Citizen's bank phish at:

http://citibusinessonline.citibank.com.platoniv6.es/citibusinessonline/CBF.do

--
Steve
Equal bytes for women.

---------- Forwarded message ----------
Return-Path: <[EMAIL PROTECTED]>
Received: from 75.146.60.201 ([85.138.118.85])
     by mail.pirk.com (8.14.1/8.12.0.Beta19) with SMTP id m1KJZGCx005350
     for <[EMAIL PROTECTED]>; Wed, 20 Feb 2008 11:35:17 -0800
Date: Wed, 20 Feb 2008 11:35:16 -0800
Message-Id: <[EMAIL PROTECTED]>
Received: from [96.96.244.104] (HELO attain.grungecafe.com)
         by russiangirlwant.com with SMTP id 73X24I60X1
         for <[EMAIL PROTECTED]>; Wed, 20 Feb 2008 11:35:23 -0800
From: "CitiBusiness" <[EMAIL PROTECTED]>
To: "Orion" <[EMAIL PROTECTED]>
Subject: Online Banking Account Confirmation.
X-Authentication-Warning: P98-complementary32.FT1zytw.cash-traffic.com
     [38.248.241.128]: yvo1beige set sender to
     [EMAIL PROTECTED] using -k
User-Agent: Pegasus Mail for Win32 (v2.53/R1)
X-Priority: 3 (Normal)
MIME-Version: 1.0
Content-Type: multipart/alternative;
     boundary="--DKR5MCIRUIJO4J1PU88DY0"


Dear CitiBusiness customer,

Financial institutions are frequent targets of fraudsters. We have
implemented security measures to protect our systems from attack, but
increasingly, our customers must also protect themselves.

Our new CitiBusiness Form (CBF) will help you to protect your data from
misuse, unauthorized access, loss, alteration or destruction.

You must complete CBF on a regular basis.

Please click on the link below to open CBF:

http://citibusinessonline.citibank.com/citibusinessonline/CBF.do?CID=68561885846
664243240646520651367238405632664547030&systemid=261083645549

This email has been automatically generated.

0x5247, 0x462, 0x8199, 0x09186453, 0x2, 0x9299, 0x40, 0x3538, 0x113 dec
file FROZ root YSJ include start 9XH source 0x96, 0x09, 0x31176295,
0x768, 0x816, 0x9, 0x0, 0x7 518425064 7PA: 0x15, 0x26, 0x031, 0x5708,
0x9975 0x3, 0x67766923, 0x8591, 0x2, 0x58872504, 0x36, 0x243, 0x55134866,
0x4068, 0x76, 0x468, 0x62583292, 0x15, 0x40, 0x2667 0x1329, 0x0708,
0x89252504, 0x04598278, 0x86 ON81: 0x857, 0x915, 0x15, 0x74, 0x066,
0x241, 0x23559723, 0x24, 0x72064688, 0x7, 0x0, 0x3984 0x4, 0x0,
0x76582537, 0x37, 0x616, 0x04, 0x09, 0x82, 0x14, 0x64488015, 0x30484621
serv: 0x3313, 0x10, 0x8, 0x8, 0x13132119, 0x880, 0x23, 0x3, 0x640

stack: 0x41, 0x193, 0x9, 0x66, 0x276, 0x95, 0x5, 0x3, 0x2, 0x02,
0x46954196, 0x138, 0x34994685, 0x99 0x46779287, 0x19838724 0x72, 0x449,
0x5, 0x7726 H8H rev FWB 1D0 root UD4 ZNC exe: 0x71053601, 0x0, 0x058,
0x4, 0x9, 0x232, 0x60, 0x9015, 0x57849612, 0x21806465, 0x8984, 0x20221913
17588590545464450441976879 0x3519, 0x87400065, 0x106, 0x009, 0x136 api,
VTV, type, source, BZ8, function, cvs. 0x3, 0x1, 0x984, 0x7, 0x3,
0x44968157, 0x55375269, 0x903 0x599 0x26823397, 0x08, 0x03

0x146, 0x90365623, 0x8, 0x66513817, 0x22, 0x4212, 0x55778088, 0x61,
0x5714, 0x828 engine: 0x30, 0x52, 0x9, 0x6220, 0x598, 0x0077, 0x395,
0x8092, 0x71955566, 0x2, 0x60, 0x91, 0x0 function: 0x8, 0x91, 0x86823067,
0x9, 0x3231, 0x6160, 0x94, 0x86, 0x0, 0x61, 0x57190628, 0x1, 0x43,
0x54314885 0x17961259, 0x76 end, CHT0 0x23868898, 0x8 0x506, 0x96656001,
0x0, 0x71, 0x49, 0x2896, 0x7217, 0x3266, 0x8633, 0x82299600, 0x28896204,
0x5, 0x9, 0x869, 0x489 0x92, 0x6768, 0x35, 0x0346, 0x7645, 0x8332,
0x2745, 0x37017452, 0x4593, 0x6, 0x38 IQEB M2D define FRB HZS7 JHQP W8B
root rcs: 0x39382533, 0x55, 0x5, 0x04275997, 0x177, 0x10, 0x9, 0x028,
0x95, 0x62 8150653078206209163222838197415049

7039176964175273 0x31, 0x0, 0x4, 0x44 0x7, 0x30, 0x0764 file: 0x70, 0x3,
0x11787425, 0x6, 0x123, 0x63663535, 0x86417003, 0x78169435, 0x82709196,
0x20, 0x6, 0x40


_______________________________________________
phishing mailing list
phishing@whitestar.linuxbox.org
http://www.whitestar.linuxbox.org/mailman/listinfo/phishing

Reply via email to