Has someone offered you a huge sum of money or a valuable consignment? It's a 419 or advance fee fraud - find out how they work, and what to do to be safe.
#417849 by buried under 419s Tue Sep 29, 2020 8:35 pm
Return-path: <[email protected]>
Envelope-to:
Delivery-date: Tue, 29 Sep 2020 20:31:46 +0000
Received: from mail.ooc-orpic.com ([5.37.60.131]:30487 helo=MGM-FML-1.ooc-orpic.com)
by with esmtps (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
(Exim 4.93)
(envelope-from <[email protected]>)
id 1kNMHp-0005JY-DN
for ; Tue, 29 Sep 2020 20:31:46 +0000
Received: from User (pool-194-170-128-190.telecel.com.py [190.128.170.194])
by MGM-FML-1.ooc-orpic.com with SMTP id 08RDevxV032562-08RDevxX032562;
Sun, 27 Sep 2020 17:40:59 +0400
Message-Id: <202009271340.08RDevxV032562-08RDevxX032562@MGM-FML-1.ooc-orpic.com>
Reply-To: <[email protected]>
From: "FROM BARCLAYS BANK PLC"<[email protected]>
Date: Sun, 27 Sep 2020 08:41:16 -0500
MIME-Version: 1.0
Content-Type: text/plain;
charset="Windows-1251"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
X-Spam-Status: Yes, score=31.0
X-Spam-Score: 310
X-Spam-Bar: +++++++++++++++++++++++++++++++
X-Spam-Report: Spam detection software, running on the system "",
has identified this incoming email as possible spam. The original
message has been attached to this so you can view it or label
similar future email. If you have any questions, see
root\@localhost for details.
Content preview: BARCLAYS BANK PLC. CLAP HAM JUNCTION BRANCH, 7 ST JOHNS HILL,
SW 11 1 TN, LONDON WWW.barclaysbank.co.uk Alternative Email [email protected]
ATTENTION :DEAR BENEFICIARY
Content analysis details: (31.0 points, 7.0 required)
pts rule name description
---- ---------------------- --------------------------------------------------
1.0 BAYES_999 BODY: Bayes spam probability is 99.9 to 100%
[score: 1.0000]
5.0 BAYES_99 BODY: Bayes spam probability is 99 to 100%
[score: 1.0000]
0.0 DEAR_BENEFICIARY BODY: Dear Beneficiary:
0.0 NSL_RCVD_FROM_USER Received from User
0.0 FSL_CTYPE_WIN1251 Content-Type only seen in 419 spam
0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was
blocked. See
http://wiki.apache.org/spamassassin/Dns ... nsbl-block
for more information.
[URIs: barclaysbank.co.uk]
2.6 RCVD_IN_SORBS_SMTP RBL: SORBS: sender is open SMTP relay
[5.37.60.131 listed in dnsbl.sorbs.net]
1.3 RCVD_IN_RP_RNBL RBL: Relay in RNBL,
https://senderscore.org/blacklistlookup/
[5.37.60.131 listed in bl.score.senderscore.com]
0.5 SUBJ_ALL_CAPS Subject is all capitals
4.0 SPF_FAIL SPF: sender does not match SPF record (fail)
[SPF failed: Please see http://www.openspf.org/Why?s=mfrom;id=b ... nk.com;ip=]
1.0 MISSING_HEADERS Missing To: header
0.0 FROM_MISSP_SPF_FAIL No description available.
0.0 AXB_XMAILER_MIMEOLE_OL_024C2 Yet another X header trait
0.0 FROM_MISSP_MSFT From misspaced + supposed Microsoft tool
0.0 LOTS_OF_MONEY Huge... sums of money
0.0 T_HK_NAME_FROM No description available.
0.9 HK_SCAM No description available.
2.6 MSOE_MID_WRONG_CASE No description available.
0.0 FROM_MISSP_USER From misspaced, from "User"
0.0 FSL_NEW_HELO_USER Spam's using Helo and User
1.6 REPLYTO_WITHOUT_TO_CC No description available.
0.7 FROM_MISSP_XPRIO Misspaced FROM + X-Priority
2.1 FREEMAIL_FORGED_REPLYTO Freemail in Reply-To, but not From
2.5 KAM_NIGERIAN Nigerian Scam and Variants
1.8 MONEY_FROM_MISSP Lots of money and misspaced From
0.6 TO_NO_BRKTS_FROM_MSSP Multiple header formatting problems
0.0 FROM_MISSPACED From: missing whitespace
0.0 FROM_MISSP_REPLYTO From misspaced, has Reply-To
0.0 FROM_MISSP_EH_MATCH From misspaced, matches envelope
0.8 TO_NO_BRKTS_MSFT To: lacks brackets and supposed Microsoft tool
1.9 FORGED_MUA_OUTLOOK Forged mail pretending to be from MS Outlook
0.0 MONEY_FRAUD_8 Lots of money and very many fraud phrases
X-Spam-Flag: YES
Subject: ***SPAM*** REF:-INSTRUCTION TO CREDIT YOUR ACCOUNT WITH THE SUM OF (US$27.000,000.00)



BARCLAYS BANK PLC.
CLAP HAM JUNCTION BRANCH,
7 ST JOHNS HILL,
SW 11 1 TN, LONDON
WWW.barclaysbank.co.uk

Alternative Email [email protected]

ATTENTION :DEAR BENEFICIARY

REF:-INSTRUCTION TO CREDIT YOUR ACCOUNT WITH THE SUM OF (US$27.000,000.00)

This is the second time we are notifying you about this said fund.

After due vetting and evaluation of your Inheritance file which The
Nigerian National Petroleum Corporation (NNPC) in conjunction with the
Ministry Of Finance Of the Federal Republic of Nigeria Forwarded and
contracted us to see to your immediate payment of the sum of
US$27,000,000.00 from their Offshore Account with us.

We were meant to understand from our findings that you have been going
through hard ways by paying a lot of charges to see the release of your
fund (US$27,000,000.00), which has been delayed. Which has been the
handiwork of some miscreant elements from Nigeria

We advise that you stop further communication with any correspondence from
Nigeria . You don't have to pay any charges to receive your Contract fund
anymore as you have met up with the whole requirements, your
representatives in Nigeria will tell you to still go ahead with them but at
your own risk.

The only thing required from you is to obtain Non-Resident Clearance
Form/Receipt which which is very important that you obtain We will help
you to see that you obtain the form so that our bank will affect immediate
transfer of your Inheritance sum (US$27,000,000.00) into your designated
bank account.

Should you follow up our directives, your fund will reflect in your account
within five Bank working days from the day you obtain this form. Do not go
through anybody again but through this Bank if you really want your fund.

Finally, you are advised to forward to this bank your receiving Account.
Where you want this fund to be remitted. Please for your information kindly
reply to this email address: ( [email protected] )

Yours sincerely,
Mr. James Edward Staley
Head, Private Banking Section.

Questions about scams? fraudatiocruor @ gmail.com to contact remove spaces
Advertisement

Who is online

Users browsing this forum: Google Adsense [Bot] and 43 guests