|
|
|
|
|
|
 |
|
|
|
Security Alert.
Microsoft
|
|
|
|
 |
|
 |
|
|
Date Reported: 9th May 2017  |
Risk Level: MEDIUM-HIGH  |
|
|
 |
 |
|
Email Subject: |
Security Alert. |
|
Apparent Sender: |
Microsoft  |
|
Return Address: |
jhurley@swan-associates.com  |
|
Email Format: |
HTML  |
|
URL of Web Content: |
http://nobsim.com/wp-admin/crypt  |
|
Anchor text of URLs: |
1) Confirm
Account, 2) Confirm
account now!  |
|
Location: |
HOUSTON, TEXAS, UNITED STATES  |
|
Scam number: |
26005-321696-704952 |
|
Comments: |
- Email asks you to confirm/update/verify your account data at Microsoft by visiting the given link. You will be taken to a spoof website where your details will be captured for the phishers.
- Microsoft never send their users emails requesting personal details in this way.
|
|
|
|
 |
 |
|
|
|
Security Alert
DEAR USER,
Our server detects that a wrong password was was tried severally at 03:56 GMT today for your email account from Kuala Lumpur, Malaysia on this IP: 115.254.224.100 address.
To keep your account safe, we strongly recommend that you login and confirm your account immediately , else you stand the risk of having your account suspended.
Confirm Account
if this account was not accessed by you from this location, Confirm ...
|
|
|
|
Website: |
|
|
|
|
|
|
|
 |
 |
 |
|
|
See our most recent scam reports |
 |
Browse our scam report archives |
 |
Search |
Please send us any scam/phishing emails you have received by reporting them here
For access to our huge blacklist of domain names and to sign up to our live feed of ALL the scams we receive please take a look at our Honeytrap service
If you have received the email below, please remember that it is very common for these email scams to be redistributed at a later date with only slightly different content, such as a different subject or return address, or with the fake webpage(s) hosted on a different webserver.
We aim to report every variant of the scams we receive, so even if it appears that a scam you receive has already been reported, please submit it to us anyway.
|
|
|
|
|
|