Tuesday, October 18, 2016

Nobel Prize 680,500 Euros

On This Morning's Ticket 18th Of October 2016, I Mr. Joseph P. Cornacchia Of Of The Allied Irish Group Bank Plc hereby writes to notify you that your total sum of 680,500 Euros is available for a compulsory transfer today via Bank to Bank deposit.

Your E-mail address was selected for 680,500 Euros (Six Hundred And Eighty Thousand Five Hundred Euros Only ) payout in the just concluded 2016 Nobel Prize Announcements from Economic Surveys.

This fund was deposited as donation by The Nobel Prize Committee and will be disbursed upon establishing credit alert via Bank to Bank deposit by disbursed for claim with:

i. Your Complete Names;
ii. Mailing Address:
iii. Mobile Telephone:
iv. Bank Name:

upon completion of the application process, Your funds shall be transferred.

Yours Faithfully,
Mr. Joseph P. Cornacchia
Private Consulting & Funds Transfers

Email analysis :

NOTE : josephcornacchia_aib@outlook.com
NOTE : barclsbonline@gmail.com

Friday, October 14, 2016

[SPAM] Confirm your deposit (Required)

Hello,

In order to activate the Cash Formula you need to confirm your deposit!

>> Confirm Your Deposit Here

Once confirmed you can access your dashboard where you can view your funding balance. The Cash Formula will start to earn you profits upon activattion.

Thank you,

William D. Campbell
638 Cambridge Court
Little Rock, AR 72211

Scam analysis :

CLICK : >> Confirm Your Deposit Here
OPEN : http://safestpayment.net/?hop=test@test.com
SCREENSHOT :


REDIRECT : http://freedomcircle.co/?ot=*&token=*&clickid=*&aff=*&ct=*
SCREENSHOT :


Email analysis :NOTE :

NOTE : client-ip=45.40.124.96; helo=legitcheckout.net;


NOTE : [SPAM] Confirm your deposit (Required)

FBI Disclaimer paper

OFFICIAL LETTER FROM FBI NEW YORK, Your fund was received at U.S Custom Authority at (JFK) John F. Kennedy Int'l Airport NYC and necessary fees/charges has been paid by sender except $150 for Customs Clearance Certificate CCC, but a lady Janet Fred., came forward claimed you sent her to claim your $8Million, is it true? did you order her to pay $150 for CCC? Also be informed that we came to an agreement with the U.S Custom Authority at (JFK) John F. Kennedy Int'l Airport NYC that you will send fee latest tomorrow, unless you want your fund to be hand over to her, while you will expect FBI Disclaimer paper to sign or else you will be arrested for assigning her without informing us. Just click on reply, to reply back to FBI-Director-James B Comey Jr to his private email uspdf587@yeah.net immediately. Yours sincerely, FBI email Dept.Reply To E-mail: uspdf587@yeah.net Phone 202 852 0499 uspdf587@yeah.net

Email analysis :NOTE :

NOTE : uspdf587@yeah.net
NOTE : Return-Path : < ikgomnkhkhkhk@yahoo.co.jp >
NOTE : Mime-Version : 1.0
NOTE : X-Yahoo-Newman-Property : ymail-5
NOTE : Authentication-Results : 182.22.91.88 as permitted sender


NOTE : smtp.mailfrom=ikgomnkhkhkhk@yahoo.co.jp
NOTE : X-Mailer : YahooMailWebService/0.8.111_69
NOTE : Received : from [41.79.219.219]

Your Netflix Membership has been suspended [#348963] (Phishing)

Validation failed

During a routine check of your account we have failed to validate the billing method we have on record for your account. To continue using the Netflix service you will need to update/verify your billing information.

CONTINUE >>

Please note that failure to complete the validation process will result in permanent suspension of your netflix membership.

We thank you for your understanding.

Netflix Billing Support

TWEET LIKE FORWARD

Preferences | Unsubscribe

Phishing analysis :

CLICK : CONTINUE >>
OPEN : http://newdata01.com/
RESULT : Phishing was removed

Email analysis :

NOTE : Return-Path:
NOTE : Received: from [146.20.110.156] (port=57419 helo=User)


NOTE : From: " Netflix"< no-reply@netflix.ssl.com>
NOTE : Subject: Your Netflix Membership has been suspended [#348963]
NOTE : MIME-Version: 1.0
NOTE : Content-Type: text/html;charset="Windows-1251"
NOTE : Content-Transfer-Encoding: 7bit
NOTE : X-AntiAbuse: Sender Address Domain - netflix.ssl.com
NOTE : X-Get-Message-Sender-Via: server-33:
NOTE : authenticated_id: pro/only user confirmed/virtual account not confirmed
NOTE : X-Authenticated-Sender: server-33: pro
NOTE : X-Remote: 162.242.219.144 ()

Une nouvelle conseille.

Bonjour ,

Vous avez reçu une nouvelle conseille sur votre espace client en ligne.

Pour le consulter, merci de vous connecter à votre espace client credit lyonnais,

En cliquant içi

A très bientôt sur le service lcl de gestion des comptes.

L'équipe Banque en Ligne.

Phishing analysis :

CLICK : En cliquant içi
OPEN : http://lidingösegelsällskap.se/wp-content/lcl/
RESULT : Phishing was removed.

Email analysis :


NOTE : Importance : high
NOTE : Return-Path : mabanqueprivee@bell.net
NOTE : Cmm-X-Sid-Pra : mabanqueprivee@bell.net
NOTE : Cmm-Sender-Ip : 184.150.200.80


NOTE : Une nouvelle conseille.

Thursday, October 13, 2016

Aviso !!! (Phishing Attempt)

Aviso !!!

Nos dimos cuenta de que su cuenta de correo electrónico se ha casi exceder su límite. Y usted no puede enviar o recibir mensajes en cualquier momento a partir de ahora.

Haga clic en el enlace para iniciar la sesión y renovar su cuenta: http://ow.ly/JT19304XkK2

AVISO:

El no hacer login y renovar su cuenta de correo electrónico que será una incapacidad permanente.

Gracias,
cuenta de servicio

Phishing analysis :

CLICK : http://ow.ly/JT19304XkK2
SCREENSHOT :


NOTE : Phishing attempt...

Email analysis :

NOTE : Content-Type : text/plain; charset="iso-8859-1"
NOTE : Mime-Version : 1.0
NOTE : Return-Path : < cgajardo@sence.cl >
NOTE : Return-Path : cgajardo@sence.cl
NOTE : account : cgajardo


NOTE : X-Originating-Ip : [120.146.244.171]


NOTE : Content-Transfer-Encoding : quoted-printable
NOTE : Received : from cipres.sence.local (osopanda.sence.cl. [163.247.55.173])


NOTE : Received : from ARAUCARIA.sence.local (192.9.200.57)
NOTE : by cipres.sence.local (192.9.200.55)
NOTE : Received-Spf : client-ip=163.247.55.173;
NOTE : Content-Description : Mail message body
NOTE : Aviso !!!
NOTE : sence.cl server with account cgajardo were used to relay this phishing...