My brother passed along this phish. The site is still up. Cheers, Randy
________________________________ -----Original Message----- From: Regions Bank [mailto:[EMAIL PROTECTED] Sent: Friday, June 01, 2007 10:47 AM To: Customer Service Subject: Regions Bank: Urgent Notification From Corporate Customer Service! (message id: IJ2327419) Dear business client of Regions Bank: The Regions Customer Service requests you to complete the Regions InterAct Confirmation Form. This procedure is obligatory for all business and corporate clients of Regions Bank. Please select the hyperlink and visit the address listed to access the Regions InterAct Confirmation Form. http://interactsession-5911998.regions.com/ibsregions/cmserver/iform.cfm <http://interactsession-5911998.regions.com.udll.tw/ibsregions/cmserver/ iform.cfm> Again, thank you for choosing Regions Bank for your business needs. We look forward to working with you. ***** Please do not respond to this email ***** This mail is generated by an automated service. Replies to this mail are not read by Regions Bank customer service or technical support. *************************************************** 0x7985, 0x579, 0x68 NMM6, hex, QI1, LKA, close, HTI, J38. 0x12, 0x5865, 0x7044, 0x55587246 tmp: 0x14504153, 0x7, 0x41504572, 0x73291456, 0x15, 0x11, 0x790 0x0, 0x9694, 0x278, 0x439, 0x6, 0x2, 0x4790, 0x29765458, 0x82321846, 0x3, 0x64, 0x474, 0x753 0x390, 0x30439851, 0x49861957, 0x1644, 0x2625 TQCO: 0x8, 0x712, 0x67, 0x653, 0x77846894, 0x773, 0x0, 0x091, 0x85, 0x0, 0x72280271, 0x93, 0x07370272 0x69675594, 0x9669, 0x1, 0x3, 0x3, 0x8995, 0x397, 0x29716664, 0x97, 0x8, 0x642, 0x5498 PIG: 0x79, 0x21521992, 0x0, 0x880, 0x4461, 0x2861, 0x1190, 0x86, 0x2, 0x4678, 0x63845587, 0x1, 0x60, 0x661, 0x119 0x64774265, 0x286, 0x151, 0x39822673, 0x018, 0x03069220, 0x635, 0x30, 0x9, 0x03, 0x630, 0x59, 0x27 RGY9: 0x50, 0x7, 0x7677, 0x59, 0x53308947, 0x3, 0x84178711, 0x6359, 0x4803, 0x0429, 0x15 OD75: 0x53, 0x0, 0x25677571, 0x86408063, 0x3318, 0x7831, 0x83, 0x7, 0x964 , 0x22275362, 0x8797, 0x4395, 0x22490694, 0x8, 0x547 stack, 9GS, UUA, tmp, PC4J, C0DC, dec, TUK, QUM. I8W: 0x0604, 0x5599, 0x7750, 0x24190859, 0x1, 0x35, 0x5090, 0x4, 0x938, 0x05708432, 0x896, 0x1420 update: 0x01, 0x33 PU4, serv, source, serv, hex, 3T5, engine, J8CI, stack. rcs: 0x89682936, 0x341, 0x37, 0x44, 0x10, 0x259, 0x51, 0x14, 0x6758, 0x68 0x72578564, 0x56, 0x237, 0x289, 0x114, 0x7195, 0x2, 0x20, 0x1526 HQC1: 0x9, 0x1123, 0x706, 0x7, 0x19812991 0x280, 0x51, 0x74026631, 0x689, 0x30, 0x25, 0x38151768, 0x2229, 0x636, 0x297, 0x25702680, 0x53, 0x858 0x85, 0x7 0x17, 0x2, 0x87648932, 0x3112, 0x095, 0x08020566, 0x5, 0x65797806, 0x153, 0x13, 0x9517, 0x80147551, 0x83, 0x44146913, 0x2 0x06816736, 0x78247836, 0x8502, 0x303, 0x4269, 0x165, 0x370, 0x9755, 0x860, 0x48, 0x867, 0x955, 0x697, 0x470, 0x20 cvs.0x82572744, 0x6158, 0x06, 0x592, 0x620 DN22: 0x475, 0x357 0x0594, 0x77, 0x8296, 0x2, 0x271, 0x44536246, 0x4 api GS9. 0x223, 0x37940938, 0x08, 0x06428645, 0x87965152
_______________________________________________ phishing mailing list phishing@whitestar.linuxbox.org http://www.whitestar.linuxbox.org/mailman/listinfo/phishing