Belvoir Federal Credit Union Phish

From - Tue Feb 19 17:36:37 2008

X-Account-Key: account2

X-UIDL: 4@]"!&A)!!>h&"!@'>!!

X-Mozilla-Status: 0001

X-Mozilla-Status2: 00000000

X-Mozilla-Keys:

X-NetKnow-InComing-4.67.3-1-MailScanner-Watermark: 1203867756.63922@Z8Gni01f5Yas+LeZLy6f/Q

Received: from mail1.easytel.com

by doctor.nl2k.ab.ca (8.14.2/8.14.2) with ESMTP id m1JFg1AF025734

for ; Tue, 19 Feb 2008 08:42:15 -0700 (MST)

X-Spam-Filter: check_local@doctor.nl2k.ab.ca by digitalanswers.org

Received: from mail.rcctulsa.org [64.207.236.58] by mail1.easytel.com with ESMTP

(SMTPD-9.23) id A87B0A5C; Tue, 19 Feb 2008 09:40:43 -0600

Received: from User ([71.119.21.35]) by mail.rcctulsa.org with Microsoft SMTPSVC(6.0.3790.1830);

Tue, 19 Feb 2008 09:48:51 -0600

From: "Belvoir Federal Credit Union"

Subject: {Spam?} Consumer Alert: New Anti-theft System.

Date: Tue, 19 Feb 2008 07:39:26 -0800

MIME-Version: 1.0

Content-Type: text/plain;

charset="Windows-1251"

Content-Transfer-Encoding: 7bit

X-Priority: 3

X-MSMail-Priority: Normal

X-Mailer: Microsoft Outlook Express 6.00.2600.0000

X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000

Bcc:

Message-ID:

X-OriginalArrivalTime: 19 Feb 2008 15:48:51.0875 (UTC) FILETIME=[ECBF3730:01C8730E]

X-NetKnow-InComing-4.67.3-1-MailScanner-Information: Please contact the ISP for more information

X-MailScanner-ID: m1JFg1AF025734

X-NetKnow-InComing-4.67.3-1-MailScanner: Found to be clean

X-NetKnow-InComing-4.67.3-1-MailScanner-SpamCheck: spam,

SpamAssassin (not cached, score=5.88, required 1,

FORGED_MUA_OUTLOOK 4.20, MISSING_HEADERS 1.58, RDNS_NONE 0.10)

X-NetKnow-InComing-4.67.3-1-MailScanner-SpamScore: sssss

X-NetKnow-InComing-4.67.3-1-MailScanner-From: account@ftbfcu.org

X-Spam-Status: Yes

X-UIDL: 4@]"!&A)!!>h&"!@'>!!



--------------------------------------------------------------

Consumer Alert: Increase in Fraudulent e-mails

--------------------------------------------------------------







Belvoir Federal Credit Union has confirmed that a small number of people were recently phished. "Phishing" is when a criminal replicates a legitimate web site to deceive individuals into providing personal financial, or other confidential information.



An unknown number of people recently received an email that appeared to be sent from Belvoir Federal Credit Union. We currently working to shut down the phishing site, and determining the extent to which our clients may have been affected.



Due to this attempts we have had to temporary suspend any future authorizations being conducted with your Credit Card. Please call us immediately at 1-970-368-4552

We will review the activity on your account with you and upon verification, we will remove any restrictions placed on your account. Please disregard this notice if you already re-activate your card.



Belvoir Federal Credit Union cares about you and we want to ensure the highest level of protection

for you.



Sincerely,

Belvoir Federal Credit Union Fraud Department

You can contact us by phone, U.S. mail, or email. We look forward to hearing from you.



By phone:

1-970-368-4552

Or contact Customer Care at 1-970-368-4552



By U.S. mail:

Belvoir Federal Credit Union

14040 Central Loop

Woodbridge, VA 22193









If you do not have an account with us, please ignore this message as

it has reached your email address by mistake. We are sorry for any

inconvenience this may caused.





--

This message has been scanned for viruses and

dangerous content by MailScanner, and is

believed to be clean.







Trackbacks

Trackback specific URI for this entry

This link is not meant to be clicked. It contains the trackback URI for this entry. You can use this URI to send ping- & trackbacks from your own blog to this entry. To copy the link, right click and select "Copy Shortcut" in Internet Explorer or "Copy Link Location" in Mozilla.

No Trackbacks

Comments

Display comments as Linear | Threaded

No comments

Add Comment

Enclosing asterisks marks text as bold (*word*), underscore are made via _word_.
Standard emoticons like :-) and ;-) are converted to images.

To prevent automated Bots from commentspamming, please enter the string you see in the image below in the appropriate input box. Your comment will only be submitted if the strings match. Please ensure that your browser supports and accepts cookies, or your comment cannot be verified correctly.
CAPTCHA

Enclosing asterisks marks text as bold (*word*), underscore are made via _word_.
Standard emoticons like :-) and ;-) are converted to images.

To prevent automated Bots from commentspamming, please enter the string you see in the image below in the appropriate input box. Your comment will only be submitted if the strings match. Please ensure that your browser supports and accepts cookies, or your comment cannot be verified correctly.
CAPTCHA