|
|
Date Reported: 31st January 2016  |
Risk Level: MEDIUM-HIGH  |
|
|
 |
 |
|
Email Subject: |
DEMANDE SPONTANéE D EMPLOIS LIVREUR CHAUFFEUR MAGASINIER AUTRE... |
|
Apparent Sender: |
daniel wouters  |
|
Return Address: |
fa489176@skynet.be  |
|
Email Format: |
HTML  |
|
URL of Web Content: |
http://prod.phx3.secureserver.net  |
|
Anchor text of URLs: |
1) prod.phx3.secureserver.net, 2) prod.phx3.secureserver.net, 3) prod.phx3.secureserver.net  |
|
Location: |
, ,  |
|
Scam number: |
24667-118092-349598 |
|
Comments: |
- Email asks you to confirm/update/verify your account data at daniel wouters by visiting the given link. You will be taken to a spoof website where your details will be captured for the phishers.
- daniel wouters never send their users emails requesting personal details in this way.
|
|
|
|
 |
 |
|
|
|
RECEIVED: (qmail 28547 invoked by uid 30297); 30 Jan 2016 13:16:38 -0000
RECEIVED: from unknown (HELO p3plibsmtp02-06.prod.phx3.secureserver.net) ([97.74.135.171]) (envelope-sender fa489176@skynet.be) by p3plsmtp09-06.prod.phx3.secureserver.net (qmail-1.03) with SMTP for arsia@arsia.com; 30 Jan 2016 13:16:38 -0000
RECEIVED: from BAY004-OMC3S3.hotmail.com ([65.54.190.141]) by p3plibsmtp02-06.prod.phx3.secureserver.net with bizsmtp id CDGe1s03533VWKl01DGezC; Sat, 30 Jan ...
|
|
|
|
Website: |
|
|
|
|
|
|
|
Please send us any scam/phishing emails you have received by reporting them here
For access to our huge blacklist of domain names and to sign up to our live feed of ALL the scams we receive please take a look at our Honeytrap service
If you have received the email below, please remember that it is very common for these email scams to be redistributed at a later date with only slightly different content, such as a different subject or return address, or with the fake webpage(s) hosted on a different webserver.
We aim to report every variant of the scams we receive, so even if it appears that a scam you receive has already been reported, please submit it to us anyway.
|