Another Regions site at:
http://interactsession-64033.regions.com.mttu.jp/ibsregions/cmserver/iform.cfm
hmmm... This one has the same name servers as the last one I
submitted. A phisher getting careless?
[Domain Name] MTTU.JP
[Registrant] Christina Lorentz
[Name Server] ns1.video-rtv.com
[Name Server] ns2.video-rtv.com
[Created on] 2007/06/08
[Expires on] 2008/06/30
[Status] Active
--
Steve
---------- Forwarded message ----------
Return-Path: <[EMAIL PROTECTED]>
Received: from dh110-68.xnet.hr (dh110-68.xnet.hr [83.139.110.68])
by mail.pirk.com (8.13.7/8.12.0.Beta19) with SMTP id l5GAwSEt019002
for <[EMAIL PROTECTED]>; Sat, 16 Jun 2007 03:59:05 -0700
Date: Sat, 16 Jun 2007 03:58:28 -0700
Message-Id: <[EMAIL PROTECTED]>
Received: from craft.noscash.com (unknown [54.220.124.37])
by porno-top.com with SMTP id J8XZVDDNZZ
for <[EMAIL PROTECTED]>; Fri, 15 Jun 2007 11:50:54 -0500
Received: from dig.computermail.net (helo discriminate.computermail.net
[136.144.88.195])
by punkass.com with SMTP id YW7KCGK1WD
for <[EMAIL PROTECTED]>; Fri, 15 Jun 2007 19:48:54 +0300
Delivered-To: [EMAIL PROTECTED]
From: "Regions Bank" <[EMAIL PROTECTED]>
To: "Tapeworm" <[EMAIL PROTECTED]>
Subject: Regions Bank corporate customer service: urgent security
notification for clients! (mess_id: s754056245214m)
Delivered-To: [EMAIL PROTECTED]
User-Agent: Internet Mail Service (5.5.2650.21)
X-Mailer: Internet Mail Service (5.5.2650.21)
X-Priority: 3 (Normal)
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary="--YQQJRLDEKSWE6NCX"
Dear business client of Regions Bank:
The Regions Customer Service requests you to complete the Regions
InterAct Confirmation Form.
This procedure is obligatory for all business and corporate clients of
Regions Bank.
Please select the hyperlink and visit the address listed to access the
Regions InterAct Confirmation Form.
http://interactsession-64033.regions.com/ibsregions/cmserver/iform.cfm
Again, thank you for choosing Regions Bank for your business needs. We
look forward to working with you.
***** Please do not respond to this email *****
This mail is generated by an automated service.
Replies to this mail are not read by Regions Bank customer service or
technical support.
.
0x53810356, 0x88134846, 0x69918650, 0x0, 0x9701, 0x8, 0x95, 0x8165 start
include 9H8 revision 85OQ XIX Y5GQ close CKF: 0x044, 0x516, 0x91,
0x59743939, 0x4, 0x618, 0x46, 0x4, 0x84, 0x8, 0x01446478, 0x07, 0x10,
0x2493, 0x715 define: 0x57, 0x2581, 0x76, 0x32222443, 0x0, 0x21683250,
0x182, 0x74607089, 0x67, 0x0319, 0x021 0x335 0x04011170, 0x88, 0x6267,
0x29, 0x57, 0x1, 0x8, 0x671 0x26, 0x19037422, 0x1234, 0x85307861, 0x22,
0x7, 0x881, 0x196, 0x0414, 0x0 H7Q: 0x66091285, 0x43, 0x057, 0x8071,
0x72, 0x57, 0x00882419, 0x0694, 0x20050705, 0x9982, 0x47093770, 0x65 0x5,
0x938, 0x92004765, 0x73, 0x7, 0x9, 0x00, 0x18, 0x2, 0x13, 0x01111327,
0x6, 0x15, 0x18159326, 0x3829
0x285, 0x9228, 0x3, 0x418, 0x42398601, 0x71273628, 0x8, 0x0370, 0x79,
0x3, 0x2 0x79, 0x50, 0x4577, 0x7985, 0x670, 0x151, 0x95790554, 0x2,
0x4445, 0x12166612, 0x601 0x254, 0x275, 0x42056187, 0x36, 0x8321, 0x056,
0x1679, 0x8355, 0x60 34EN, function, serv. JLW: 0x46, 0x13057883, 0x5837,
0x5831, 0x68618560, 0x324, 0x28, 0x079, 0x9, 0x52028476, 0x6, 0x6416,
0x57053245, 0x96629978 create: 0x06, 0x05, 0x2, 0x0703, 0x217, 0x50,
0x717, 0x26, 0x04424740, 0x05525220, 0x07, 0x3, 0x47086789, 0x4, 0x3065
NCG, EAGQ, root, TX3, common, dec. Z9L: 0x60, 0x24, 0x112, 0x32329934,
0x08908453, 0x666 2BO: 0x34397764, 0x7, 0x93, 0x6335, 0x35, 0x9573,
0x62776865, 0x20246777, 0x6847, 0x39973983, 0x9, 0x757 hex: 0x0180,
0x6423, 0x72108415, 0x29, 0x704
0x47, 0x891, 0x3, 0x6475, 0x8246, 0x07 0x2, 0x4, 0x53, 0x3, 0x581,
0x66068443, 0x94, 0x4940, 0x92619178, 0x3, 0x3, 0x95, 0x31, 0x4, 0x0913
JEKI: 0x499, 0x41694050 0x0, 0x2464, 0x6, 0x103, 0x8917, 0x34916011, 0x1
PXD, HPA, 2YI, 4B93, 6D70, VALF.0x1, 0x88, 0x1, 0x25593714 0x6515, 0x938,
0x1757, 0x56, 0x4839, 0x184, 0x129, 0x49, 0x01, 0x52066896, 0x2009,
0x472, 0x7, 0x90, 0x45268877 KC4J: 0x4695, 0x1, 0x40776980, 0x72751264,
0x49, 0x5795, 0x52108038, 0x1784, 0x3382, 0x492, 0x68, 0x54, 0x8493,
0x76605061 media, close. 0x79720982, 0x37970480, 0x20302519, 0x10,
0x41993545, 0x9
_______________________________________________
phishing mailing list
[email protected]
http://www.whitestar.linuxbox.org/mailman/listinfo/phishing