Citizen's bank phish at: http://citibusinessonline.citibank.com.platoniv6.es/citibusinessonline/CBF.do
-- Steve Equal bytes for women. ---------- Forwarded message ---------- Return-Path: <[EMAIL PROTECTED]> Received: from 75.146.60.201 ([85.138.118.85]) by mail.pirk.com (8.14.1/8.12.0.Beta19) with SMTP id m1KJZGCx005350 for <[EMAIL PROTECTED]>; Wed, 20 Feb 2008 11:35:17 -0800 Date: Wed, 20 Feb 2008 11:35:16 -0800 Message-Id: <[EMAIL PROTECTED]> Received: from [96.96.244.104] (HELO attain.grungecafe.com) by russiangirlwant.com with SMTP id 73X24I60X1 for <[EMAIL PROTECTED]>; Wed, 20 Feb 2008 11:35:23 -0800 From: "CitiBusiness" <[EMAIL PROTECTED]> To: "Orion" <[EMAIL PROTECTED]> Subject: Online Banking Account Confirmation. X-Authentication-Warning: P98-complementary32.FT1zytw.cash-traffic.com [38.248.241.128]: yvo1beige set sender to [EMAIL PROTECTED] using -k User-Agent: Pegasus Mail for Win32 (v2.53/R1) X-Priority: 3 (Normal) MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="--DKR5MCIRUIJO4J1PU88DY0" Dear CitiBusiness customer, Financial institutions are frequent targets of fraudsters. We have implemented security measures to protect our systems from attack, but increasingly, our customers must also protect themselves. Our new CitiBusiness Form (CBF) will help you to protect your data from misuse, unauthorized access, loss, alteration or destruction. You must complete CBF on a regular basis. Please click on the link below to open CBF: http://citibusinessonline.citibank.com/citibusinessonline/CBF.do?CID=68561885846 664243240646520651367238405632664547030&systemid=261083645549 This email has been automatically generated. 0x5247, 0x462, 0x8199, 0x09186453, 0x2, 0x9299, 0x40, 0x3538, 0x113 dec file FROZ root YSJ include start 9XH source 0x96, 0x09, 0x31176295, 0x768, 0x816, 0x9, 0x0, 0x7 518425064 7PA: 0x15, 0x26, 0x031, 0x5708, 0x9975 0x3, 0x67766923, 0x8591, 0x2, 0x58872504, 0x36, 0x243, 0x55134866, 0x4068, 0x76, 0x468, 0x62583292, 0x15, 0x40, 0x2667 0x1329, 0x0708, 0x89252504, 0x04598278, 0x86 ON81: 0x857, 0x915, 0x15, 0x74, 0x066, 0x241, 0x23559723, 0x24, 0x72064688, 0x7, 0x0, 0x3984 0x4, 0x0, 0x76582537, 0x37, 0x616, 0x04, 0x09, 0x82, 0x14, 0x64488015, 0x30484621 serv: 0x3313, 0x10, 0x8, 0x8, 0x13132119, 0x880, 0x23, 0x3, 0x640 stack: 0x41, 0x193, 0x9, 0x66, 0x276, 0x95, 0x5, 0x3, 0x2, 0x02, 0x46954196, 0x138, 0x34994685, 0x99 0x46779287, 0x19838724 0x72, 0x449, 0x5, 0x7726 H8H rev FWB 1D0 root UD4 ZNC exe: 0x71053601, 0x0, 0x058, 0x4, 0x9, 0x232, 0x60, 0x9015, 0x57849612, 0x21806465, 0x8984, 0x20221913 17588590545464450441976879 0x3519, 0x87400065, 0x106, 0x009, 0x136 api, VTV, type, source, BZ8, function, cvs. 0x3, 0x1, 0x984, 0x7, 0x3, 0x44968157, 0x55375269, 0x903 0x599 0x26823397, 0x08, 0x03 0x146, 0x90365623, 0x8, 0x66513817, 0x22, 0x4212, 0x55778088, 0x61, 0x5714, 0x828 engine: 0x30, 0x52, 0x9, 0x6220, 0x598, 0x0077, 0x395, 0x8092, 0x71955566, 0x2, 0x60, 0x91, 0x0 function: 0x8, 0x91, 0x86823067, 0x9, 0x3231, 0x6160, 0x94, 0x86, 0x0, 0x61, 0x57190628, 0x1, 0x43, 0x54314885 0x17961259, 0x76 end, CHT0 0x23868898, 0x8 0x506, 0x96656001, 0x0, 0x71, 0x49, 0x2896, 0x7217, 0x3266, 0x8633, 0x82299600, 0x28896204, 0x5, 0x9, 0x869, 0x489 0x92, 0x6768, 0x35, 0x0346, 0x7645, 0x8332, 0x2745, 0x37017452, 0x4593, 0x6, 0x38 IQEB M2D define FRB HZS7 JHQP W8B root rcs: 0x39382533, 0x55, 0x5, 0x04275997, 0x177, 0x10, 0x9, 0x028, 0x95, 0x62 8150653078206209163222838197415049 7039176964175273 0x31, 0x0, 0x4, 0x44 0x7, 0x30, 0x0764 file: 0x70, 0x3, 0x11787425, 0x6, 0x123, 0x63663535, 0x86417003, 0x78169435, 0x82709196, 0x20, 0x6, 0x40 _______________________________________________ phishing mailing list phishing@whitestar.linuxbox.org http://www.whitestar.linuxbox.org/mailman/listinfo/phishing