Raiffeisen, Avantaj Client 2009

Un nou tip de atac de tip phishing de aceasta data avand ca tinta clienţii Raiffeisen.

Dacă primiţi un un email cu subiectul “Raiffeisen, Avantaj Client 2009” care pare că este trimis de Raiffeisen trebuie să-l ignoraţi.  Este doar un email fraudulos care are drept scop obţinerea ilegală de date personale de la dvs. Aşa că pur şi simplu ştergeţi liniştit email-ul.

Servicii bancare avantajoase,

Raiffeisen Bank ofera posibilitatea de restituire de pana la 3,85 % tuturor clientilor nostrii din comisioanele percepute pe 2008 din reteaua de bancomate Raiffeisen.

Pentru a beneficia de recalcularea comisioanelor si restituirea in 15 zile lucratoarete te rugam acceseaza serviciul Internet Banking pentru autentificare in maxim 72 ore.

Pentru a proteja informatia dumneavoastra impotriva accesului neautorizat Raiffeisen Bank foloseste ultimile metode de criptare SSL.

http://www.raiffeisen.ro/wps/portal/internet

Dana Mirela Ionescu – Presedinte Consiliu de Administratie/ Director General .
Va multumim pentu intelegere.
Raiffeisen Bank : Reusim Impreuna . ©Raiffeisen Bank 2006

Emailul este trimis de pe online@rzb.ro

Iar headerul este:

Return-Path: <online@rzb.ro>
Delivered-To: xxxx@pcnews.ro
X-Spam-Flag: YES
X-Spam-Checker-Version: SpamAssassin 3.1.7 (2006-10-05) on hercule.rack.ro
X-Spam-Level: *********
X-Spam-Status: Yes, score=9.4 required=2.0 tests=BAYES_00,FORGED_MUA_OUTLOOK,
FORGED_OUTLOOK_HTML,FORGED_OUTLOOK_TAGS,HTML_IMAGE_ONLY_28,
HTML_MESSAGE,MIME_HTML_ONLY,UNDISC_RECIPS autolearn=no version=3.1.7
X-Spam-Report:
*  0.8 UNDISC_RECIPS Valid-looking To “undisclosed-recipients”
* -2.6 BAYES_00 BODY: Bayesian spam probability is 0 to 1%
*      [score: 0.0000]
*  1.9 HTML_IMAGE_ONLY_28 BODY: HTML: images with 2400-2800 bytes of words
*  0.0 HTML_MESSAGE BODY: HTML included in message
*  0.0 MIME_HTML_ONLY BODY: Message only has text/html MIME parts
*  2.7 FORGED_OUTLOOK_HTML Outlook can’t send HTML message only
*  2.5 FORGED_OUTLOOK_TAGS Outlook can’t send HTML in this format
*  4.1 FORGED_MUA_OUTLOOK Forged mail pretending to be from MS Outlook
Received: (qmail 24730 invoked from network); 6 Jan 2009 12:34:11 +0200
Received: from cegecom-mail1.cegecom.de (217.31.71.20)
by 194.60.72.122 with (DHE-RSA-AES256-SHA encrypted) SMTP; 6 Jan 2009 12:34:10 +0200
Received: from User ([213.144.195.202])
(AUTH: LOGIN thomas@cegecom.de)
by cegecom-mail1.cegecom.de with esmtp; Tue, 06 Jan 2009 11:33:19 +0100
id 00F9113B.4963336F.00016283
From: “Raiffeisen Bank” <online@rzb.ro>
Subject: ***SPAM*** Raiffeisen, Avantaj Client 2009
Date: Tue, 6 Jan 2009 11:33:53 +0100
MIME-Version: 1.0
Content-Type: text/html;
charset=”Windows-1251″
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
To: undisclosed-recipients: ;
X-Spam-Prev-Subject: Raiffeisen, Avantaj Client 2009

Author: PCNews Team

Share This Post On