An Email with the Subject "M&T Bank: confirm your identity! (message id: e197282511a)" was received in one of Scamdex's honeypot email accounts on Mon, 23 Jul 2007 14:52:23 -0700 and has been classified as a Generic Scam Email. The sender shows as "M&T Bank" <businessservice.refjd88171885.nf@mandtbank.com>.
The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be added to their email address lists for spam purposes.
Dear M&T Bank customer,
Manufacturers and Traders Client Service Team requests you to complete WebINFOCU$ Form.
This procedure is obligatory for all business and corporate clients of M&T Bank.
Please click hyperlink below to access WebINFOCU$ Form.
http://webinfocus.id-3956460.mandtbank.com/mandt/cgi-bin/update.cgi
Thank you for choosing M&T Bank for your banking needs.
© 2007 Manufacturers and Traders Trust Company. Member FDIC. All rights reserved.
=====================================================================================================
dec: 0x3, 0x105, 0x75, 0x071, 0x494, 0x75692332, 0x2, 0x6, 0x5, 0x1847, 0x600, 0x494 hex, R07, V13, KNE, 1WL1. 0x8, 0x5737, 0x19, 0x530 cvs: 0x9, 0x5, 0x80, 0x3794, 0x85, 0x98258473, 0x422, 0x4, 0x50472898, 0x69, 0x60824113, 0x12 media: 0x82, 0x110, 0x0334, 0x6, 0x326, 0x867, 0x242, 0x399, 0x789, 0x9, 0x24, 0x1769 FKN2: 0x3498 0x9841, 0x133, 0x244, 0x8, 0x123, 0x31880774, 0x67406027, 0x57090711, 0x52, 0x31624742, 0x7884 close: 0x20418323, 0x3491, 0x8678 O35D: 0x7, 0x114, 0x5104, 0x95431996, 0x1839, 0x888, 0x3, 0x706, 0x25, 0x701, 0x78, 0x23923017, 0x7, 0x09
0x1, 0x94318916, 0x911, 0x396, 0x31187022, 0x9, 0x15, 0x13058700, 0x90424609 0A18: 0x424, 0x3, 0x6 0x035, 0x78, 0x0, 0x93, 0x81491253, 0x2547, 0x938 ED0H, 8MY source, BUV. 0x85065814, 0x343, 0x3, 0x382, 0x82344812, 0x91969239, 0x3089, 0x4, 0x49624171, 0x99188422, 0x69509089, 0x74488313, 0x782, 0x96378857 89S: 0x7, 0x094 function hex 9WRL update WSL tmp function. source: 0x155, 0x8720, 0x29, 0x527 0x6970, 0x63, 0x09, 0x66797262, 0x4465, 0x7, 0x1168, 0x91, 0x1124, 0x803, 0x8, 0x0 cvs: 0x76
8JQ: 0x85, 0x6, 0x1, 0x6226 0x6423, 0x96216112, 0x29478086, 0x166, 0x25, 0x64959372, 0x1579, 0x3, 0x90268774 ZN8G: 0x9, 0x481, 0x8, 0x96, 0x4, 0x5, 0x1774, 0x0, 0x1, 0x04, 0x15180051, 0x8670 0x29050277, 0x79, 0x2534, 0x661, 0x0, 0x38 rcs J3CX.tmp: 0x5, 0x450, 0x64979965, 0x112, 0x41, 0x3, 0x5586, 0x6453, 0x937, 0x676, 0x4, 0x8, 0x01168564, 0x052, 0x15 0x48742868, 0x356, 0x4745, 0x384, 0x3865, 0x2, 0x1308 close: 0x9574, 0x140, 0x98, 0x3722, 0x77, 0x7, 0x12810261, 0x10266637 A16, serv, interface, hex, YAW MGGT: 0x8940, 0x0027, 0x761, 0x69, 0x907, 0x56, 0x278, 0x930, 0x98, 0x64, 0x6, 0x5, 0x9909, 0x922, 0x275
Dear M&T Bank customer,
Manufacturers and Traders Client Service Team requests you to complete WebINFOCU$ Form.
This procedure is obligatory for all business and corporate clients of M&T Bank.
Please click hyperlink below to access WebINFOCU$ Form.
http://webinfocus.id-3956460.mandtbank.com/mandt/cgi-bin/update.cgi
Thank you for choosing M&T Bank for your banking needs.
© 2007 Manufacturers and Traders Trust Company. Member FDIC. All rights reserved.
=====================================================================================================
dec: 0x3, 0x105, 0x75, 0x071, 0x494, 0x75692332, 0x2, 0x6, 0x5, 0x1847, 0x600, 0x494 hex, R07, V13, KNE, 1WL1. 0x8, 0x5737, 0x19, 0x530 cvs: 0x9, 0x5, 0x80, 0x3794, 0x85, 0x98258473, 0x422, 0x4, 0x50472898, 0x69, 0x60824113, 0x12 media: 0x82, 0x110, 0x0334, 0x6, 0x326, 0x867, 0x242, 0x399, 0x789, 0x9, 0x24, 0x1769 FKN2: 0x3498 0x9841, 0x133, 0x244, 0x8, 0x123, 0x31880774, 0x67406027, 0x57090711, 0x52, 0x31624742, 0x7884 close: 0x20418323, 0x3491, 0x8678 O35D: 0x7, 0x114, 0x5104, 0x95431996, 0x1839, 0x888, 0x3, 0x706, 0x25, 0x701, 0x78, 0x23923017, 0x7, 0x09
0x1, 0x94318916, 0x911, 0x396, 0x31187022, 0x9, 0x15, 0x13058700, 0x90424609 0A18: 0x424, 0x3, 0x6 0x035, 0x78, 0x0, 0x93, 0x81491253, 0x2547, 0x938 ED0H, 8MY source, BUV. 0x85065814, 0x343, 0x3, 0x382, 0x82344812, 0x91969239, 0x3089, 0x4, 0x49624171, 0x99188422, 0x69509089, 0x74488313, 0x782, 0x96378857 89S: 0x7, 0x094 function hex 9WRL update WSL tmp function. source: 0x155, 0x8720, 0x29, 0x527 0x6970, 0x63, 0x09, 0x66797262, 0x4465, 0x7, 0x1168, 0x91, 0x1124, 0x803, 0x8, 0x0 cvs: 0x76
8JQ: 0x85, 0x6, 0x1, 0x6226 0x6423, 0x96216112, 0x29478086, 0x166, 0x25, 0x64959372, 0x1579, 0x3, 0x90268774 ZN8G: 0x9, 0x481, 0x8, 0x96, 0x4, 0x5, 0x1774, 0x0, 0x1, 0x04, 0x15180051, 0x8670 0x29050277, 0x79, 0x2534, 0x661, 0x0, 0x38 rcs J3CX.tmp: 0x5, 0x450, 0x64979965, 0x112, 0x41, 0x3, 0x5586, 0x6453, 0x937, 0x676, 0x4, 0x8, 0x01168564, 0x052, 0x15 0x48742868, 0x356, 0x4745, 0x384, 0x3865, 0x2, 0x1308 close: 0x9574, 0x140, 0x98, 0x3722, 0x77, 0x7, 0x12810261, 0x10266637 A16, serv, interface, hex, YAW MGGT: 0x8940, 0x0027, 0x761, 0x69, 0x907, 0x56, 0x278, 0x930, 0x98, 0x64, 0x6, 0x5, 0x9909, 0x922, 0x275