Internet Phish

From - Mon Jul 02 06:46:15 2012

X-Account-Key: account2

X-UIDL: JN0!!34M"!H9o"!+*R"!

X-Mozilla-Status: 0001

X-Mozilla-Status2: 00000000

X-Mozilla-Keys:

X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on doctor.nl2k.ab.ca

X-Spam-Level:

X-Spam-Status: No, score=0.0 required=5.0 tests=none autolearn=ham

version=3.3.2

Received: from localhost by doctor.nl2k.ab.ca

with SpamAssassin (version 3.3.2);

Mon, 02 Jul 2012 06:45:21 -0600

From: "notify@payments.interac.ca"

Subject: *****SPAM**** ***SPAM** INTERAC e-Transfer from Andrew

Date: Mon, 2 Jul 2012 18:13:24 +0530

MIME-Version: 1.0

Content-Type: multipart/mixed; boundary="----------=_4FF197E1.6067CDF5"

X-UIDL: JN0!!34M"!H9o"!+*R"!

X-Brightmail-Tracker: AAAAAxsRNoQbETZ7GxIbIQ==

X-Brightmail-Tracker: AAAAAA==



This is a multi-part message in MIME format.



------------=_4FF197E1.6067CDF5

Content-Type: text/plain; charset=iso-8859-1

Content-Disposition: inline

Content-Transfer-Encoding: 8bit



Spam detection software, running on the system "doctor.nl2k.ab.ca", has

identified this incoming email as possible spam. The original message

has been attached to this so you can view it (if it isn't spam) or label

similar future email. If you have any questions, see

the administrator of that system for details.



Content preview: sultan omar Dear customer, Andrew has sent you an INTERAC

e-Transfer [...]



Content analysis details: (7.1 points, 5.0 required)



pts rule name description

---- ---------------------- --------------------------------------------------

1.0 RCVD_IN_BACKSCATTER RBL: Received via a relay in Backscatter.org

[178.162.145.115 listed in ips.backscatterer.org]

2.0 RCVD_IN_UCE_PFSM_3 RBL: Received via a relay in UCE_PFSM_3

[122.165.254.226 listed in dnsbl-3.uceprotect.net]

1.0 BOTNET Relay might be a spambot or virusbot

[botnet0.8,ip=178.162.145.115,rdns=hosted-by.leaseweb.com,baddns]

-0.0 SPF_HELO_PASS SPF: HELO matches SPF record

0.0 RELAY_CHECKER_BADDNS Doesn't have full circle DNS

3.1 FORGED_MUA_OUTLOOK Forged mail pretending to be from MS Outlook



The original message was not completely plain text, and may be unsafe to

open with some email clients; in particular, it may contain a virus,

or confirm that your address can receive spam. If you wish to view

it, it may be safer to save it to a file and open it with an editor.





------------=_4FF197E1.6067CDF5

Content-Type: message/rfc822; x-spam-type=original

Content-Description: original message before SpamAssassin

Content-Disposition: attachment

Content-Transfer-Encoding: 8bit



Return-Path:

X-Original-To: aboo@doctor.nl2k.ab.ca

Delivered-To: aboo@doctor.nl2k.ab.ca

Received: from localhost (localhost.nl2k.ab.ca [127.0.0.1])

by doctor.nl2k.ab.ca (Postfix) with ESMTP id F3EB512CFA89

for ; Mon, 2 Jul 2012 06:45:19 -0600 (MDT)

X-Virus-Scanned: amavisd-new at doctor.nl2k.ab.ca

X-Spam-Flag: YES

X-Spam-Score: 22.782

X-Spam-Level: **********************

X-Spam-Status: Yes, score=22.782 tagged_above=2 required=6.2 tests=[BOTNET=1,

FORGED_MUA_OUTLOOK=4.199, FORGED_OUTLOOK_HTML=0.001,

FROM_MISSPACED=3.6, FROM_MISSP_DKIM=0.87, FROM_MISSP_MSFT=0.016,

FROM_MISSP_NO_TO=2.071, FROM_MISSP_URI=0.001, FROM_MISSP_USER=1.34,

FSL_CTYPE_WIN1251=1.999, FSL_NEW_HELO_USER=0.989, FSL_UA=0.328,

FSL_XM_419=0.001, HTML_MESSAGE=0.001, MIME_HTML_ONLY=1.672,

MISSING_HEADERS=1.581, MISSING_MID=0.001, NSL_RCVD_FROM_USER=0.001,

RCVD_IN_BACKSCATTER=1, RCVD_IN_UCE_PFSM_3=2, RDNS_NONE=0.1,

RELAY_CHECKER_BADDNS=0.01, SPF_HELO_PASS=-0.001,

TO_NO_BRKTS_FROM_MSSP=0.001, TO_NO_BRKTS_NORDNS_HTML=0.001]

autolearn=unavailable

Received: from doctor.nl2k.ab.ca ([127.0.0.1])

by localhost (doctor.nl2k.ab.ca [127.0.0.1]) (amavisd-new, port 10024)

with ESMTP id FKMD5vBhl9K6 for ;

Mon, 2 Jul 2012 06:45:15 -0600 (MDT)

Received: from portalsaz.com (unknown [178.162.145.115])

by doctor.nl2k.ab.ca (Postfix) with ESMTP id A928F12CFA82

for ; Mon, 2 Jul 2012 06:45:13 -0600 (MDT)

Received: from User ([122.165.254.226]) by portalsaz.com with MailEnable ESMTP; Mon, 2 Jul 2012 05:43:39 -0700

From: "notify@payments.interac.ca"

Subject: ***SPAM*** INTERAC e-Transfer from Andrew

Date: Mon, 2 Jul 2012 18:13:24 +0530

MIME-Version: 1.0

Content-Type: text/html;

charset="Windows-1251"

Content-Transfer-Encoding: 7bit

X-Priority: 3

X-MSMail-Priority: Normal

X-Mailer: Microsoft Outlook Express 6.00.2600.0000

X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000

X-ME-Bayesian: 0.000000













sultan omar











Dear customer,





Andrew has sent you an INTERAC e-Transfer



(previously INTERAC Email Money Transfer).



Amount: $50.00 (CAD)



Sender's Message: A message was not provided



Expiry Date: 29 June 2012



Action Required:

To deposit your money, click here:

https://etransfer.interac.ca/CAV4YvVq



Trouble with the link? Type it into your web browser address bar.



Need help?

http://www.interac.ca/consumers/faqs.php#emt

-------------------------------------------------------------------------------

What is an INTERAC e-Transfer? (previously INTERAC Email Money Transfer). If you use


online or mobile banking at a participating financial institution, you can send and 


receive money quickly and easily.



Email or text messages carry the notice while the financial institutions securely transfer


the money using existing payment networks.  If your financial institution does not yet 


offer INTERAC e-Transfer, you can still deposit transfers to any bank account in Canada.


 Click http://www.interac.ca/consumers/faqs.php#emt for details.

-------------------------------------------------------------------------------

Pour voir les dtails du virement en franais,

cliquez sur le lien ci-dessous :

https://etransfer.interac.ca/fr/CAV4YvVq














------------=_4FF197E1.6067CDF5--







Trackbacks

Trackback specific URI for this entry

This link is not meant to be clicked. It contains the trackback URI for this entry. You can use this URI to send ping- & trackbacks from your own blog to this entry. To copy the link, right click and select "Copy Shortcut" in Internet Explorer or "Copy Link Location" in Mozilla.

No Trackbacks

Comments

Display comments as Linear | Threaded

No comments

Add Comment

Enclosing asterisks marks text as bold (*word*), underscore are made via _word_.
Standard emoticons like :-) and ;-) are converted to images.

To prevent automated Bots from commentspamming, please enter the string you see in the image below in the appropriate input box. Your comment will only be submitted if the strings match. Please ensure that your browser supports and accepts cookies, or your comment cannot be verified correctly.
CAPTCHA

Enclosing asterisks marks text as bold (*word*), underscore are made via _word_.
Standard emoticons like :-) and ;-) are converted to images.

To prevent automated Bots from commentspamming, please enter the string you see in the image below in the appropriate input box. Your comment will only be submitted if the strings match. Please ensure that your browser supports and accepts cookies, or your comment cannot be verified correctly.
CAPTCHA