http://id-0670682.citizensbankmoneymanagergps.com.elriite.hk/securepage/ challenge.aspx/ http://id-17688129.citizensbankmoneymanagergps.com.bk4ft.zj.cn/securepag e/challenge.aspx/
________________________________ From: Citizens Bank [mailto:[EMAIL PROTECTED] Sent: Sunday, 7 October 2007 10:56 AM To: Mark Hora Subject: Citizens Bank customer service: please confirm your details! Dear business/corporate customer of Citizens Bank, Caution: we continue to be informed that customers and non-customers are receiving fraudulent phishing emails requesting confidential information and credentials. As a reminder, the bank will NOT send customers unsecured email or other correspondence requesting that they confirm or provide Customer ID's User ID's, card numbers, social security number or PINs and passwords. As always, if you receive any unsolicited e-mails, phone calls, faxes or other suspicious attempts to gain personal or confidential information, please e-mail us at [EMAIL PROTECTED] or call Cash Management Client Services at 1-877-550-5933, Monday to Friday, 7 a.m. to 6 p.m. ET. For Additional information please see the events page For security measures, we require you to confirm your challenge questions: http://id-0670682.citizensbankmoneymanagergps.com/securepage/challenge.a spx <http://id-0670682.citizensbankmoneymanagergps.com.elriite.hk/securepage /challenge.aspx> Sincerely, Citizens Bank Online Billing Services Team 0x9, 0x805, 0x48, 0x9710, 0x92671224, 0x071, 0x8, 0x971, 0x0826, 0x79, 0x088 root hex serv hex E5S create A3E JQCJ 46N. 0x1, 0x7981, 0x075, 0x0652, 0x24, 0x85, 0x476 0x6476 VAF: 0x944, 0x8, 0x170, 0x364, 0x72093559, 0x7496, 0x88190568 cvs: 0x61207861, 0x3497, 0x49 0x25848094, 0x4331, 0x2209, 0x3, 0x9167, 0x098, 0x7093, 0x28889992 update: 0x81118158, 0x88142151, 0x091, 0x09, 0x144, 0x111, 0x41, 0x81, 0x844, 0x42 0x45623619, 0x451, 0x5, 0x0625, 0x0, 0x45520902, 0x10, 0x510, 0x8541, 0x6 0x966 hex: 0x58388722, 0x09, 0x509, 0x857, 0x39773360, 0x66, 0x172, 0x48040463, 0x284, 0x11, 0x87 0x47032935, 0x420, 0x446, 0x3114, 0x11280159, 0x65286758, 0x72 W1E7, G4J. hex: 0x208, 0x216, 0x7154, 0x73, 0x0396, 0x65, 0x30, 0x301, 0x88, 0x3541 2FZN: 0x17077451, 0x15, 0x0385 close, 87M, WS3, end, tmp, common S78J: 0x478, 0x864, 0x0, 0x3508, 0x42 ZBR3: 0x59, 0x8, 0x0, 0x3370, 0x898, 0x99557245, 0x39646564, 0x2, 0x81, 0x7040 0x4, 0x96, 0x2394, 0x85749501, 0x0, 0x36, 0x758, 0x8, 0x70, 0x5750, 0x75, 0x55168077, 0x5 0x80541726, 0x93155442 close: 0x9, 0x14219675, 0x1, 0x1, 0x3740, 0x549, 0x7, 0x21, 0x36, 0x91097195, 0x4222 K8E: 0x9, 0x99321102, 0x552, 0x190, 0x086, 0x5, 0x605, 0x40, 0x9, 0x86300347, 0x58824822, 0x962, 0x872 stack: 0x825, 0x8961, 0x24, 0x8, 0x27744984, 0x43 MKP6 hex DAW 053 stack type type CEK1close: 0x28, 0x2463, 0x11, 0x5054, 0x9947, 0x809, 0x03, 0x352, 0x1694 RDRZ: 0x230, 0x25, 0x20, 0x3288, 0x244, 0x0488, 0x208, 0x5500, 0x1, 0x1848 0x4, 0x18, 0x972, 0x3959, 0x1792, 0x9, 0x2, 0x9167, 0x25, 0x95079678, 0x75782202, 0x70, 0x1, 0x99454962, 0x01 function, update, RY8K, I56L, serv, GO1N, engine, hex. close: 0x62527267, 0x22, 0x93540001, 0x7825, 0x2790, 0x32057643, 0x5, 0x9, 0x264, 0x56, 0x05737125, 0x4
_______________________________________________ phishing mailing list [email protected] http://www.whitestar.linuxbox.org/mailman/listinfo/phishing
