An Email with the Subject "Dear CitiBusiness Customer [Mon, 10 Mar 2008 03:52:25 -0800]" was received in one of Scamdex's honeypot email accounts on Mon, 10 Mar 2008 03:56:12 -0700 and has been classified as a Generic Scam Email. The sender shows as "CitiBusiness" <client_care_service.id516034-9129CBF@citibank.com>.
The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be added to their email address lists for spam purposes.
Dear CitiBusiness customer,
CitiBusiness new Scheduled Maintenance Program protects your data from unauthorized access. CitiBusiness Online Form is important addition to our scheduled maintenance program.
Please use the link below to access CitiBusiness Online Form:
Please do not reply to this auto-generated email. Follow instructions above.
rev: 0x36671832, 0x08854355, 0x1, 0x102, 0x4778, 0x72, 0x5, 0x76, 0x4, 0x298, 0x73854365, 0x8 JQS3, 61B, serv, 7FYN, C8WF. VN5S: 0x741, 0x24296113, 0x46, 0x1840, 0x52094009, 0x903, 0x28 3341672861938955805721882090556920 HMCC: 0x955, 0x928, 0x59, 0x435 0x37472911, 0x347, 0x5623, 0x909, 0x4, 0x8248, 0x24102379, 0x16873948 0x298, 0x96, 0x9673, 0x956, 0x5497, 0x580, 0x8014, 0x8247, 0x395 rev: 0x02905798, 0x77917707, 0x5165 7M7N: 0x3, 0x709, 0x6957, 0x5, 0x952, 0x0803, 0x20455052 ZKZD: 0x44474636, 0x435, 0x009, 0x5, 0x6, 0x0, 0x303, 0x2239, 0x64910973, 0x4, 0x714, 0x0
0x43, 0x8487, 0x9686, 0x9, 0x90, 0x9147, 0x691, 0x96, 0x5076 0x2, 0x1700, 0x2, 0x9850, 0x43632721, 0x52130867 close: 0x08790699, 0x77611656, 0x72, 0x18, 0x4001, 0x50, 0x1503, 0x7 KAOY, hex, P5J, UAX, root 0x5737, 0x69, 0x3695, 0x48 74084834 0x34787639, 0x6, 0x4386, 0x66 NLFU interface IBJ VNO BQCP rcs revision N41 include: 0x211, 0x45, 0x154, 0x77727967, 0x9407 0x9, 0x99 0x7, 0x9, 0x86187143, 0x12, 0x83, 0x94, 0x8
LMRM: 0x65431055, 0x00, 0x064, 0x982, 0x62, 0x0333, 0x8593, 0x535, 0x261, 0x31, 0x15950007, 0x6231, 0x70385681 0x37834359, 0x80, 0x55476945, 0x49482211, 0x4, 0x2, 0x85, 0x609, 0x000, 0x5863, 0x4, 0x20770409, 0x743, 0x898 0x7550, 0x841, 0x468, 0x08526815, 0x73282075, 0x83604358, 0x5, 0x518, 0x09 0x410, 0x03046357, 0x30, 0x9, 0x0222, 0x972, 0x0, 0x44454792 root I34V. common: 0x59, 0x2, 0x2633, 0x5, 0x18, 0x301, 0x165, 0x5, 0x9225, 0x99198422 IIF: 0x26199663, 0x99484920, 0x7265, 0x887, 0x831, 0x51 0x865, 0x8534, 0x289, 0x35421996, 0x6, 0x724, 0x395, 0x352 5TR, 8O8 common, BUII E9L: 0x969, 0x47361368, 0x067, 0x466 3660093512842
439401282706465864202817829 0x59044328, 0x69 0x9632, 0x20, 0x3295, 0x06622141, 0x1392, 0x41, 0x4, 0x5, 0x8, 0x84, 0x4, 0x498 0x702, 0x3291, 0x3680
Dear CitiBusiness customer,
CitiBusiness new Scheduled Maintenance Program protects your data from unauthorized access. CitiBusiness Online Form is important addition to our scheduled maintenance program.
Please use the link below to access CitiBusiness Online Form:
CitiBusiness Online Form
Please do not reply to this auto-generated email. Follow instructions above.
rev: 0x36671832, 0x08854355, 0x1, 0x102, 0x4778, 0x72, 0x5, 0x76, 0x4, 0x298, 0x73854365, 0x8 JQS3, 61B, serv, 7FYN, C8WF. VN5S: 0x741, 0x24296113, 0x46, 0x1840, 0x52094009, 0x903, 0x28 3341672861938955805721882090556920 HMCC: 0x955, 0x928, 0x59, 0x435 0x37472911, 0x347, 0x5623, 0x909, 0x4, 0x8248, 0x24102379, 0x16873948 0x298, 0x96, 0x9673, 0x956, 0x5497, 0x580, 0x8014, 0x8247, 0x395 rev: 0x02905798, 0x77917707, 0x5165 7M7N: 0x3, 0x709, 0x6957, 0x5, 0x952, 0x0803, 0x20455052 ZKZD: 0x44474636, 0x435, 0x009, 0x5, 0x6, 0x0, 0x303, 0x2239, 0x64910973, 0x4, 0x714, 0x0
0x43, 0x8487, 0x9686, 0x9, 0x90, 0x9147, 0x691, 0x96, 0x5076 0x2, 0x1700, 0x2, 0x9850, 0x43632721, 0x52130867 close: 0x08790699, 0x77611656, 0x72, 0x18, 0x4001, 0x50, 0x1503, 0x7 KAOY, hex, P5J, UAX, root 0x5737, 0x69, 0x3695, 0x48 74084834 0x34787639, 0x6, 0x4386, 0x66 NLFU interface IBJ VNO BQCP rcs revision N41 include: 0x211, 0x45, 0x154, 0x77727967, 0x9407 0x9, 0x99 0x7, 0x9, 0x86187143, 0x12, 0x83, 0x94, 0x8
LMRM: 0x65431055, 0x00, 0x064, 0x982, 0x62, 0x0333, 0x8593, 0x535, 0x261, 0x31, 0x15950007, 0x6231, 0x70385681 0x37834359, 0x80, 0x55476945, 0x49482211, 0x4, 0x2, 0x85, 0x609, 0x000, 0x5863, 0x4, 0x20770409, 0x743, 0x898 0x7550, 0x841, 0x468, 0x08526815, 0x73282075, 0x83604358, 0x5, 0x518, 0x09 0x410, 0x03046357, 0x30, 0x9, 0x0222, 0x972, 0x0, 0x44454792 root I34V. common: 0x59, 0x2, 0x2633, 0x5, 0x18, 0x301, 0x165, 0x5, 0x9225, 0x99198422 IIF: 0x26199663, 0x99484920, 0x7265, 0x887, 0x831, 0x51 0x865, 0x8534, 0x289, 0x35421996, 0x6, 0x724, 0x395, 0x352 5TR, 8O8 common, BUII E9L: 0x969, 0x47361368, 0x067, 0x466 3660093512842
439401282706465864202817829 0x59044328, 0x69 0x9632, 0x20, 0x3295, 0x06622141, 0x1392, 0x41, 0x4, 0x5, 0x8, 0x84, 0x4, 0x498 0x702, 0x3291, 0x3680