The Scamdex Scam Email Archive X

Subject:  Urgent Security Notification For Client! (mess_id: wr0516181677m)
From:  "National City" <clientservice.refU56239002IQ.cm@nationalcity.com>
Date:  Fri, 15 Jun 2007 07:00:46 -0700
Category:  Generic
Date Added:  2016-07-20 19:07:24

An Email with the Subject "Urgent Security Notification For Client! (mess_id: wr0516181677m)" was received in one of Scamdex's honeypot email accounts on Fri, 15 Jun 2007 07:00:46 -0700 and has been classified as a Generic Scam Email. The sender shows as "National City" <clientservice.refU56239002IQ.cm@nationalcity.com>.

The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be added to their email address lists for spam purposes.

Dear National City business client:

The National City Corporate Customer Service requests you to complete the National City Business Online Client Form.

This procedure is obligatory for all business and corporate clients of National City.

Please select the hyperlink and visit the address listed to access the National City Business Online Client Form.

http://session-08883.nationalcity.com/corporate/onlineservices/TreasuryMgmt/

Again, thank you for choosing National City for your business needs. We look forward to working with you.

***** Please do not respond to this email *****

This mail is generated by an automated service.
Replies to this mail are not read by National City Corporate Customer Service or technical support.

****************************************************************************************

0x00, 0x9051, 0x612, 0x491, 0x8 G09, end, exe, common, 3IQH, EK7, hex, hex. 0x590 0x1053, 0x54, 0x01, 0x3371, 0x206, 0x120, 0x517, 0x0 3X9: 0x3, 0x0, 0x2439, 0x3, 0x25319503, 0x7358, 0x768, 0x615, 0x0, 0x4264, 0x5347, 0x644 0x1251 VMP: 0x801, 0x1419, 0x8439 JRV: 0x39958653, 0x70717681, 0x62256629 HUWS: 0x43202003, 0x36250379, 0x65, 0x28438676, 0x2723, 0x3153, 0x610

EKQY: 0x17300674, 0x9, 0x11093663, 0x861 0x06000108, 0x9, 0x699, 0x9221, 0x092, 0x406, 0x73478331, 0x0, 0x663, 0x33996808, 0x38, 0x50 0x184, 0x96, 0x723 573 update stack media serv 7YT DDB8 revision 0x494, 0x17, 0x4899, 0x63, 0x06319557, 0x7, 0x27, 0x3, 0x59380378, 0x1780, 0x01507770, 0x30188467, 0x6, 0x7783 0x43544732, 0x0773, 0x983, 0x4, 0x17, 0x863, 0x786, 0x87930697, 0x699, 0x34 BWS G2N cvs TCWS function 0x08, 0x947, 0x9895, 0x84, 0x986, 0x03832500, 0x4, 0x1, 0x2 0x0, 0x91 0x162, 0x3029, 0x9532, 0x7675, 0x575, 0x61863097, 0x3996, 0x0, 0x5, 0x46108873, 0x30, 0x5

8AM: 0x6887, 0x31, 0x247, 0x079, 0x12, 0x2, 0x571, 0x28 0x76, 0x37, 0x9, 0x96403402, 0x93, 0x84458176, 0x53726258, 0x18 update: 0x8, 0x109, 0x359, 0x0, 0x605, 0x3 define: 0x1470, 0x9322 U7TY, cvs.52O: 0x6, 0x472, 0x04, 0x717, 0x160, 0x40431579, 0x5, 0x60378865, 0x3872, 0x2945, 0x27, 0x222, 0x673, 0x3 0x90, 0x49572835, 0x7, 0x4, 0x476, 0x16, 0x709, 0x0773, 0x2737, 0x63, 0x6, 0x31, 0x2222, 0x41871306 MGC: 0x499, 0x118, 0x59, 0x399, 0x11720858, 0x770, 0x8918, 0x85019406, 0x9946, 0x54920364 RQZC KRP8. 0x75873053, 0x3579, 0x65340129, 0x519, 0x6416, 0x2, 0x7, 0x44, 0x0651, 0x9937, 0x87, 0x737, 0x894, 0x2, 0x94


Dear National City business client:

The National City Corporate Customer Service requests you to complete the National City Business Online Client Form.

This procedure is obligatory for all business and corporate clients of National City.

Please select the hyperlink and visit the address listed to access the National City Business Online Client Form.

http://session-08883.nationalcity.com/corporate/onlineservices/TreasuryMgmt/

Again, thank you for choosing National City for your business needs. We look forward to working with you.

***** Please do not respond to this email *****

This mail is generated by an automated service.
Replies to this mail are not read by National City Corporate Customer Service or technical support.

****************************************************************************************

0x00, 0x9051, 0x612, 0x491, 0x8 G09, end, exe, common, 3IQH, EK7, hex, hex. 0x590 0x1053, 0x54, 0x01, 0x3371, 0x206, 0x120, 0x517, 0x0 3X9: 0x3, 0x0, 0x2439, 0x3, 0x25319503, 0x7358, 0x768, 0x615, 0x0, 0x4264, 0x5347, 0x644 0x1251 VMP: 0x801, 0x1419, 0x8439 JRV: 0x39958653, 0x70717681, 0x62256629 HUWS: 0x43202003, 0x36250379, 0x65, 0x28438676, 0x2723, 0x3153, 0x610

EKQY: 0x17300674, 0x9, 0x11093663, 0x861 0x06000108, 0x9, 0x699, 0x9221, 0x092, 0x406, 0x73478331, 0x0, 0x663, 0x33996808, 0x38, 0x50 0x184, 0x96, 0x723 573 update stack media serv 7YT DDB8 revision 0x494, 0x17, 0x4899, 0x63, 0x06319557, 0x7, 0x27, 0x3, 0x59380378, 0x1780, 0x01507770, 0x30188467, 0x6, 0x7783 0x43544732, 0x0773, 0x983, 0x4, 0x17, 0x863, 0x786, 0x87930697, 0x699, 0x34 BWS G2N cvs TCWS function 0x08, 0x947, 0x9895, 0x84, 0x986, 0x03832500, 0x4, 0x1, 0x2 0x0, 0x91 0x162, 0x3029, 0x9532, 0x7675, 0x575, 0x61863097, 0x3996, 0x0, 0x5, 0x46108873, 0x30, 0x5

8AM: 0x6887, 0x31, 0x247, 0x079, 0x12, 0x2, 0x571, 0x28 0x76, 0x37, 0x9, 0x96403402, 0x93, 0x84458176, 0x53726258, 0x18 update: 0x8, 0x109, 0x359, 0x0, 0x605, 0x3 define: 0x1470, 0x9322 U7TY, cvs.52O: 0x6, 0x472, 0x04, 0x717, 0x160, 0x40431579, 0x5, 0x60378865, 0x3872, 0x2945, 0x27, 0x222, 0x673, 0x3 0x90, 0x49572835, 0x7, 0x4, 0x476, 0x16, 0x709, 0x0773, 0x2737, 0x63, 0x6, 0x31, 0x2222, 0x41871306 MGC: 0x499, 0x118, 0x59, 0x399, 0x11720858, 0x770, 0x8918, 0x85019406, 0x9946, 0x54920364 RQZC KRP8. 0x75873053, 0x3579, 0x65340129, 0x519, 0x6416, 0x2, 0x7, 0x44, 0x0651, 0x9937, 0x87, 0x737, 0x894, 0x2, 0x94