My brother passed along this phish. The site is still up.
 
Cheers,
 
Randy

________________________________

-----Original Message-----
From: Regions Bank
[mailto:[EMAIL PROTECTED]
Sent: Friday, June 01, 2007 10:47 AM
To: Customer Service
Subject: Regions Bank: Urgent Notification From Corporate Customer
Service! (message id: IJ2327419)



Dear business client of Regions Bank:

The Regions Customer Service requests you to complete the Regions
InterAct Confirmation Form.

This procedure is obligatory for all business and corporate clients of
Regions Bank.

Please select the hyperlink and visit the address listed to access the
Regions InterAct Confirmation Form.


http://interactsession-5911998.regions.com/ibsregions/cmserver/iform.cfm
<http://interactsession-5911998.regions.com.udll.tw/ibsregions/cmserver/
iform.cfm> 

Again, thank you for choosing Regions Bank for your business needs. We
look forward to working with you.

***** Please do not respond to this email *****

This mail is generated by an automated service.
Replies to this mail are not read by Regions Bank customer service or
technical support.


***************************************************

0x7985, 0x579, 0x68 NMM6, hex, QI1, LKA, close, HTI, J38. 0x12, 0x5865,
0x7044, 0x55587246 tmp: 0x14504153, 0x7, 0x41504572, 0x73291456, 0x15,
0x11, 0x790 0x0, 0x9694, 0x278, 0x439, 0x6, 0x2, 0x4790, 0x29765458,
0x82321846, 0x3, 0x64, 0x474, 0x753 0x390, 0x30439851, 0x49861957,
0x1644, 0x2625 TQCO: 0x8, 0x712, 0x67, 0x653, 0x77846894, 0x773, 0x0,
0x091, 0x85, 0x0, 0x72280271, 0x93, 0x07370272 0x69675594, 0x9669, 0x1,
0x3, 0x3, 0x8995, 0x397, 0x29716664, 0x97, 0x8, 0x642, 0x5498 PIG: 0x79,
0x21521992, 0x0, 0x880, 0x4461, 0x2861, 0x1190, 0x86, 0x2, 0x4678,
0x63845587, 0x1, 0x60, 0x661, 0x119

0x64774265, 0x286, 0x151, 0x39822673, 0x018, 0x03069220, 0x635, 0x30,
0x9, 0x03, 0x630, 0x59, 0x27 RGY9: 0x50, 0x7, 0x7677, 0x59, 0x53308947,
0x3, 0x84178711, 0x6359, 0x4803, 0x0429, 0x15 OD75: 0x53, 0x0,
0x25677571, 0x86408063, 0x3318, 0x7831, 0x83, 0x7, 0x964 , 0x22275362,
0x8797, 0x4395, 0x22490694, 0x8, 0x547 stack, 9GS, UUA, tmp, PC4J, C0DC,
dec, TUK, QUM. I8W: 0x0604, 0x5599, 0x7750, 0x24190859, 0x1, 0x35,
0x5090, 0x4, 0x938, 0x05708432, 0x896, 0x1420 update: 0x01, 0x33 PU4,
serv, source, serv, hex, 3T5, engine, J8CI, stack. rcs: 0x89682936,
0x341, 0x37, 0x44, 0x10, 0x259, 0x51, 0x14, 0x6758, 0x68 0x72578564,
0x56, 0x237, 0x289, 0x114, 0x7195, 0x2, 0x20, 0x1526 HQC1: 0x9, 0x1123,
0x706, 0x7, 0x19812991

0x280, 0x51, 0x74026631, 0x689, 0x30, 0x25, 0x38151768, 0x2229, 0x636,
0x297, 0x25702680, 0x53, 0x858 0x85, 0x7 0x17, 0x2, 0x87648932, 0x3112,
0x095, 0x08020566, 0x5, 0x65797806, 0x153, 0x13, 0x9517, 0x80147551,
0x83, 0x44146913, 0x2 0x06816736, 0x78247836, 0x8502, 0x303, 0x4269,
0x165, 0x370, 0x9755, 0x860, 0x48, 0x867, 0x955, 0x697, 0x470, 0x20
cvs.0x82572744, 0x6158, 0x06, 0x592, 0x620 DN22: 0x475, 0x357 0x0594,
0x77, 0x8296, 0x2, 0x271, 0x44536246, 0x4 api GS9. 0x223, 0x37940938,
0x08, 0x06428645, 0x87965152

_______________________________________________
phishing mailing list
phishing@whitestar.linuxbox.org
http://www.whitestar.linuxbox.org/mailman/listinfo/phishing

Reply via email to