|
Date Reported: 19th January 2012  |
Risk Level: MEDIUM-HIGH  |
|
|
 |
 |
|
Email Subject: |
New security measure. |
|
Apparent Sender: |
MSU Federal Credit  |
|
Return Address: |
Uniononline-security@msufcu.org  |
|
Email Format: |
HTML  |
|
URL of Web Content: |
http://bonixflashlight.com/wp-content/uploads/http s:/www.msufcu.org/index.html  |
|
Anchor text of URLs: |
1) https://www.msufcu.org/msufcu_id/login/  |
|
Location: |
WALNUT, CALIFORNIA, UNITED STATES  |
|
Scam number: |
19666-318158-696798 |
|
Comments: |
- Email asks you to confirm/update/verify your account data at MSU Federal Credit by visiting the given link. You will be taken to a spoof website where your details will be captured for the phishers.
- MSU Federal Credit never send their users emails requesting personal details in this way.
- The anchor text appears as a legitimate URL, but don't be fooled - clicking on it will take you to a phishing site!
|
|
|
|
 |
 |
|
|
|
X-Originating-IP: [199.36.138.251] Message-id: 0LY2004DTB1MMIG3@vms169119.mailsrvcs.net MIME-version: 1.0 X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600.0000 X-Mailer: Microsoft Outlook Express 6.00.2600.0000 Content-type: text/html; CHARSET=US-ASCII Content-transfer-encoding: 7BIT X-Priority: 3 X-MSMail-priority: Normal Original-recipient: rfc822;mbd7@gte.net
Jan 19, 2012 02:17:56 PM, online-security@msufcu.org wrote:
Dear Customer,
Yo...
|
|
 Click for full size image |
|
Website: |
|
|
|
|
 Click for full size image |