« previous next »
Pages: [1]
Author Topic: Cruzio phishing scam  (Read 3209 times)
« on: December 29, 2009, 10:31:56 am »

Just got this in my Cruzio inbox. A fairly convincing attempt to get my password. Don't know how many others got it but I'll bet some will fall for it.

   From:      techteamservices@mail2webmaster.com
   Subject:    Secured DGTFX anti-virus
   Date:    December 29, 2009 10:14:34 AM PST
   To:      undisclosed-recipients:;
   Reply-To:      techteamservices@mail2webmaster.com
   Received:    from mx2.cruzio.com (mx2.cruzio.com [63.249.93.176]) by amail.cruzio.com with ESMTP id nBTIF1ha094172; Tue, 29 Dec 2009 10:15:01 -0800 (PST)
   Received:    from mail9.tpgi.com.au (mail9.tpgi.com.au [203.12.160.104]) by mx2.cruzio.com with ESMTP id nBTIEZjh033873; Tue, 29 Dec 2009 10:14:37 -0800 (PST)
   Received:    from localhost (tigan1.tpgi.com.au [203.12.160.188]) by mail9.tpgi.com.au (envelope-from techteamservices@mail2webmaster.com) (8.14.3/8.14.3) with ESMTP id nBTIEYTP018993; Wed, 30 Dec 2009 05:14:34 +1100
   Received:    from 81.91.237.103 (81.91.237.103 [81.91.237.103]) (authenticated bits=0) by postoffice.tpg.com.au (envelope from Cruzio Internet Communications <techteamservices@mail2webmaster.com>) with HTTP; Wed, 30 Dec 2009 05:14:34 +1100
   X-Tpg-Junk-Status:    Message not scanned
   X-Tpg-Antivirus:    Passed
   X-Tpg-Abuse:    host=81.91.237.103; ip=81.91.237.103; date=Wed, 30 Dec 2009 05:14:34 +1100; auth=tzqLjVFVWuOANHK0pXifb+Mn2IqPMkVH6xdQJmkWhFg=
   Message-Id:    <1262110474.4b3a470a0e1f7@postoffice.tpg.com.au>
   Mime-Version:    1.0
   Content-Type:    text/plain; charset=ISO-8859-1
   Content-Transfer-Encoding:    8bit
   User-Agent:    Internet Messaging Program (IMP) 3.1
   X-Isp:    TPG Internet Australia http://www.tpg.com.au/
   X-Spam-Flag:    YES
   X-Spam-Level:    *
   X-Spam-Status:    Yes, score=1.599 tests=RCVD_IN_DNSWL_LOW,RCVD_NUMERIC_HELO
   X-Spam-Report:    -1.0 RCVD_IN_DNSWL_LOW      RBL: Sender listed at http://www.dnswl.org/, low                            trust                            [203.12.160.104 listed in list.dnswl.org] 2.6 RCVD_NUMERIC_HELO      Received: contains an IP address used for HELO
   X-Scanned-By:    MIMEDefang 2.67 on 63.249.93.176
   X-Cruzio-Spamtrap:    2.5 (2009/02/25)
   X-Cruziospamtrap:    SpamAssassin Tagged 1.599 vs 5
   X-Cruziospamtrapclass:    OK

Attention:

A DGTFX virus has been detected in your folders.Your email account has to be upgraded to our new
secured DGTFX anti-virus version to prevent damages to our webmail log and your important
files.Click your reply tab, Fill the columns below and send back or your email account will be terminated
immediately to avoid spread of the virus.

USERNAME:
PASSWORD:
PHONE NUMBER:
DATE OF BIRTH:


Note that your password will be encrypted with 1024-bit RSA keys for your password safety to
avoid any unauthorized user.

Sign:
Cruzio Internet Communication
Technical Team Services

Logged
Pages: [1]
« previous next »
Jump to:  


Copyright SMF 2006-2007, Simple Machines LLC