An
Email with the Subject "Account Review. PayPal Team identified some unusual activity in your Accont!!" was
received in one of Scamdex's honeypot email accounts on Tue, 30 Jan 2007 17:17:10 -0800
and has been classified as a Generic Scam Email.
The sender shows as "PayPal .Inc" <Support@PayPal.com>.
The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in
this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be
added to their email address lists for spam purposes.
This a (redacted) view of the raw email headers of this scam email.
Personally Identifiable Information (PII) has been suppressed, but can be
supplied as received to appropriate investigating or law enforcement agencies on request.
EEEEEstdClass Object
(
[return-path:] =>
[envelope-to:] => employment-scams@scamdex.com
[delivery-date:] => Tue, 30 Jan 2007 17:17:10 -0800
[received:] => Array
(
[0] => from [83.222.2.161] (helo=83.222.2.161)by bartok.o7e.net with smtp (Exim 4.63)(envelope-from )id 1HC462-00030g-Glfor employment-scams@scamdex.com; Tue, 30 Jan 2007 17:17:10 -0800
[1] => from 24.204.0.109 by ; Wed, 31 Jan 2007 04:16:11 +0300
)
[x-uid:] =>
[from:] => "PayPal .Inc"
[reply-to:] => "PayPal .Inc"
[to:] => employment-scams@scamdex.com
[subject:] => Account Review. PayPal Team identified some unusual activity in your Accont!!
[date:] => Wed, 31 Jan 2007 03:10:11 +0200
[x-mailer:] => QUALCOMM Windows Eudora Version 5.1
[mime-version:] => 1.0
[content-type:] => multipart/alternative;boundary="--68136706722986095"
[x-priority:] => 3
[x-msmail-priority:] => Normal
[message-id:] =>
[x-scamdex-scores:] => S:66 P:77 A:67 L:61 E:74 G:60
[x-scamdex-classtype:] => P
[x-scamdex-classscore:] => 77
[x-scamdex-totscore:] => 405
[x-scamdex-kw:] => IP address,access,account,activity,assistance,employ,foreign,inc.,log in,login,notification,password,paypal,sent,suspend,third party,verify
[x-scamdex-dir:] => P
[x-scamdex-id:] => P1204769282.M472194P20228V
[x-scamdex-copyright:] => This Email is Copyright Scamdex.com 2009, Reproduction Prohibited
)
Domain Names used for collecting scam email ("Honeypot email accounts") have been obscured and replaced with the token 'HUN1P0T'
Community Action - SPAM/non-Scam Report
Occasionally, incorrectly categorized emails get into the Scamdex Scam Email Database and need to be removed. If this
email has Personally Identifiable Information (PII), or is, in your opinion, from a bona-fide entity, let us know.
Scamdex will, as soon as is practicable, take-down any emails that in our opinion should not
be in our database. Note that ALL emails in the Scamdex Scam Email Database were received as Unsolicited Commercial Email, aka UCE or
SPAM, via unpublished 'Honeypot' email addresses.
Security Center Advisory!
We recently noticed one or more attempts to log in to your PayPal account from a foreign IP address and we have reasons to belive that your account was hijacked by a third party without your authorization. If you recently accessed your account while traveling, the unusual log in attempts may have been initiated by you.
If you are the rightful holder of the account you must click the link below and then complete all steps from the following page as we try to verify your identity.
Click here to verify your account
If you choose to ignore our request, you leave us no choise but to temporaly suspend your account.
Thank you for using PayPal! The PayPal Team
Please do not reply to this e-mail. Mail sent to this address cannot be answered. For assistance, log in to your PayPal account and choose the "Help" link in the footer of any page.
To receive email notifications in plain text instead of HTML, update your preferences here.
Protect Your Account Info
PayPal automatically encrypts your confidential information using the Secure Sockets Layer protocol (SSL) with an encryption key length of 128-bits (the highest level commercially available).
This invitation was sent to on behalf of PayPal. If you do not wish to receive invitations from PayPal.com members, click on the link below: https://www.paypal.com/cgi-bin/webscr?cmd=_login-run