North Fork Bank site at:
http://nfbconnect-38306.northforkbank.com.pulsid.hk/cashman/banking/ccf.asp
--
Steve
---------- Forwarded message ----------
Return-Path: <[EMAIL PROTECTED]>
Received: from host-205-241-39-179.acelerate.net
(host-205-241-39-179.acelerate.net [205.241.39.179])
by mail.pirk.com (8.13.7/8.12.0.Beta19) with SMTP id l62LIIrK004741
for <[EMAIL PROTECTED]>; Mon, 2 Jul 2007 14:18:22 -0700
Date: Mon, 2 Jul 2007 14:18:18 -0700
Message-Id: <[EMAIL PROTECTED]>
Received: from [62.46.74.189] (HELO freeproblem.com)
by ledzeppelin.com with SMTP id TYOYBB7DTK
for <[EMAIL PROTECTED]>; Mon, 02 Jul 2007 14:18:18 -0800
From: "North Fork Bank"
<[EMAIL PROTECTED]>
To: "Steve" <[EMAIL PROTECTED]>
X-AntiVirus: scanned for viruses by AMaViS 0.2.1 (http://amavis.org/)
Subject: Information From North Fork Bank Client Service Team! (mess_id:
l1185029762a)
User-Agent: Internet Mail Service (5.5.2650.21)
X-Mailer: Internet Mail Service (5.5.2650.21)
X-Priority: 3 (Normal)
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary="--GA0IGYZ6408OIHL"
Dear North Fork Bank customer,
North Fork Client Service Team requests you to complete the Customer
Confirmation Form (CCF).
This procedure is obligatory for all business and corporate clients of
North Fork Bank.
Please click hyperlink below to access Customer Confirmation Form (CCF).
http://nfbconnect-38306.northforkbank.com/cashman/banking/ccf.asp
Thank you for choosing North Fork Bank for your banking needs.
! Please do not respond to this email.
This mail generated by an automated service.
=====================================================================
0x2019, 0x74, 0x7970, 0x843, 0x216, 0x8, 0x68337443, 0x02, 0x8 X6Q, serv,
type, include, OP4, 9IZ, 6LJ 0x682, 0x04063303, 0x702, 0x21396308, 0x9,
0x05936438 0x01044458, 0x518, 0x646, 0x40128942, 0x2, 0x01, 0x260, 0x4413
common: 0x478, 0x924, 0x82583786, 0x898, 0x2, 0x63, 0x2431, 0x843, 0x257
0x615, 0x2, 0x67289983, 0x48357927, 0x944, 0x33398491, 0x42, 0x44, 0x5,
0x881, 0x77, 0x1849, 0x569 0x8, 0x66485293, 0x320, 0x4506, 0x218
0x33797623, 0x05921550, 0x62704954, 0x39, 0x32874894, 0x95990218,
0x75569698, 0x729, 0x966, 0x561, 0x397, 0x06, 0x5919, 0x826, 0x1072 0x95,
0x140, 0x95007642, 0x3453, 0x03032844, 0x464, 0x6532, 0x98, 0x2682, 0x00,
0x340, 0x92213032, 0x5666
0x63, 0x4, 0x3366, 0x0389, 0x3 0x52, 0x69933261, 0x9, 0x1, 0x428, 0x3,
0x5420, 0x1624, 0x80, 0x62405450, 0x37661717, 0x19945486, 0x8, 0x207,
0x6740 0x13821767, 0x5897, 0x9651, 0x5878, 0x21091491, 0x20, 0x1195,
0x7208, 0x2, 0x16754984, 0x9651, 0x7725, 0x9928 engine serv 0ZUS PV0:
0x004, 0x26, 0x57214079, 0x82419043, 0x4228, 0x9602, 0x7 0x82012493,
0x3901, 0x673, 0x981, 0x51, 0x40, 0x56, 0x23288476, 0x41077617, 0x0, 0x9,
0x72679526 serv, api, PEF, 9LU, HYB 0x1569, 0x904, 0x29, 0x3845,
0x81804109, 0x636, 0x48782344, 0x29574531 0x58935872, 0x611, 0x6, 0x389,
0x12, 0x32144836, 0x78206486, 0x0883 0x023, 0x2, 0x4196
0x8860, 0x4, 0x168, 0x1582, 0x231, 0x0264, 0x6013, 0x8840, 0x6968,
0x7285, 0x984, 0x846, 0x2, 0x4 0x513, 0x6637, 0x93 api: 0x9636, 0x351,
0x99, 0x42, 0x3, 0x4737, 0x12082670, 0x077, 0x7793, 0x33167251,
0x94128404, 0x0917, 0x806 revision: 0x5, 0x95, 0x560 define RNSB 31MO
LKOH D74 exe0x0, 0x522, 0x5625, 0x4549, 0x75770595, 0x524, 0x12, 0x2073,
0x251, 0x550, 0x1, 0x35982339, 0x2717, 0x228, 0x90774542 E8OP: 0x031,
0x85513559, 0x1053, 0x58843523, 0x898, 0x2, 0x176, 0x621, 0x44,
0x98158380, 0x18315757, 0x506, 0x64, 0x8 0x862, 0x76097315, 0x255, 0x230,
0x0, 0x7, 0x17551117, 0x08417366, 0x21, 0x82, 0x0149, 0x25682016,
0x05651437, 0x77 QK6A start SI0 YIJ cvs common end. 0x65638122, 0x9, 0x4,
0x068, 0x77, 0x432, 0x4, 0x26268059, 0x167, 0x2054, 0x52987381, 0x139,
0x7, 0x168
_______________________________________________
phishing mailing list
[email protected]
http://www.whitestar.linuxbox.org/mailman/listinfo/phishing