|
|
Date Reported: 12th October 2008 |
Risk Level: MEDIUM |
|
|
|
|
|
Email Subject: |
Security Upgrade |
|
Apparent Sender: |
HSBC Bank |
|
Return Address: |
< security@ hsbcib.com > |
|
Email Format: |
HTML |
|
URL of Web Content: |
http://adsl-074-168-001-082.sip.mem. bellsouth.net/secure/ssh/check/ www.hsbcIB.com/1/2/personals/ibanking/ |
|
Location: |
TN, US |
|
Scam number: |
aa-7979 |
|
Comments: |
-
Email asks you to confirm/update/verify your account data at HSBC Bank by visiting the given link. You will be taken to a spoof website where your details will be captured for the phishers.
- HSBC Bank never send their users emails requesting personal details in this way.
-
The REAL URL of the spoof website looks nothing like the actual HSBC Bank URL.
|
|
|
|
|
|
|
|
|
|
"As part of our ongoing commitment to offer you the safest possible internet banking service, we are constantly reviewing and enhancing the security we offer our customers."
|
As part of our ongoing commitment to offer you the safest possible internet banking service, we are constantly reviewing and enhancing the security we offer our customers. Therefore, we are introducing an additional security feature for online payments.
Your account information needs to be checked. Please login by going to:
http://adsl-074-168-001-082.sip.mem.bellsouth.net/secure/ssh/check/www.hsbcIB.com/1/2/personals/ibanking/
If necessary, update your personal information by clicking on 'My details' and then 'Personal details'.
Thank you for banking with HSBC.
|
|
|
Website: |
|
|
|
|
|
|
|
Please send us any scam/phishing emails you have received by reporting them here
For access to our huge blacklist of domain names and to sign up to our live feed of ALL the scams we receive please take a look at our Honeytrap service
If you have received the email below, please remember that it is very common for these email scams to be redistributed at a later date with only slightly different content, such as a different subject or return address, or with the fake webpage(s) hosted on a different webserver.
We aim to report every variant of the scams we receive, so even if it appears that a scam you receive has already been reported, please submit it to us anyway.
|