Has someone offered you a huge sum of money or a valuable consignment? It's a 419 or advance fee fraud - find out how they work, and what to do to be safe.
#362844 by buried under 419s Sun Apr 22, 2018 7:18 pm
Return-Path: <[email protected]>
Delivered-To:
Received: from
by with LMTP id 0HzdDEAS3VooZwAAjbubUg
for <>; Sun, 22 Apr 2018 15:52:48 -0700
Return-path: <[email protected]>
Envelope-to:
Delivery-date: Sun, 22 Apr 2018 15:52:48 -0700
Received: from johnny.heliohost.org ([65.19.141.67]:51176)
by with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
(Exim 4.89)
(envelope-from <[email protected]>)
id 1fANqd-0006rC-MK
for ; Sun, 22 Apr 2018 15:52:48 -0700
Received: from [::1] (port=45842 helo=johnny.heliohost.org)
by johnny.heliohost.org with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128)
(Exim 4.88)
(envelope-from <[email protected]>)
id 1fANn6-0007G1-IJ; Sun, 22 Apr 2018 15:49:04 -0700
Received: from 207.244.89.106 ([207.244.89.106]) by
weblinkajcredi.heliohost.org (Horde Framework) with HTTPS; Sun, 22 Apr 2018
15:48:53 -0700
Date: Sun, 22 Apr 2018 15:48:53 -0700
Message-ID: <20180422154853.Horde.h82g2RRsVovTPGEqYjSsWXO@weblinkajcredi.heliohost.org>
From: STATE HOUSE <[email protected]>
To:
Reply-to: [email protected]
User-Agent: Horde Application Framework 5
Content-Type: text/html; charset=utf-8
Content-Description: HTML Message
MIME-Version: 1.0
Content-Disposition: inline
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - johnny.heliohost.org
X-AntiAbuse: Original Domain -
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - johnny.heliohost.org
X-Get-Message-Sender-Via: johnny.heliohost.org: authenticated_id: ajcredi/primary_hostname/system user
X-Authenticated-Sender: johnny.heliohost.org: ajcredi
X-Source:
X-Source-Args:
X-Source-Dir:
X-Spam-Status: Yes, score=18.5
X-Spam-Score: 185
X-Spam-Bar: ++++++++++++++++++
X-Spam-Report: Spam detection software, running on the system "",
has identified this incoming email as possible spam. The original
message has been attached to this so you can view it or label
similar future email. If you have any questions, see
root\@localhost for details.

Content preview: OFFICE OF THE PRESIDENCY FEDERAL FUND MONITORY COMMITTEE FOREIGN
PAYMENT CONSOLIDATION OFFICE FEDERAL SECRETARIAT, GARKI-ABUJA [...]

Content analysis details: (18.5 points, 7.0 required)

pts rule name description
---- ---------------------- --------------------------------------------------
5.0 BAYES_99 BODY: Bayes spam probability is 99 to 100%
[score: 1.0000]
3.6 DEAR_BENEFICIARY BODY: Dear Beneficiary:
0.6 URG_BIZ BODY: Contains urgent matter
1.5 SUBJ_ALL_CAPS Subject is all capitals
0.2 FREEMAIL_REPLYTO_END_DIGIT Reply-To freemail username ends in digit
(statehouse1961[at]yahoo.com)
1.2 RCVD_NUMERIC_HELO Received: contains an IP address used for HELO
0.7 MIME_HTML_ONLY BODY: Message only has text/html MIME parts
1.0 BAYES_999 BODY: Bayes spam probability is 99.9 to 100%
[score: 1.0000]
0.0 HTML_MESSAGE BODY: HTML included in message
1.0 KAM_LAZY_DOMAIN_SECURITY Sending domain does not have any
anti-forgery methods
1.6 REPLYTO_WITHOUT_TO_CC No description available.
2.1 FREEMAIL_FORGED_REPLYTO Freemail in Reply-To, but not From
X-Spam-Flag: YES
Subject: ***SPAM*** SUB-IRREVOCABLE PAYMENT APPROVAL VIA-OFF SHORT PAYMENT CENTER

OFFICE OF THE PRESIDENCY
FEDERAL FUND MONITORY COMMITTEE FOREIGN
PAYMENT CONSOLIDATION OFFICE
FEDERAL SECRETARIAT,
GARKI-ABUJA
email:
[email protected]

ATTN: Beneficiary,

DATE: 21st April, 2018


SUB-IRREVOCABLE PAYMENT APPROVAL VIA-OFF
SHORT PAYMENT CENTER

Consequent to this Federal Government resolution and order for respective banks to
effect an immediate remittance of all long overdue payments, we have discovered that
your fund has been lying unclaimed. You have satisfied this Committee set up to vet
all approvals for immediate payment therefore eligible to have your fund
transferred, having secured the approval documents of this payment in your name.
Please confirm this account below if it is receiving bank/account details and should
be used in remitting your fund.

CITY NATIONAL BANK,
Address: 5TH &amp; D AVE.,
LAWTON, OKLAHOMA 73502 - MAIN
BANK
A/C : 100211918
RTG : 103100739
D/L: P080026812
BENEFICIARY: JOHN M.T.LIE

This account was submitted by someone who claimed to be your local representative in
Nigeria, an American citizen. However, this committee has suspended the approval of
this account following the discovery of some irregularities in the submission
considering that all legitimate claims on the fund is documented in your name.

You are therefore advised to contact this office for an immediate clarification on
this issue giving us a go-ahead order to have your fund transferred to the above
account. Should you object to our remittance of your fund through this account, you
are equally advised to reconfirm your desired bank and your full account details
with its address, stating accurately the name of the beneficiary, your fund
deposit/contract amount. You are also requested to forward to us you&rsquo;re
forwarding contact address, a copy of your valid Id, direct telephone and fax
numbers for swift communication.

We anticipate your urgent response.

Yours faithfully,

Dr. ABDUL BELLO
(Director,Federal Fund Monitoring Committee)

Cc: Central Bank of Nigeria
Cc: The President Federal Republic of Nigeria

Questions about scams? fraudatiocruor @ gmail.com to contact remove spaces
Advertisement

Who is online

Users browsing this forum: Link and 140 guests