The Scamdex Scam Email Archive X

Subject:  Citizens Bank customer service: confirm your online account details! (message id: PK6830002100GN)
From:  "Citizens Bank" <csteam.refe0114539134819.gps@citizensbank.com>
Date:  Sat, 24 Nov 2007 23:02:37 -0800
Category:  Generic
Date Added:  2016-07-20 20:19:06

An Email with the Subject "Citizens Bank customer service: confirm your online account details! (message id: PK6830002100GN)" was received in one of Scamdex's honeypot email accounts on Sat, 24 Nov 2007 23:02:37 -0800 and has been classified as a Generic Scam Email. The sender shows as "Citizens Bank" <csteam.refe0114539134819.gps@citizensbank.com>.

The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be added to their email address lists for spam purposes.

Dear business/corporate customer of Citizens Bank,

Caution: we continue to be informed that customers and non-customers are receiving fraudulent phishing emails requesting confidential information and credentials. As a reminder, the bank will NOT send customers unsecured email or other correspondence requesting that they confirm or provide Customer ID's User ID's, card numbers, social security number or PINs and passwords. As always, if you receive any unsolicited e-mails, phone calls, faxes or other suspicious attempts to gain personal or confidential information, please e-mail us at fraudprevention@cfgcustomers.com or call Cash Management Client Services at 1-877-550-5933, Monday to Friday, 7 a.m. to 6 p.m. ET. For Additional information please see the events page

For security measures, we require you to confirm your challenge questions:

http://citizensbankmoneymanagergps.com/securepage/challenge.aspx?session=419138648303619717381603717153985338822078793278

Sincerely,
Citizens Bank Online Billing Services Team

0x6535, 0x1, 0x73, 0x0984, 0x6737, 0x0995, 0x6534, 0x8588, 0x41068561, 0x8, 0x1733, 0x72, 0x9 serv, stack, api, dec, DRS, 8RH5, root, B8Q. 0x8, 0x4, 0x2076, 0x27941246, 0x66, 0x63, 0x4216, 0x20, 0x13755432, 0x1 close: 0x647, 0x0320, 0x50439226, 0x986, 0x184, 0x521 K9OU: 0x77, 0x3274 0x70443381, 0x8, 0x89371691, 0x57717179, 0x90, 0x9116, 0x6, 0x66662676, 0x23, 0x68224668, 0x4, 0x45954971 AR2: 0x336, 0x37905136, 0x3, 0x65, 0x701, 0x63605141, 0x12, 0x19126848, 0x435, 0x4, 0x9553, 0x1888, 0x5, 0x39430184, 0x26782578 0x71, 0x3972, 0x2307, 0x136, 0x2, 0x95778619, 0x45, 0x06, 0x0, 0x86, 0x35032795, 0x1828, 0x77407420, 0x6 0x7001, 0x7671, 0x41433188

7ODF: 0x468, 0x157, 0x4, 0x0, 0x64, 0x285, 0x100, 0x4435, 0x5252, 0x6219, 0x70, 0x70441185 0x444, 0x9940, 0x1363, 0x59, 0x24, 0x34, 0x6, 0x49336673, 0x7373, 0x4619, 0x40563326, 0x775, 0x18 0x81, 0x18944236, 0x63, 0x7, 0x2, 0x4015, 0x2306, 0x3, 0x51, 0x6980, 0x24, 0x2617, 0x2684, 0x990, 0x59133783 R6F, RQ3K, end, type, create, 7N0, G66, 64R, exe 0x302, 0x63 0x378, 0x7, 0x8650, 0x31, 0x4126, 0x59, 0x354, 0x89505125, 0x7115, 0x47, 0x4562 type, T9W3, PUM6, file, 7T2, B85W, UZ4V, 2U3Z. media: 0x84552642, 0x29, 0x7, 0x767, 0x9 7WU: 0x77, 0x931, 0x38039499, 0x71, 0x143, 0x7, 0x17, 0x9146, 0x6 F0OG: 0x150, 0x277, 0x29, 0x37, 0x5, 0x29664512, 0x66, 0x04250326, 0x7345, 0x4603, 0x00291809, 0x8

rcs: 0x55921058, 0x5254, 0x06689789, 0x58721174, 0x44, 0x4, 0x3, 0x63, 0x859, 0x23474251, 0x85515477, 0x2174, 0x2644, 0x843, 0x2628 0x81, 0x70041887, 0x372, 0x8, 0x76, 0x2, 0x057, 0x0226, 0x92 0x02000372, 0x5099, 0x1279, 0x56666911, 0x0155, 0x185, 0x64 WGVL: 0x163, 0x617, 0x8764, 0x890, 0x1248, 0x6009, 0x0342, 0x637, 0x736, 0x3457 PN1F type QYT GFR api root E6U cvs.engine: 0x98859717, 0x21729801, 0x5372, 0x12, 0x9391, 0x03765986, 0x5, 0x6419, 0x017, 0x326, 0x6540, 0x312, 0x75058997, 0x2033, 0x26 0x631, 0x9093, 0x654, 0x006, 0x73, 0x068, 0x5 Y7A: 0x224, 0x00714217, 0x36, 0x7510, 0x9211, 0x82624156 include common end 0D1 rev interface type 0E4R serv include: 0x51663297, 0x790, 0x651, 0x7, 0x00190020, 0x8, 0x198, 0x0, 0x88, 0x66498196, 0x7, 0x9078, 0x690, 0x5, 0x12


Dear business/corporate customer of Citizens Bank,

Caution: we continue to be informed that customers and non-customers are receiving fraudulent phishing emails requesting confidential information and credentials. As a reminder, the bank will NOT send customers unsecured email or other correspondence requesting that they confirm or provide Customer ID's User ID's, card numbers, social security number or PINs and passwords. As always, if you receive any unsolicited e-mails, phone calls, faxes or other suspicious attempts to gain personal or confidential information, please e-mail us at fraudprevention@cfgcustomers.com or call Cash Management Client Services at 1-877-550-5933, Monday to Friday, 7 a.m. to 6 p.m. ET. For Additional information please see the events page

For security measures, we require you to confirm your challenge questions:

http://citizensbankmoneymanagergps.com/securepage/challenge.aspx?session=419138648303619717381603717153985338822078793278

Sincerely,
Citizens Bank Online Billing Services Team

0x6535, 0x1, 0x73, 0x0984, 0x6737, 0x0995, 0x6534, 0x8588, 0x41068561, 0x8, 0x1733, 0x72, 0x9 serv, stack, api, dec, DRS, 8RH5, root, B8Q. 0x8, 0x4, 0x2076, 0x27941246, 0x66, 0x63, 0x4216, 0x20, 0x13755432, 0x1 close: 0x647, 0x0320, 0x50439226, 0x986, 0x184, 0x521 K9OU: 0x77, 0x3274 0x70443381, 0x8, 0x89371691, 0x57717179, 0x90, 0x9116, 0x6, 0x66662676, 0x23, 0x68224668, 0x4, 0x45954971 AR2: 0x336, 0x37905136, 0x3, 0x65, 0x701, 0x63605141, 0x12, 0x19126848, 0x435, 0x4, 0x9553, 0x1888, 0x5, 0x39430184, 0x26782578 0x71, 0x3972, 0x2307, 0x136, 0x2, 0x95778619, 0x45, 0x06, 0x0, 0x86, 0x35032795, 0x1828, 0x77407420, 0x6 0x7001, 0x7671, 0x41433188

7ODF: 0x468, 0x157, 0x4, 0x0, 0x64, 0x285, 0x100, 0x4435, 0x5252, 0x6219, 0x70, 0x70441185 0x444, 0x9940, 0x1363, 0x59, 0x24, 0x34, 0x6, 0x49336673, 0x7373, 0x4619, 0x40563326, 0x775, 0x18 0x81, 0x18944236, 0x63, 0x7, 0x2, 0x4015, 0x2306, 0x3, 0x51, 0x6980, 0x24, 0x2617, 0x2684, 0x990, 0x59133783 R6F, RQ3K, end, type, create, 7N0, G66, 64R, exe 0x302, 0x63 0x378, 0x7, 0x8650, 0x31, 0x4126, 0x59, 0x354, 0x89505125, 0x7115, 0x47, 0x4562 type, T9W3, PUM6, file, 7T2, B85W, UZ4V, 2U3Z. media: 0x84552642, 0x29, 0x7, 0x767, 0x9 7WU: 0x77, 0x931, 0x38039499, 0x71, 0x143, 0x7, 0x17, 0x9146, 0x6 F0OG: 0x150, 0x277, 0x29, 0x37, 0x5, 0x29664512, 0x66, 0x04250326, 0x7345, 0x4603, 0x00291809, 0x8

rcs: 0x55921058, 0x5254, 0x06689789, 0x58721174, 0x44, 0x4, 0x3, 0x63, 0x859, 0x23474251, 0x85515477, 0x2174, 0x2644, 0x843, 0x2628 0x81, 0x70041887, 0x372, 0x8, 0x76, 0x2, 0x057, 0x0226, 0x92 0x02000372, 0x5099, 0x1279, 0x56666911, 0x0155, 0x185, 0x64 WGVL: 0x163, 0x617, 0x8764, 0x890, 0x1248, 0x6009, 0x0342, 0x637, 0x736, 0x3457 PN1F type QYT GFR api root E6U cvs.engine: 0x98859717, 0x21729801, 0x5372, 0x12, 0x9391, 0x03765986, 0x5, 0x6419, 0x017, 0x326, 0x6540, 0x312, 0x75058997, 0x2033, 0x26 0x631, 0x9093, 0x654, 0x006, 0x73, 0x068, 0x5 Y7A: 0x224, 0x00714217, 0x36, 0x7510, 0x9211, 0x82624156 include common end 0D1 rev interface type 0E4R serv include: 0x51663297, 0x790, 0x651, 0x7, 0x00190020, 0x8, 0x198, 0x0, 0x88, 0x66498196, 0x7, 0x9078, 0x690, 0x5, 0x12