Phishing Scams and Phishing Reports at MillerSmiles.co.uk

     
 
Home
Search
Archives
News
Submit Scam
Articles
F.A.Q.
Forum
About Us
Contact Us
Links
 


 

Barclays Bank: Urgent Security Notice -Thu,
14 Dec 2006 08:52:05 -0800

Barclays Bank


 

 
Scam Report
Date Reported: 15th December 2006 Whats this? Risk Level: MEDIUM-HIGH Whats this?
 
Details
 
Email Subject:
 Barclays Bank: Urgent Security Notice -Thu, 14 Dec 2006 08:52:05 -0800
Apparent Sender:
 Barclays Bank Whats this?
Return Address:
 Barclays Bank plc < emea-id-9046533ib@barclays.co.uk > Whats this?
Email Format:  HTML Whats this?
 
URL of Web Content:
 http://www.barclays.co.uk.cprocedure. id396341622.dionast.tv/go.html/ Whats this?
Location:
 UK Whats this?
 
Scam number:
 aa-3965
 
Comments:
  • Email asks you to confirm/update/verify your account data at Barclays Bank by visiting the given link. You will be taken to a spoof website where your details will be captured for the phishers.


  • Barclays Bank never send their users emails requesting personal details in this way.


  • The REAL URL of the spoof website is disguised as "http://www.barclays.co.uk/cprocedure/ id073557322/go.html".


  • The REAL URL of the spoof website is hidden by a hyperlinked image in the body of the email. This is a technique used to get past spam filters that can only read normal text.


  • The REAL URL of the spoof website has been chosen to look very similar to the actual Barclays Bank URL. Do not be fooled!


  • The entire email consists of nothing but an image that contains all of the body text and links to a spoof website. This is a technique used to get past spam filters that can read normal text but not images.
     
Content
 
 
 
"Barclays bank Protection Department requests you to start the client details confirmation procedure."


 
Website:    
 
 
  See our most recent scam reports Browse our scam report archives Search


Please send us any scam/phishing emails you have received by reporting them here

For access to our huge blacklist of domain names and to sign up to our live feed of ALL the scams we receive please take a look at our Honeytrap service

If you have received the email below, please remember that it is very common for these email scams to be redistributed at a later date with only slightly different content, such as a different subject or return address, or with the fake webpage(s) hosted on a different webserver.

We aim to report every variant of the scams we receive, so even if it appears that a scam you receive has already been reported, please submit it to us anyway.