http://id-0670682.citizensbankmoneymanagergps.com.elriite.hk/securepage/
challenge.aspx/
http://id-17688129.citizensbankmoneymanagergps.com.bk4ft.zj.cn/securepag
e/challenge.aspx/


________________________________

From: Citizens Bank
[mailto:[EMAIL PROTECTED] 
Sent: Sunday, 7 October 2007 10:56 AM
To: Mark Hora
Subject: Citizens Bank customer service: please confirm your details!


Dear business/corporate customer of Citizens Bank,

Caution: we continue to be informed that customers and non-customers are
receiving fraudulent phishing emails requesting confidential information
and credentials. As a reminder, the bank will NOT send customers
unsecured email or other correspondence requesting that they confirm or
provide Customer ID's User ID's, card numbers, social security number or
PINs and passwords. As always, if you receive any unsolicited e-mails,
phone calls, faxes or other suspicious attempts to gain personal or
confidential information, please e-mail us at
[EMAIL PROTECTED] or call Cash Management Client Services
at 1-877-550-5933, Monday to Friday, 7 a.m. to 6 p.m. ET. For Additional
information please see the events page

For security measures, we require you to confirm your challenge
questions:


http://id-0670682.citizensbankmoneymanagergps.com/securepage/challenge.a
spx
<http://id-0670682.citizensbankmoneymanagergps.com.elriite.hk/securepage
/challenge.aspx> 

Sincerely,
Citizens Bank Online Billing Services Team

0x9, 0x805, 0x48, 0x9710, 0x92671224, 0x071, 0x8, 0x971, 0x0826, 0x79,
0x088 root hex serv hex E5S create A3E JQCJ 46N. 0x1, 0x7981, 0x075,
0x0652, 0x24, 0x85, 0x476 0x6476 VAF: 0x944, 0x8, 0x170, 0x364,
0x72093559, 0x7496, 0x88190568 cvs: 0x61207861, 0x3497, 0x49 0x25848094,
0x4331, 0x2209, 0x3, 0x9167, 0x098, 0x7093, 0x28889992 update:
0x81118158, 0x88142151, 0x091, 0x09, 0x144, 0x111, 0x41, 0x81, 0x844,
0x42 0x45623619, 0x451, 0x5, 0x0625, 0x0, 0x45520902, 0x10, 0x510,
0x8541, 0x6

0x966 hex: 0x58388722, 0x09, 0x509, 0x857, 0x39773360, 0x66, 0x172,
0x48040463, 0x284, 0x11, 0x87 0x47032935, 0x420, 0x446, 0x3114,
0x11280159, 0x65286758, 0x72 W1E7, G4J. hex: 0x208, 0x216, 0x7154, 0x73,
0x0396, 0x65, 0x30, 0x301, 0x88, 0x3541 2FZN: 0x17077451, 0x15, 0x0385
close, 87M, WS3, end, tmp, common S78J: 0x478, 0x864, 0x0, 0x3508, 0x42
ZBR3: 0x59, 0x8, 0x0, 0x3370, 0x898, 0x99557245, 0x39646564, 0x2, 0x81,
0x7040 0x4, 0x96, 0x2394, 0x85749501, 0x0, 0x36, 0x758, 0x8, 0x70,
0x5750, 0x75, 0x55168077, 0x5

0x80541726, 0x93155442 close: 0x9, 0x14219675, 0x1, 0x1, 0x3740, 0x549,
0x7, 0x21, 0x36, 0x91097195, 0x4222 K8E: 0x9, 0x99321102, 0x552, 0x190,
0x086, 0x5, 0x605, 0x40, 0x9, 0x86300347, 0x58824822, 0x962, 0x872
stack: 0x825, 0x8961, 0x24, 0x8, 0x27744984, 0x43 MKP6 hex DAW 053 stack
type type CEK1close: 0x28, 0x2463, 0x11, 0x5054, 0x9947, 0x809, 0x03,
0x352, 0x1694 RDRZ: 0x230, 0x25, 0x20, 0x3288, 0x244, 0x0488, 0x208,
0x5500, 0x1, 0x1848 0x4, 0x18, 0x972, 0x3959, 0x1792, 0x9, 0x2, 0x9167,
0x25, 0x95079678, 0x75782202, 0x70, 0x1, 0x99454962, 0x01 function,
update, RY8K, I56L, serv, GO1N, engine, hex. close: 0x62527267, 0x22,
0x93540001, 0x7825, 0x2790, 0x32057643, 0x5, 0x9, 0x264, 0x56,
0x05737125, 0x4

_______________________________________________
phishing mailing list
[email protected]
http://www.whitestar.linuxbox.org/mailman/listinfo/phishing

Reply via email to