Monday, April 14, 2014

2014-04-14 Phishing Scam Alert - Verizon Wireless

Here's another phishing scam.  Notice in the from field Verizon Wireless is spelled with a capital I in Wireless.  Be careful if you receive this one the entire image is a malicious link.  I clicked it by accident luckily McAfee Site Advisor prevented the page from loading.

===== Begin Phishing Email (Images not displayed =====




===== Begin Phishing Email (Images displayed) =====



===== Begin Phishing Scam Header Info =====

Return-path: <tdvvjo@myacc.net>
Received: from svm302.centos-server.net ([unknown] [173.230.255.141])
 by vms172087.mailsrvcs.net
 (Sun Java(tm) System Messaging Server 7u2-7.02 32bit (built Apr 16 2009))
 with ESMTP id <
0N4000GETNVWOM00@vms172087.mailsrvcs.net> for
 <recipient_address_omitted>
; Mon, 14 Apr 2014 05:31:56 -0500 (CDT)
Received: from orp195.static.otenet.gr ([62.103.76.145]:14031 helo=myacc.net)
 by svm302.centos-server.net with esmtpa (Exim 4.82)
 (envelope-from <
tdvvjo@myacc.net>)
 id 1WZdxy-0006Vo-Rt for <recipient_address_omitted>
; Mon,
 14 Apr 2014 14:18:19 +0400
Date: Mon, 14 Apr 2014 13:18:57 +0300
From: Verizon WIreless <
zzselne@myacc.net>
Subject: <recipient_address_omitted>
your payment is pending
X-Originating-IP: [173.230.255.141]
To: <recipient_address_omitted>
Message-id: <
20140414131857.A4D8B604702831D8@myacc.net>
MIME-version: 1.0
Content-type: text/html; CHARSET=US-ASCII
Content-transfer-encoding: 7BIT
X-AntiAbuse: This header was added to track abuse,
 please include it with any abuse report
X-AntiAbuse: Primary Hostname - svm302.centos-server.net
X-AntiAbuse: Original Domain - verizon.net
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - myacc.net
X-Get-Message-Sender-Via: svm302.centos-server.net: authenticated_id:
 
sales@provensoft.com
X-Source:
X-Source-Args:
X-Source-Dir:
Original-recipient: rfc822;<recipient_address_omitted>

No comments:

Post a Comment