Here's another phishing scam. Notice in the from field Verizon Wireless is spelled with a capital I in Wireless. Be careful if you receive this one the entire image is a malicious link. I clicked it by accident luckily McAfee Site Advisor prevented the page from loading.
===== Begin Phishing Email (Images not displayed =====
===== Begin Phishing Email (Images displayed) =====
===== Begin Phishing Scam Header Info =====
Return-path: <tdvvjo@myacc.net>
Received: from svm302.centos-server.net ([unknown] [173.230.255.141])
by vms172087.mailsrvcs.net
(Sun Java(tm) System Messaging Server 7u2-7.02 32bit (built Apr 16 2009))
with ESMTP id <0N4000GETNVWOM00@vms172087.mailsrvcs.net> for
<recipient_address_omitted>; Mon, 14 Apr 2014 05:31:56 -0500 (CDT)
Received: from orp195.static.otenet.gr ([62.103.76.145]:14031 helo=myacc.net)
by svm302.centos-server.net with esmtpa (Exim 4.82)
(envelope-from <tdvvjo@myacc.net>)
id 1WZdxy-0006Vo-Rt for <recipient_address_omitted>; Mon,
14 Apr 2014 14:18:19 +0400
Date: Mon, 14 Apr 2014 13:18:57 +0300
From: Verizon WIreless <zzselne@myacc.net>
Subject: <recipient_address_omitted> your payment is pending
X-Originating-IP: [173.230.255.141]
To: <recipient_address_omitted>
Message-id: <20140414131857.A4D8B604702831D8@myacc.net>
MIME-version: 1.0
Content-type: text/html; CHARSET=US-ASCII
Content-transfer-encoding: 7BIT
X-AntiAbuse: This header was added to track abuse,
please include it with any abuse report
X-AntiAbuse: Primary Hostname - svm302.centos-server.net
X-AntiAbuse: Original Domain - verizon.net
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - myacc.net
X-Get-Message-Sender-Via: svm302.centos-server.net: authenticated_id:
sales@provensoft.com
X-Source:
X-Source-Args:
X-Source-Dir:
Original-recipient: rfc822;<recipient_address_omitted>
No comments:
Post a Comment