Monday-Friday during office hours.

or after hours and on weekends to reactivate your debit/credit card.

Member FDIC · Equal Housing Lender· © 2007 Empire Bank
Headers:
Return-path: <gribble.dale+caf_=gumu=removed.us@gmail.com>
Envelope-to: gumu@removed.us
Delivery-date: Mon, 04 Feb 2008 10:49:54 -0500
Received: from ug-out-1314.google.com ([66.249.92.168]:31498)
by laredo.root--servers.net with esmtp (Exim 4.68)
(envelope-from <gribble.dale+caf_=gumu=removed.us@gmail.com>)
id 1JM3Zu-0001UP-Ow
for gumu@removed.us; Mon, 04 Feb 2008 10:49:54 -0500
Received: by ug-out-1314.google.com with SMTP id q2so17805uge.50
        for <gumu@removed.us>; Mon, 04 Feb 2008 07:49:49 -0800 (PST)
Received: by 10.78.162.4 with SMTP id k4mr12433546hue.66.1202140188297;
        Mon, 04 Feb 2008 07:49:48 -0800 (PST)
X-Forwarded-To: gumu@removed.us
X-Forwarded-For: gribble.dale@gmail.com gumu@removed.us
Delivered-To: gribble.dale@gmail.com
Received: by 10.78.156.16 with SMTP id d16cs104683hue;
        Mon, 4 Feb 2008 07:49:46 -0800 (PST)
Received: by 10.78.137.7 with SMTP id k7mr12431855hud.68.1202140185490;
        Mon, 04 Feb 2008 07:49:45 -0800 (PST)
Received: from centralfloridafair.com (cfsvr1.centralfloridafair.com [64.90.0.1])
        by mx.google.com with ESMTP id p25si1948067hub.29.2008.02.04.07.49.44;
        Mon, 04 Feb 2008 07:49:45 -0800 (PST)
Received-SPF: softfail (google.com: domain of transitioning info@empirebank.com does not designate 64.90.0.1 as permitted sender) client-ip=64.90.0.1;
Authentication-Results: mx.google.com; spf=softfail (google.com: domain of transitioning info@empirebank.com does not designate 64.90.0.1 as permitted sender) smtp.mail=info@empirebank.com
Received: from User ([64.62.123.42]) by centralfloridafair.com with Microsoft SMTPSVC(6.0.3790.3959);
 Mon, 4 Feb 2008 10:43:42 -0500
From: "Empire Bank"<info@empirebank.com>
Subject: Irregular Check Card Activity
Date: Mon, 4 Feb 2008 07:48:39 -0800
MIME-Version: 1.0
Content-Type: text/html;
charset="Windows-1251"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
Bcc:
Message-ID: <CFSVR14Ogddu5qE8DzH0000178c@centralfloridafair.com>
X-OriginalArrivalTime: 04 Feb 2008 15:43:42.0656 (UTC) FILETIME=[B83DE400:01C86744]
X-Spam-Subject: ***SPAM*** Irregular Check Card Activity
X-Spam-Status: Yes, score=11.9
X-Spam-Score: 119
X-Spam-Bar: +++++++++++
X-Spam-Report: Spam detection software, running on the system "laredo.root--servers.net", has
identified this incoming email as possible spam.  The original message
has been attached to this so you can view it (if it isn't spam) or label
similar future email.  If you have any questions, see
the administrator of that system for details.
Content preview:  Dear Empire Bank Cardholder, We detected irregular activity
on your debit/credit card on 02/03/2008. For your security, your online banking
profile has been locked due to inactivity or because of too many failed login
attempts. [...] 
Content analysis details:   (11.9 points, 4.5 required)
pts rule name              description
---- ---------------------- --------------------------------------------------
3.5 BAYES_99               BODY: Bayesian spam probability is 99 to 100%
[score: 1.0000]
-0.0 SPF_PASS               SPF: sender matches SPF record
1.3 MISSING_HEADERS        Missing To: header
2.5 HTML_IMAGE_ONLY_12     BODY: HTML: images with 800-1200 bytes of words
0.0 HTML_MESSAGE           BODY: HTML included in message
1.5 MIME_HTML_ONLY         BODY: Message only has text/html MIME parts
0.1 HTML_MIME_NO_HTML_TAG  HTML-only message, but there is no HTML tag
0.0 FORGED_OUTLOOK_TAGS    Outlook can't send HTML in this format
0.0 FORGED_OUTLOOK_HTML    Outlook can't send HTML message only
3.1 FORGED_MUA_OUTLOOK     Forged mail pretending to be from MS Outlook
X-Spam-Flag: YES
 

--
irc.removed.us - #dslr | DSLR Phishtracker | Email: removed@dslr.net


removed
Premium,VIP
join:2002-02-08
Houston, TX
kudos:40
reply to removed
February 13:
quote:
Dear Customer,

VISA Debit Card , Security Departament temporarily suspended your account.
Reason: Fraud Atempts

We require you to complete an account update so we can unlock your account.

To start the update process please call at total free number : 805-203-4523

The information provided will be treated in confidence and stored in our secure database.
If you fail to provide information about your account you'll discover that your account has been automatically deleted from our database.

Please note the total free number : +1 805-203-4523

Copyright © VISA Debit Card, All Rights Reserved

Headers:
Return-path: <debit@visa.com>
Envelope-to: gumu@removed.us
Delivery-date: Wed, 13 Feb 2008 11:42:35 -0500
Received: from host50-server.com ([66.49.136.205]:42309 helo=host50.host50-server.com)
by laredo.root--servers.net with esmtps (TLSv1:AES256-SHA:256)
(Exim 4.68)
(envelope-from <debit@visa.com>)
id 1JPKgp-0007YL-VN
for gumu@removed.us; Wed, 13 Feb 2008 11:42:35 -0500
Received: from User (host-209-174-182-70.champaignschools.org [209.174.182.70] (may be forged))
(authenticated bits=0)
by host50.host50-server.com (8.12.10/8.12.10) with ESMTP id m1DGl9M4002562;
Wed, 13 Feb 2008 11:47:09 -0500
Message-Id: <200802131647.m1DGl9M4002562@host50.host50-server.com>
Reply-To: <debit@visa.com>
From: "VISA Debit Cards"<debit@visa.com>
Subject: Urgent Notification
Date: Wed, 13 Feb 2008 10:45:05 -0600
MIME-Version: 1.0
Content-Type: text/plain;
charset="Windows-1251"
X-Priority: 1
X-MSMail-Priority: High
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
Content-Transfer-Encoding: quoted-printable
X-MIME-Autoconverted: from 8bit to quoted-printable by host50.host50-server.com id m1DGl9M4002562
X-Spam-Subject: ***SPAM*** Urgent Notification
X-Spam-Status: Yes, score=11.0
X-Spam-Score: 110
X-Spam-Bar: +++++++++++
X-Spam-Report: Spam detection software, running on the system "laredo.root--servers.net", has
identified this incoming email as possible spam.  The original message
has been attached to this so you can view it (if it isn't spam) or label
similar future email.  If you have any questions, see
the administrator of that system for details.
Content preview:  Dear Customer, VISA Debit Card , Security Departament temporarily
suspended your account. Reason: Fraud Atempts We require you to complete
an account update so we can unlock your account. [...] 
Content analysis details:   (11.0 points, 4.5 required)
pts rule name              description
---- ---------------------- --------------------------------------------------
2.8 TVD_PH_SUBJ_URGENT     TVD_PH_SUBJ_URGENT
1.3 MISSING_HEADERS        Missing To: header
3.0 BAYES_95               BODY: Bayesian spam probability is 95 to 99%
[score: 0.9858]
0.8 MSOE_MID_WRONG_CASE    MSOE_MID_WRONG_CASE
3.1 FORGED_MUA_OUTLOOK     Forged mail pretending to be from MS Outlook
X-Spam-Flag: YES
 

--
irc.removed.us - #dslr | DSLR Phishtracker | Email: removed@dslr.net


removed
Premium,VIP
join:2002-02-08
Houston, TX
kudos:40

1 recommendation

reply to removed
February 19:
quote:
Dear Customer,

VISA Debit Card , Security Departament temporarily suspended your account.
Reason: Fraud Atempts

We require you to complete an account update so we can unlock your account.

To start the update process please call at total free number : 847-481-8194

The information provided will be treated in confidence and stored in our secure database.
If you fail to provide information about your account you'll discover that your account has been automatically deleted from our database.

Please note the total free number : +1 847-481-8194

Copyright © VISA Debit Card, All Rights Reserved
Headers:
Return-path: <debit@visa.com>
Envelope-to: gumu@removed.us
Delivery-date: Tue, 19 Feb 2008 12:32:34 -0500
Received: from host101.host101-server.com ([66.49.199.16]:56250)
by laredo.root--servers.net with esmtps (TLSv1:AES256-SHA:256)
(Exim 4.68)
(envelope-from <debit@visa.com>)
id 1JRWKV-0001Me-9y
for gumu@removed.us; Tue, 19 Feb 2008 12:32:34 -0500
Received: from User (playa-capital74.ucn.net [63.110.44.74] (may be forged))
(authenticated bits=0)
by host101.host101-server.com (8.12.10/8.12.10) with ESMTP id m1JHWAmb003323;
Tue, 19 Feb 2008 12:32:12 -0500
Message-Id: <200802191732.m1JHWAmb003323@host101.host101-server.com>
From: "VISA Debit Card"<debit@visa.com>
Subject: Urgent Notification
Date: Tue, 19 Feb 2008 09:36:34 -0800
MIME-Version: 1.0
Content-Type: text/plain;
charset="Windows-1251"
X-Priority: 1
X-MSMail-Priority: High
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
Content-Transfer-Encoding: quoted-printable
X-MIME-Autoconverted: from 8bit to quoted-printable by host101.host101-server.com id m1JHWAmb003323
X-Spam-Subject: ***SPAM*** Urgent Notification
X-Spam-Status: Yes, score=10.0
X-Spam-Score: 100
X-Spam-Bar: ++++++++++
X-Spam-Report: Spam detection software, running on the system "laredo.root--servers.net", has
identified this incoming email as possible spam.  The original message
has been attached to this so you can view it (if it isn't spam) or label
similar future email.  If you have any questions, see
the administrator of that system for details.
Content preview:  Dear Customer, VISA Debit Card , Security Departament temporarily
suspended your account. Reason: Fraud Atempts We require you to complete
an account update so we can unlock your account. [...] 
Content analysis details:   (10.0 points, 4.5 required)
pts rule name              description
---- ---------------------- --------------------------------------------------
2.8 TVD_PH_SUBJ_URGENT     TVD_PH_SUBJ_URGENT
1.3 MISSING_HEADERS        Missing To: header
2.0 BAYES_80               BODY: Bayesian spam probability is 80 to 95%
[score: 0.9225]
0.8 MSOE_MID_WRONG_CASE    MSOE_MID_WRONG_CASE
3.1 FORGED_MUA_OUTLOOK     Forged mail pretending to be from MS Outlook
X-Spam-Flag: YES
 

--
irc.removed.us - #dslr | DSLR Phishtracker | Email: removed@dslr.net


removed
Premium,VIP
join:2002-02-08
Houston, TX
kudos:40
reply to removed
February 20:
quote:
Dear customer,

Due to recent online fraud, all cardholders are required to contact our Town North Bank, Security Departament at our total free number : 972-546-0398

Contacting this number will enable us to monitor your account closely, and suspend it as soon as we notice any fraudulent activity.

CONTACTING THIS NUMBER IS MANDATORY, OR YOUR CARD WILL BE CONSIDERED A SECURITY RISK AND IT WILL BE BLOCKED FROM ONLINE USAGE !

Please DO NOT reply to any emails asking for sensitive information, as many of our customers have been frauded for considerable ammounts of money.
If you receive any type of email please report it immediately !

Please note the total free number : +1 972-546-0398

Town North Bank Security Departamanet ,
PO Box 814810
Dallas, Texas 75381-4810

Headers:
Return-path: <security@townnorthbank.com>
Envelope-to: gumu@removed.us
Delivery-date: Wed, 20 Feb 2008 07:44:37 -0500
Received: from host74.host74-server.com ([66.49.248.230]:46981)
by laredo.root--servers.net with esmtps (TLSv1:AES256-SHA:256)
(Exim 4.68)
(envelope-from <security@townnorthbank.com>)
id 1JRoJN-0002Qe-Ew
for gumu@removed.us; Wed, 20 Feb 2008 07:44:37 -0500
Received: from User (ev1s-209-62-3-50.ev1servers.net [209.62.3.50] (may be forged))
(authenticated bits=0)
by host74.host74-server.com (8.12.11/8.12.11) with ESMTP id m1KCiNY4010269;
Wed, 20 Feb 2008 07:44:24 -0500
Message-Id: <200802201244.m1KCiNY4010269@host74.host74-server.com>
From: "Town North Bank"<security@townnorthbank.com>
Subject: Urgent Notification
Date: Wed, 20 Feb 2008 06:44:22 -0600
MIME-Version: 1.0
Content-Type: text/plain;
charset="Windows-1251"
Content-Transfer-Encoding: 7bit
X-Priority: 1
X-MSMail-Priority: High
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
X-Spam-Subject: ***SPAM*** Urgent Notification
X-Spam-Status: Yes, score=11.0
X-Spam-Score: 110
X-Spam-Bar: +++++++++++
X-Spam-Report: Spam detection software, running on the system "laredo.root--servers.net", has
identified this incoming email as possible spam.  The original message
has been attached to this so you can view it (if it isn't spam) or label
similar future email.  If you have any questions, see
the administrator of that system for details.
Content preview:  Dear customer, Due to recent online fraud, all cardholders
are required to contact our Town North Bank, Security Departament at our
total free number : 972-546-0398 Contacting this number will enable us to
monitor your account closely, and suspend it as soon as we notice any fraudulent
activity. [...] 
Content analysis details:   (11.0 points, 4.5 required)
pts rule name              description
---- ---------------------- --------------------------------------------------
2.8 TVD_PH_SUBJ_URGENT     TVD_PH_SUBJ_URGENT
1.3 MISSING_HEADERS        Missing To: header
3.0 BAYES_95               BODY: Bayesian spam probability is 95 to 99%
[score: 0.9726]
0.8 MSOE_MID_WRONG_CASE    MSOE_MID_WRONG_CASE
3.1 FORGED_MUA_OUTLOOK     Forged mail pretending to be from MS Outlook
X-Spam-Flag: YES
 

--
irc.removed.us - #dslr | DSLR Phishtracker | Email: removed@dslr.net


removed
Premium,VIP
join:2002-02-08
Houston, TX
kudos:40
reply to nwrickert
Hope these are useful to someone...

February 21:
quote:
Visa ATM/Check Card Deactivation
Message from: Customer Service
Date: 02/21/2008

We detected irregular activity on your Gesa ATM/Check Card on 02/20/2008.

For your protection we have had to suspend any future authorizations
being conducted with your Gesa Visa ATM/Check Card.

For your security we have deactivate your card.

How to activate/re-activate your card ?

You may stop by your branch or call our Activation Center.

Activation Center: (509) 210-4256 (24 Hour Line)

Headers:
Return-path: <gesa@accountsecurity.com>
Envelope-to: gumu@removed.us
Delivery-date: Thu, 21 Feb 2008 14:33:59 -0500
Received: from mail.netafrique.com ([63.219.177.34]:3983 helo=MC100814)
by laredo.root--servers.net with esmtp (Exim 4.68)
(envelope-from <gesa@accountsecurity.com>)
id 1JSHB5-0000Hc-0J
for gumu@removed.us; Thu, 21 Feb 2008 14:33:58 -0500
Received: from 66-52-78-214.jklmail.com [66.52.78.214] by MC100814 with SMTP;
   Thu, 21 Feb 2008 14:34:28 -0500
Reply-To: <noreply@gesa.com>
From: "Gesa Credit Union"<gesa@accountsecurity.com>
Subject: SECURITY ALERT!
Date: Thu, 21 Feb 2008 11:30:32 -0800
MIME-Version: 1.0
Content-Type: text/html;
charset="koi8-u"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
X-Spam-Subject: ***SPAM*** SECURITY ALERT!
X-Spam-Status: Yes, score=10.6
X-Spam-Score: 106
X-Spam-Bar: ++++++++++
X-Spam-Report: Spam detection software, running on the system "laredo.root--servers.net", has
identified this incoming email as possible spam.  The original message
has been attached to this so you can view it (if it isn't spam) or label
similar future email.  If you have any questions, see
the administrator of that system for details.
Content preview:  Visa ATM/Check Card Deactivation Message from: Customer Service
Date: 02/21/2008 We detected irregular activity on your Gesa ATM/Check Card
on 02/20/2008. For your protection we have had to suspend any future authorizations
being conducted with your Gesa Visa ATM/Check Card. [...] 
Content analysis details:   (10.6 points, 4.5 required)
pts rule name              description
---- ---------------------- --------------------------------------------------
0.0 MISSING_MID            Missing Message-Id: header
2.1 SUBJ_ALL_CAPS          Subject is all capitals
1.3 MISSING_HEADERS        Missing To: header
1.0 BAYES_60               BODY: Bayesian spam probability is 60 to 80%
[score: 0.7967]
0.0 HTML_MESSAGE           BODY: HTML included in message
1.5 MIME_HTML_ONLY         BODY: Message only has text/html MIME parts
1.5 HTML_IMAGE_ONLY_16     BODY: HTML: images with 1200-1600 bytes of words
0.1 HTML_MIME_NO_HTML_TAG  HTML-only message, but there is no HTML tag
0.0 FORGED_OUTLOOK_TAGS    Outlook can't send HTML in this format
0.0 FORGED_OUTLOOK_HTML    Outlook can't send HTML message only
3.1 FORGED_MUA_OUTLOOK     Forged mail pretending to be from MS Outlook
X-Spam-Flag: YES
 

--
irc.removed.us - #dslr | DSLR Phishtracker | Email: removed@dslr.net


nwrickert
sand groper
Premium,MVM
join:2004-09-04
Geneva, IL
kudos:7
reply to Kibbles
I would guess it might be a VOIP number, in which case it could be anywhere.


Kibbles
Premium
join:1999-07-31
Mission Viejo, CA
reply to nwrickert
Would you get in trouble if you fax'd a FBI cover sheet?
Looks like the call goes to NY...or is that forwarded somewhere else?


Snowy
Premium
join:2003-04-05
Kailua, HI
kudos:6
Reviews:
·Time Warner Cable
·Clearwire Wireless
reply to nwrickert
said by nwrickert:

I am hoping this can be made a sticky thread for reporting telephone phishing (includes vishing - voice phish as well as fax phish).
Agreed.


nwrickert
sand groper
Premium,MVM
join:2004-09-04
Geneva, IL
kudos:7
Reviews:
·AT&T U-Verse
reply to nwrickert

Fax phish - 914-293-2651 (paypal)

Excerpts from phish:
Your account access will be limited if in less than 48 hours we do not receive the fax with the information asked.
# (Your case ID for this reason is PP-136-124-102.)
and
Please send us all of the following information so we can verify your identity with our records. (we require a fax in less than 48 hours)

1) Photocopy of a government-issued photo identification (identity card or passport)
2) Photocopy of your credit card (front and back side are required)

Please be informed that the photocopies must be specific and readable otherwise they will not be taken in consideration.

Please send us only one fax message that will contain all the photocopies required.

Please send us the information requested to the fax number or address below.

Faxing from US: 914-293-2651
Faxing from outside US: +1 914-293-2651
Excerpt from mail headers:
Received: from hs16.order-vault.net (ftp.hs16.order-vault.net [65.18.148.238])
        by mp.cs.niu.edu (8.14.2/8.14.2) with ESMTP id m1PKWmoK022961
        (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NOT);
        Mon, 25 Feb 2008 14:32:51 -0600 (CST)
Received: from User ([74.8.99.49])
        (authenticated (0 bits))
        by hs16.order-vault.net (8.11.6/8.11.6) with ESMTP id m1PKVwS20195;
        Mon, 25 Feb 2008 15:31:58 -0500
 

--
AT&T dsl; Westell 327w modem/router; SuSE 10.1; firefox 2.0.0.12


nwrickert
sand groper
Premium,MVM
join:2004-09-04
Geneva, IL
kudos:7
Reviews:
·AT&T U-Verse

[Phish] Telephone phishing thread

I am hoping this can be made a sticky thread for reporting telephone phishing (includes vishing - voice phish as well as fax phish).

Note that ordinary phishes should be reported to »/phishtrack rather than here.
--
AT&T dsl; Westell 327w modem/router; SuSE 10.1; firefox 2.0.0.12