Fake banks, couriers, law firms, escrow and other fake sites used in scams.
#69346 by Terminator5 Sun Oct 02, 2011 1:54 pm
IP Address 41.184.26.42 . Same IP Address as USAA Phishing Email.


Begin Phishing Email:

Note: This is aservice message with information related to your Chase account(s). Itmay include specific details about transactions, products or onlineservices. If you recently cancelled your account, please disregard thismessage.

Dear Chase OnlineSM Customer:

Sequel to an increase in fraudulent activities, we are updating our security procedures. You are therefore required to confirm your Chase Online ip address with Chase Online Banking Security. In order to begin, click on confirm your Chase Online :

Confirm Your Chase Online.

Failure to confirm your ip address with Chase Online Banking Security will lead to suspension of your account.

Please don't reply directly to this automatically-generated e-mailmessage.

Sincerely,

Online Banking Team


JPMorgan Chase Bank, N.A. Member FDIC
©2011 JPMorgan Chase & Co.


Your personal information is protected by advanced onlinetechnology. For more detailed information, view our Online PrivacyPolicy. To request in writing: Chase Privacy Operations, 451Florida Street, Fourth Floor, LA2-9376, Baton Rouge, LA 70801

EMLSTMT


End Phishing Email


Link to fake Chase Bank Log In at :


http://www.cujab.com/themes/Chase1/chase.php

Header Details:

Delivered-To: xxxxxx
Received: by 10.180.94.170 with SMTP id dd10cs29780wib;
Sun, 2 Oct 2011 06:24:42 -0700 (PDT)
Received: by 10.236.180.168 with SMTP id j28mr46473488yhm.15.1317561881882;
Sun, 02 Oct 2011 06:24:41 -0700 (PDT)
Return-Path: <[email protected]>
Received: from tiburon.websitewelcome.com (tiburon.websitewelcome.com. [70.84.121.130])
by mx.google.com with ESMTPS id d15si4736207anp.201.2011.10.02.06.24.41
(version=TLSv1/SSLv3 cipher=OTHER);
Sun, 02 Oct 2011 06:24:41 -0700 (PDT)
Received-SPF: pass (google.com: domain of [email protected] designates 70.84.121.130 as permitted sender) client-ip=70.84.121.130;
Authentication-Results: mx.google.com; spf=pass (google.com: domain of [email protected] designates 70.84.121.130 as permitted sender) [email protected]
Received: from rburley9 by tiburon.websitewelcome.com with local (Exim 4.69)
(envelope-from <[email protected]>)
id 1RAM22-0005nD-Iu
for xxxxxx; Sun, 02 Oct 2011 08:24:38 -0500
To: xxxxxx
Subject: Chase Bank Online® Important Alert Notification
X-PHP-Script: http://www.cujab.com/themes/bulkum/abube1.php for 41.184.26.42
From: Chase Online Service <[email protected]>
Reply-To:
MIME-Version: 1.0
Content-Type: text/html
Content-Transfer-Encoding: 8bit
Message-Id: <[email protected]>
Date: Sun, 02 Oct 2011 08:24:38 -0500
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - tiburon.websitewelcome.com
X-AntiAbuse: Original Domain - gmail.com
X-AntiAbuse: Originator/Caller UID/GID - [1462 32003] / [47 12]
X-AntiAbuse: Sender Address Domain - tiburon.websitewelcome.com
X-BWhitelist: no
X-Source: /usr/bin/php
X-Source-Args: /usr/bin/php /home/rburley9/public_html/themes/bulkum/abube1.php
X-Source-Dir: cujab.com:/public_html/themes/bulkum
X-Source-Sender:
X-Source-Auth: rburley9
X-Email-Count: 122
X-Source-Cap: cmJ1cmxleTk7Z2V0d2lzZTt0aWJ1cm9uLndlYnNpdGV3ZWxjb21lLmNvbQ==
Last edited by Bubbles on Fri Oct 07, 2011 1:34 am, edited 2 times in total. Reason: Spacint issues

Daniel 8 :25
Advertisement

#69860 by Terminator5 Thu Oct 06, 2011 3:28 pm
The source host name is "41-184-21-162.rv.ipnxtelecoms.com" and the source IP address is 41.184.21.162


Geo-Location Information

Country Nigeria

City Lagos


Begin Phishing Email:

Your Online Session Is Blocked

Dear Customer,

Our records shows that your online session has been blocked due to the following reason.

(1) Log On attempts with invalid information such as yourEmail Address andmother maiden name .

(2) Inadequate Update on your JP Morgan Chase OnlineAccount.

We urge you to restore your JP Morgan Chase Online accountimmediately toavoid final shut down of your account.

Click the link below to Restore Your JP Morgan Chase OnlineAccount.

Restore Your chaseonline Account

Thank you for using Chaseonline Bank .


End Phishing Email


Non functioning hyperlink to this address:

http://www.frontalaudiovisuais.com/news ... rofile.php

Header Details:

Delivered-To: xxxxxx
Received: by 10.180.94.170 with SMTP id dd10cs206615wib;
Thu, 6 Oct 2011 08:41:53 -0700 (PDT)
Received: by 10.227.9.219 with SMTP id m27mr1168976wbm.61.1317915711323;
Thu, 06 Oct 2011 08:41:51 -0700 (PDT)
Return-Path: <@chef.gzw.local>
Received: from mx01.goldzoneweb.info (mx01.goldzoneweb.info. [85.31.211.178])
by mx.google.com with ESMTP id fe15si4362597wbb.95.2011.10.06.08.41.51;
Thu, 06 Oct 2011 08:41:51 -0700 (PDT)
Received-SPF: neutral (google.com: 85.31.211.178 is neither permitted nor denied by best guess record for domain of @chef.gzw.local) client-ip=85.31.211.178;
Authentication-Results: mx.google.com; spf=neutral (google.com: 85.31.211.178 is neither permitted nor denied by best guess record for domain of @chef.gzw.local) [email protected]
Message-Id: <[email protected]>
Received: from chef.gzw.local (chef.gzw.local [172.16.30.21])
by mx01.goldzoneweb.info (Postfix) with SMTP id EC0E56C6067
for <xxxxxx>; Thu, 6 Oct 2011 17:41:49 +0200 (CEST)
Received: by chef.gzw.local (sSMTP sendmail emulation); Thu, 06 Oct 2011 17:30:55 +0200
X-Originating-IP: 41.184.21.162
Date: Thu, 06 Oct 2011 17:30:55 +0200
To: xxxxxx
Subject:
From: <>
Reply-To:
MIME-Version: 1.0
Content-Type: text/html
Content-Transfer-Encoding: 8bit
Last edited by Bubbles on Fri Oct 07, 2011 1:36 am, edited 1 time in total. Reason: Spacing issues

Daniel 8 :25
#69907 by Bubbles Fri Oct 07, 2011 1:47 am
Indeed, phishing is a scourge on the world. We do not cover phishing and encourage anyone who receives a phishing email to report it to the company the phisher is pretending to represent. The typically get right on the phisher and have much more resources than we do the shut down phishing scammers.

To report, go the the real website of the company and look for a link to online security or reporting suspicious messages. All major companies have departments to deal with this including legal and IT.

Do NOT click on any email that comes from a company and does not include something personal in it so you can identify that it was legitimate. All major companies and legitimate companies say they will never ask you to confirm your password or any other identifying information through an email.

If in doubt, enter the company's URL in the address bar. Don't click on a link. Also if you "hover" your cursor over the link, you can look to the bottom left and see that the URL actually will go to some other place than where the email says it will go. DO NOT click on that kind of a link.

If in doubt, ask a support team member by PM. We are all well versed on these tricks. We just don't have the ability to chase them down.

Bubbles, former Scamwarners moderator.

Rest in Peace 24 June 2015.

Gone, but never forgotten.

Who is online

Users browsing this forum: No registered users and 59 guests