|
Date Reported: 5th July 2012  |
Risk Level: MEDIUM  |
|
|
 |
 |
|
Email Subject: |
Paypal security center : Alerts ! |
|
Apparent Sender: |
PayPal  |
|
Return Address: |
paypal@securesuite.com  |
|
Email Format: |
HTML  |
|
URL of Web Content: |
http://help.confirm.paypal.com.cgi-bin.webscr.cmd. login.submit.dispatch.4353452352345252523534543532 .bsdutah.com/abc6f0ca58fda3dfc015688bba211b375b989 8/abc6f0ca58fda3dfc015688bba211b375b9898/webscr.ph p?cmd=_login-run&dispatchX85d80a13c0db1f1ff80d 54641  |
|
Anchor text of URLs: |
1) Relog in your account now  |
|
Location: |
SAN FRANCISCO, CALIFORNIA, UNITED STATES  |
|
Scam number: |
20611-350913-799189 |
|
Comments: |
- Email asks you to confirm/update/verify your account data at PayPal by visiting the given link. You will be taken to a spoof website where your details will be captured for the phishers.
- PayPal never send their users emails requesting personal details in this way.
- The spoof website this email links to was not online at time of this report, but variations of the scam which link to working websites are bound to exist, so be wary! The website may have been taken down or disabled by the hosts, but quite often these websites are hosted on the personal computer of the phishers, so may only be online at certain times.
|
|
|
|
 |
 |
|
|
|
MIME-Version: 1.0 Content-Type: text/html Content-Transfer-Encoding: 8bit Message-Id: E1Slebe-00075S-PD@server1.oozlemedia.com Date: Mon, 02 Jul 2012 07:15:50 -0400 X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - server1.oozlemedia.com X-AntiAbuse: Original Domain - aol.com X-AntiAbuse: Originator/Caller UID/GID - [99 32003] / [47 12] X-AntiAbuse: Sender Address Domain - server1.oozlemedia.com X-Source: X-Sour...
|
|
|
|
Website: |
|
|
|
|
Website was not online when we checked. It returned the error 403 |