Tuesday, November 21, 2017

Your Urgent Attention Is Needed!

Attention. Beneficiary,

We thank you for your co-operation on the successful transfer of first batch of your part payment of One Million five Hundred Thousand US Dollar ($1,500,000.00) transferred into your bank account as stated below which your NEXT OF KIN have acknowledged receipt of the fund.

NAME OF BANK: CAPITAL ONE BANK
BANK ADDRESS: N.Y. 11373, USA.
ACCOUNT NO: 580294045
ACCOUNT NAME: MARIA T. EL-ZEIN
ROUTING CODE: 021407912
SWIFT CODE: NFBKWS22

However, we write to inform you that the remaining balance of your fund has been approved for payment again and would be transferred to the same bank account as stated above which you provided in the course of the former payment received. Kindly notify us of a change in your banking information if there is any mistake before we proceed with the transfer. Please note that the transfer shall be the same way we made the first payment to you thus; telegraphic transfer and shall be confirm within three (3) banking days from the date of the transfer. Give this matter urgent attention it demands so that you can receive your payment within the time frame of the approval. You are advised to deal directly to this department is my contact email address where you can reach us(centralbnk@accountant.com).

KINDLY NOTIFY US OF ANY MISTAKE OR CHANGES IN YOUR RECEIVING BANK ACCOUNT INFORMATION IF THEY IS ANY.
Yours Faithfully,
Sir.Chucks Adagu
Secretary of Central Bank Benin

Email analysis :

NOTE : centralbnk@accountant.com
NOTE : officefile11102@gmail.com
NOTE : client-ip=209.85.220.41;

Deposit Notification

Deposit Notification
This is to notify you of a deposit in your favor with Arab Bank, with details below:
Transaction Type: DEPOSIT
Transaction Amount: 15,500,000.00
Transaction Currency USD
Account Number 3XX..06X
Transaction Narration WEB Dr @ 29866007-NEXT OF KIN*DEPOSIT 18006994264 800-699
Transaction Remarks 413618896864 / 000000000730
Date and Time 17-November-2017. 05:22:26
Deposit charges: 2,345.97
Cleared Balance 15,497,654.03
Uncleared 0.00

For any other inquiries and log in details to your account, please contact our Customer Fulfillment Center (CFC) at arabbnking.customerservice@yandex.com Legal This email message is confidential and for use by the addressee only. If the message is received by anyone other than the addressee, please delete it from your computer. Arab Bank does not accept responsibility for changes made to this message after it was sent. Whilst all reasonable care has been taken to avoid the transmission of viruses, it is the responsibility of the recipient to ensure that onward transmission, opening or use of this message and any attachments will not adversely affect its systems or data. No responsibility is accepted by Arab Bank in this regard and the recipient should carry out such virus and other checks as it considers appropriate.

Email analysis :

NOTE : yanagisawa@vc-s.jp
NOTE : arabbnking.customerservice@yandex.com
NOTE : Received : from c15brzfw.mwprem.net (c15brzfw.mwprem.net. [60.43.159.237])

Friday, November 17, 2017

System Upgrade (Standard Bank Phishing)

Dear Valued Customer,

ACCOUNT E-MAILS ALERT

WeĆ¢€™re sorry to inform you that we are unable to verify your account identity. In order to protect the security of your account.

We have terminated your ATM account banking session.

In order to resolve this situation,

We implore you to click on the SECURE link below to CONFIRM any possible findings.

http://bebesysalud.com/wp-includes/pomo/numsurver.php

Thank you for choosing Standard Bank.

Standrad Bank Team.

Email analysis :

NOTE : kurt.kemper@dfafrica.co.za
NOTE : info@Standarddbank.co.za
NOTE : Received : from null (za-sl-23.za.mimecast.lan [10.32.36.72]) (Using TLS)
NOTE : by za-smtp-1.mimecast.co.za

Phishing screenshot :


Phishing analysis :

CLICK : http://bebesysalud.com/wp-includes/pomo/numsurver.php
SCREENSHOT :


NOTE : Standard Bank Phishing

Account status has been changed (invoice 02574) (PayPal Phishing)

Dear PayPal Customer ,

We detected something unusual about a recent sign-in for the PayPal account . For example, you might be signing in from a new location, device, or app.

To help keep you safe, we've blocked access to your PayPal account , Billing Info, and calendar for that sign-in. Please review your recent activity and we'll help you take corrective action. To regain access, you'll need to confirm that the recent activity was yours.

Review recent activity

Thanks,
The PayPal account team

Copyright© 1996-2017 PayPal.com, Inc. All right reserved

Email analysis :

NOTE : support@vweb12.nitrado.net
NOTE : Received : by vweb12.nitrado.net

Phishing screenshot :


Phishing analysis :

CLICK : Review recent activity
OPEN : www.update-service.clanonzj.beget.tech/
REDIRECT : http://www.update-service.clanonzj.beget.tech/*/login.php?cmd=_account-details&session=*
SCREENSHOT :


NOTE : FILL FAKE INFO
REDIRECT : http://www.update-service.clanonzj.beget.tech/*/Billing.php?cmd=_account-details&session=*&dispatch=*
SCREENSHOT :


NOTE : PayPal Phishing

Verify Your PayPal Account! (PayPal Phishing Attempt)

Dear PayPal user,

This is an automatic message by the system to let you know that you have to confirm your account information within 48 hours. Your account has been frozen temporarily in order to protect it.

To proceed to confirm your account information please click on the link below and follow the instructions that will be required.This will help protect you in the future. The process does not take more than 3 minutes.

Confirm your account

Click here to verify

Once you have updated your account records, your information will be confirmed and your account will start to work as normal once again.

Sincerely,
PayPal Account Review Department
(Case ID #PP-003-498-237-832)

Email analysis :

NOTE : sal.moncalieri@engim.it
NOTE : Received : from zimbra.engim.it (zimbra.engim.it [192.168.67.112])

NOTE : 192.168.67.112

Phishing screenshot :


Phishing analysis :

CLICK : Click here to verify
OPEN : http://rederswhitesincs.com/secure_pp
RESULT : PayPal Phishing attempt

Thursday, November 16, 2017

Promocao Netflix 2 Meses Gratuitos (78091) (Netflix Phishing)

Prezado Cliente: Email Cadastrado - Caso nao esteja visualizando a imagem .
Exibir Imagens

Email analysis :

NOTE : ip-160-153-231-135.ip.secureserver.net
NOTE : www-data@ip-160-153-231-135.ip.secureserver.net
NOTE : Received : from ip-160-153-231-135.ip.secureserver.net
NOTE : (ip-160-153-231-135.ip.secureserver.net [160.153.231.135])

Phishing analysis :

CLICK : Exibir Imagens
OPEN : https://graficagibin.com.br/VELHO/beta/images/content/02/?
REDIRECT : https://graficagibin.com.br/loja/downloader/lib/Mage/Autoload/netflix/index.php
SCREENSHOT :


VALIDATE FORM WITH WRONG EMAIL
REDIRECT : https://graficagibin.com.br/loja/downloader/lib/Mage/Autoload/netflix/payment.php?form=*.scr
SCREENSHOT :


CLICK : VISA
SCREENSHOT :


FILL : FAKE DATA
REDIRECT : https://graficagibin.com.br/loja/downloader/lib/Mage/Autoload/netflix/terminor.php?form=*.scr
SCREENSHOT :


REDIRECT : https://www.netflix.com/getstarted?locale=pt-BR&action=startAction

Warning Your test@test.com Shut Down !!! (Gmail phishing)

Server Message

Dear test@test.com

Our record indicates that you have recently made a request to deactivate email. This request will be processed shortly. If this request was made accidentally and you have no knowledge of it, you are advised to cancel the request now

Cancel De-activation

However, if you do not cancel this request, your account will be de-activated shortly and all your email data will be permanently lost.

Regards.

Email Administrator

Message is auto This-generated from security server, and replies sent to this email can not be delivered. This email is meant for:

Email analysis :

NOTE : support@mailserver.com
NOTE : Received : from mailserver.com ([148.163.101.104])


Phishing analysis :

CLICK : Cancel De-activation
OPEN : http://www.ksawed.org/webmail.php?email=test@test.com
SCREENSHOT :


VALIDATE : FORM
REDIRECT : https://support.google.com/accounts/answer/141137?hl=&visit_id=0-636464428251608265-4216504168&rd=1
SCREENSHOT :


INFO : Gmail phishing...

HELLO GOOD DAY (Rosneft Scam)

Hello and good day.

I am looking to work with a reputable individual/firm to engage in a profit oriented ventures in your country and perhaps with your assistance, we could get low tax rates.

I have the directive of Mr. Mikhail Khodorkovsky to source for partner abroad who can accommodate and manage 150M & 350M USD respectively. The sums are derived from an executed project with Yukos Oil Company before the company was change merged into Rosneft Oil Corporation in Russia.

We shall apply for the necessary paper work required to re-profile your name as the receipient and also ensure payment is carried out by Rosneft into a bank account in your name. I guaranty we would execute this business under a legitimate arrangement without breach of the law.

Further details will follow upon your positive reply.

Regards,

ALEXANDER KORIKOV

Email analysis :

NOTE : info@s41.coreserver.jp
NOTE : alexanderkorikov2747@gmail.com
NOTE : Received : from 204.44.78.199.static.greencloudvps.com
NOTE : (HELO User) (204.44.78.199)


NOTE : by s41.coreserver.jp
NOTE : client-ip=202.172.28.42;

Wednesday, November 8, 2017

OVH (Phishing)

Phishing analysis :

OPEN : http://pasalo-bien.de/html/cliente/ES/?https://paiment.ovh.net/espaceclient
SCREENSHOT :


REDIRECT : http://pasalo-bien.de/html/cliente/ES/sn.php
REDIRECT : http://pasalo-bien.de/html/cliente/ES/index1.html
SCREENSHOT :


REDIRECT : http://pasalo-bien.de/html/cliente/ES/sn1.php
REDIRECT : http://pasalo-bien.de/html/cliente/ES/index11.html
REDIRECT : http://pasalo-bien.de/html/cliente/ES/sn11.php
REDIRECT : http://pasalo-bien.de/html/cliente/ES/index2.html
SCREENSHOT :


CLICK : TERMINAR
REDIRECT : https://www.ovh.com/