|
Date Reported: 8th November 2016  |
Risk Level: MEDIUM  |
|
|
 |
 |
|
Email Subject: |
New 15 Important Message From REGIONS "howiem@bigfoot.com" |
|
Apparent Sender: |
REGIONS  |
|
Return Address: |
onlinesuport-ussystem@systemsupport-adminsupport.org  |
|
Email Format: |
HTML  |
|
URL of Web Content: |
http://www.tanistry.com/wordpress/wp-content/plugi ns/easyrotator-for-wordpress/views/Regions/  |
|
Anchor text of URLs: |
1) URL link is in form of image  |
|
Location: |
SCOTTSDALE, ARIZONA, UNITED STATES  |
|
Scam number: |
25503-274588-611869 |
|
Comments: |
- Email asks you to confirm/update/verify your account data at REGIONS by visiting the given link. You will be taken to a spoof website where your details will be captured for the phishers.
- REGIONS never send their users emails requesting personal details in this way.
- The spoof website this email links to was not online at time of this report, but variations of the scam which link to working websites are bound to exist, so be wary! The website may have been taken down or disabled by the hosts, but quite often these websites are hosted on the personal computer of the phishers, so may only be online at certain times.
|
|
|
|
 |
 |
|
|
|
Message-ID: 20161107161059.90F3DF01E5DDB09C@systemsupport -adminsupport.org MIME-Version: 1.0 Content-Type: multipart/related; boundary="----=_NextPart_000_0012_361AF4BB.B2 2C8F9A" X-Originating-IP: [142.54.162.222] X-ClientProxiedBy: CY1PR10CA0005.namprd10.prod.outlook.com (10.162.208.15) To CY1PR20MB0013.namprd20.prod.outlook.com (10.162.40.139) X-MS-Office365-Filtering-Correlation-Id: 986a20ec-be31-46de-3a75-08d4076bbc63 X-Microsoft-Exchange-Diagnostics: <...
|
|
|
|
Website: |
|
|
|
|
Website was not online when we checked. It returned the error 404 |