National City phishing site at:
http://session-2063716371.nationalcity.com.kitrt.cn/corporate/onlineservices/TreasuryMgmt/
--
Steve
---------- Forwarded message ----------
Return-Path: <[EMAIL PROTECTED]>
Received: from cm-83-97-229-62.telecable.es (cm-83-97-229-62.telecable.es
[83.97.229.62])
by mail.pirk.com (8.13.7/8.12.0.Beta19) with SMTP id l5HErCa5009288
for <[EMAIL PROTECTED]>; Sun, 17 Jun 2007 07:53:13 -0700
Date: Sun, 17 Jun 2007 07:53:12 -0700
Message-Id: <[EMAIL PROTECTED]>
Received: from pacbell.net (pacbell.net.cisarte.com [106.80.60.254])
by joker.com with SMTP id 8RE9VBLRHW
for <[EMAIL PROTECTED]>; Sun, 17 Jun 2007 09:53:09 -0600
From: "National City" <[EMAIL PROTECTED]>
To: "Orion" <[EMAIL PROTECTED]>
Subject: National City corporate customer service: important banking mail!
X-remove: 61768
User-Agent: Internet Mail Service (5.5.2650.21)
X-Priority: 3 (Normal)
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary="--F6VZDY_3LMB1G5G"
Dear National City business client:
The National City Corporate Customer Service requests you to complete the
National City Business Online Client Form.
This procedure is obligatory for all business and corporate clients of
National City.
Please select the hyperlink and visit the address listed to access the
National City Business Online Client Form.
http://session-2063716371.nationalcity.com/corporate/onlineservices/TreasuryMgmt
/
Again, thank you for choosing National City for your business needs. We
look forward to working with you.
***** Please do not respond to this email *****
This mail is generated by an automated service.
Replies to this mail are not read by National City Corporate Customer
Service or technical support.
********************************************************************************
********
0x8443, 0x966, 0x025, 0x69, 0x83883821, 0x451, 0x58, 0x7036, 0x036, 0x0,
0x073, 0x26233842, 0x609, 0x11, 0x55 tmp tmp 5M9R close. 0x118, 0x0,
0x6752, 0x1692, 0x7965, 0x56720356, 0x8, 0x1, 0x83592537, 0x9, 0x67
0x1897, 0x0, 0x919, 0x23, 0x97, 0x38638855, 0x0389, 0x86, 0x4807, 0x152
0x4341, 0x4260, 0x06, 0x7, 0x0810, 0x5779 0x9, 0x23219386, 0x60795972,
0x566, 0x1, 0x47879967, 0x029, 0x885, 0x09, 0x62648656, 0x218, 0x35674209
0x8, 0x47059262, 0x41, 0x4962, 0x593, 0x7406, 0x4362, 0x48, 0x54, 0x10,
0x690, 0x0, 0x8154, 0x48, 0x118 0x33315387, 0x7, 0x729, 0x5, 0x2,
0x75926611, 0x188, 0x47, 0x68868656, 0x432, 0x99 0x448, 0x74484686,
0x19890553, 0x049, 0x905, 0x12, 0x4, 0x8302, 0x07930533, 0x69035733,
0x088, 0x15, 0x4, 0x53931896
media: 0x73, 0x68695058, 0x81644464, 0x043, 0x7115 0x42375392, 0x5,
0x023, 0x108 0x232, 0x32108127, 0x66574383, 0x41, 0x3, 0x0235, 0x827,
0x6654, 0x2 OCJ, VZYH, OOK, R93, X7SK 0x63989498, 0x387, 0x04 update:
0x45277220, 0x5596, 0x8113, 0x04, 0x139, 0x860, 0x32317288, 0x52, 0x544,
0x93 GY6, close, cvs, EL7, close, engine, engine update: 0x250, 0x007,
0x8574, 0x87180814, 0x0, 0x9816, 0x6, 0x7166, 0x82, 0x9603, 0x730,
0x35243212 0x45, 0x0, 0x4, 0x35, 0x02 serv: 0x711, 0x22144437, 0x5714,
0x7
0x749, 0x67, 0x14, 0x84, 0x2572, 0x2, 0x85792553, 0x27, 0x2, 0x18 71M:
0x70, 0x8688, 0x273, 0x725, 0x38544004, 0x8, 0x66, 0x928, 0x573, 0x9,
0x641 0x4256, 0x3, 0x56103680, 0x4 hex: 0x449, 0x92, 0x95, 0x3, 0x464
MM1C W3H 47U include KCL.0x38, 0x6 0x38504151, 0x46139619, 0x0574,
0x86522538, 0x493, 0x5712, 0x10, 0x20, 0x9, 0x7, 0x0, 0x60, 0x865 0x74,
0x99416268 file, media, revision, GLJG, G1XJ, file, close, 7SN 0x5725,
0x3, 0x480, 0x283
_______________________________________________
phishing mailing list
[email protected]
http://www.whitestar.linuxbox.org/mailman/listinfo/phishing