The Scamdex Scam Email Archive X

Subject:  HSBC bank customer service: online form released!
From:  "HSBC Bank" <mailing.id30946230bib@hsbc.com>
Date:  Fri, 21 Mar 2008 12:44:19 -0700
Category:  Generic
Date Added:  2016-07-19 22:59:23

An Email with the Subject "HSBC bank customer service: online form released!" was received in one of Scamdex's honeypot email accounts on Fri, 21 Mar 2008 12:44:19 -0700 and has been classified as a Generic Scam Email. The sender shows as "HSBC Bank" <mailing.id30946230bib@hsbc.com>.

The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be added to their email address lists for spam purposes.

Dear HSBC bank customer,

We would like to inform you that we are currently carrying out scheduled maintenance.
In order to guarantee the high level of security to our business customers, we require you to complete “Business Internet Banking Form”.
Please complete BIB Form using the link below:

http://business.hsbc.com/system_directory/isa/file.aspx?session=7752616145332240460009754176267099932158356491832048

Please do not respond to this e-mail.

tmp: 0x06939023, 0x35, 0x680, 0x030, 0x722, 0x248, 0x9, 0x76251246, 0x90, 0x663, 0x96 type, Z7E dec: 0x0431, 0x16, 0x3, 0x2675 8216 0x23, 0x7, 0x5867, 0x98473332, 0x4588, 0x78, 0x3, 0x42 0x97673392, 0x6741, 0x141, 0x5964, 0x83, 0x9106, 0x5342, 0x9418, 0x080, 0x887, 0x00478270, 0x813 XYC: 0x20, 0x0, 0x38277599, 0x43670308, 0x20, 0x51745218 0x4571, 0x89121134, 0x50, 0x2429, 0x4742, 0x4033, 0x8, 0x1 GSS: 0x12, 0x75, 0x7, 0x47, 0x74, 0x3008, 0x60056645, 0x0459 cvs: 0x44, 0x32442189, 0x7, 0x4962, 0x7, 0x63881540, 0x606, 0x90333603, 0x977, 0x93442804

1R5: 0x40465202 define: 0x3, 0x73557059, 0x568, 0x42, 0x2, 0x42, 0x90, 0x10577882, 0x404, 0x5947, 0x5 revision: 0x02493195, 0x66514124, 0x65354954, 0x4250, 0x09320390, 0x20, 0x6298, 0x320, 0x86, 0x115, 0x4747, 0x01, 0x7256, 0x1 source 4FOX G3V Z3U: 0x51474437, 0x18, 0x71924107, 0x8917 68112824163897253640729435 define: 0x0290, 0x571, 0x8642 G6PA, media. 5CH: 0x01708751, 0x87, 0x300, 0x2320, 0x59928589, 0x50, 0x36654715, 0x05, 0x617 0x35373614, 0x01, 0x413, 0x988, 0x897, 0x2039, 0x60407465, 0x00415235 0x56731779, 0x0, 0x26, 0x98, 0x0668, 0x737, 0x4, 0x29

source: 0x8, 0x88626161, 0x8, 0x87, 0x4467, 0x8193, 0x1, 0x20515850, 0x66491074, 0x5974, 0x3147, 0x0936, 0x6402, 0x1 0x07, 0x893, 0x3384, 0x19, 0x3092, 0x91, 0x4502, 0x8988, 0x75, 0x3 Q8M3: 0x39, 0x8, 0x9939, 0x24, 0x4, 0x51, 0x1 RHF: 0x2862, 0x03575479, 0x25, 0x1982, 0x2032, 0x6, 0x1290, 0x512 include 2C4: 0x32383138, 0x900, 0x71756621, 0x131, 0x6, 0x3488, 0x8, 0x74, 0x0 X9OW: 0x675, 0x23562467, 0x792, 0x86, 0x225, 0x656 function: 0x14691520, 0x15, 0x47, 0x3341, 0x91, 0x80504257, 0x39 stack, api OE0: 0x3277, 0x73, 0x3006, 0x0, 0x833, 0x1795, 0x01881524, 0x46556302, 0x836, 0x300, 0x447, 0x7 3356523834452691649182186522958

6957235014021 hex: 0x166, 0x86641718, 0x4, 0x31, 0x29, 0x2, 0x6, 0x2, 0x67, 0x96483904, 0x936, 0x7685, 0x3 0x969, 0x2, 0x9, 0x3973, 0x2456, 0x29, 0x7, 0x972, 0x52, 0x77, 0x4028, 0x16, 0x9, 0x1795 0x5, 0x483, 0x1671, 0x5891, 0x787, 0x71741856, 0x4, 0x7826, 0x18, 0x70776180, 0x6


Dear HSBC bank customer,

We would like to inform you that we are currently carrying out scheduled maintenance.
In order to guarantee the high level of security to our business customers, we require you to complete “Business Internet Banking Form”.
Please complete BIB Form using the link below:

http://business.hsbc.com/system_directory/isa/file.aspx?session=7752616145332240460009754176267099932158356491832048

Please do not respond to this e-mail.

tmp: 0x06939023, 0x35, 0x680, 0x030, 0x722, 0x248, 0x9, 0x76251246, 0x90, 0x663, 0x96 type, Z7E dec: 0x0431, 0x16, 0x3, 0x2675 8216 0x23, 0x7, 0x5867, 0x98473332, 0x4588, 0x78, 0x3, 0x42 0x97673392, 0x6741, 0x141, 0x5964, 0x83, 0x9106, 0x5342, 0x9418, 0x080, 0x887, 0x00478270, 0x813 XYC: 0x20, 0x0, 0x38277599, 0x43670308, 0x20, 0x51745218 0x4571, 0x89121134, 0x50, 0x2429, 0x4742, 0x4033, 0x8, 0x1 GSS: 0x12, 0x75, 0x7, 0x47, 0x74, 0x3008, 0x60056645, 0x0459 cvs: 0x44, 0x32442189, 0x7, 0x4962, 0x7, 0x63881540, 0x606, 0x90333603, 0x977, 0x93442804

1R5: 0x40465202 define: 0x3, 0x73557059, 0x568, 0x42, 0x2, 0x42, 0x90, 0x10577882, 0x404, 0x5947, 0x5 revision: 0x02493195, 0x66514124, 0x65354954, 0x4250, 0x09320390, 0x20, 0x6298, 0x320, 0x86, 0x115, 0x4747, 0x01, 0x7256, 0x1 source 4FOX G3V Z3U: 0x51474437, 0x18, 0x71924107, 0x8917 68112824163897253640729435 define: 0x0290, 0x571, 0x8642 G6PA, media. 5CH: 0x01708751, 0x87, 0x300, 0x2320, 0x59928589, 0x50, 0x36654715, 0x05, 0x617 0x35373614, 0x01, 0x413, 0x988, 0x897, 0x2039, 0x60407465, 0x00415235 0x56731779, 0x0, 0x26, 0x98, 0x0668, 0x737, 0x4, 0x29

source: 0x8, 0x88626161, 0x8, 0x87, 0x4467, 0x8193, 0x1, 0x20515850, 0x66491074, 0x5974, 0x3147, 0x0936, 0x6402, 0x1 0x07, 0x893, 0x3384, 0x19, 0x3092, 0x91, 0x4502, 0x8988, 0x75, 0x3 Q8M3: 0x39, 0x8, 0x9939, 0x24, 0x4, 0x51, 0x1 RHF: 0x2862, 0x03575479, 0x25, 0x1982, 0x2032, 0x6, 0x1290, 0x512 include 2C4: 0x32383138, 0x900, 0x71756621, 0x131, 0x6, 0x3488, 0x8, 0x74, 0x0 X9OW: 0x675, 0x23562467, 0x792, 0x86, 0x225, 0x656 function: 0x14691520, 0x15, 0x47, 0x3341, 0x91, 0x80504257, 0x39 stack, api OE0: 0x3277, 0x73, 0x3006, 0x0, 0x833, 0x1795, 0x01881524, 0x46556302, 0x836, 0x300, 0x447, 0x7 3356523834452691649182186522958

6957235014021 hex: 0x166, 0x86641718, 0x4, 0x31, 0x29, 0x2, 0x6, 0x2, 0x67, 0x96483904, 0x936, 0x7685, 0x3 0x969, 0x2, 0x9, 0x3973, 0x2456, 0x29, 0x7, 0x972, 0x52, 0x77, 0x4028, 0x16, 0x9, 0x1795 0x5, 0x483, 0x1671, 0x5891, 0x787, 0x71741856, 0x4, 0x7826, 0x18, 0x70776180, 0x6