CIBC Phish

From securityalert@cibc.com Tue Aug 23 08:58:19 2011

Return-Path: securityalert@cibc.com

X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on doctor.nl2k.ab.ca

X-Spam-Level: **

X-Spam-Status: No, score=3.3 required=5.0 tests=FORGED_MUA_OUTLOOK,

FORGED_OUTLOOK_TAGS,SARE_OBFU_SPLIT_HR2 autolearn=no version=3.3.2

X-Original-To: root@doctor.nl2k.ab.ca

Delivered-To: root@doctor.nl2k.ab.ca

Received: from localhost (localhost.nl2k.ab.ca [127.0.0.1])

by doctor.nl2k.ab.ca (Postfix) with ESMTP id 0835612CFAB5

for ; Tue, 23 Aug 2011 08:58:19 -0600 (MDT)

X-Virus-Scanned: amavisd-new at doctor.nl2k.ab.ca

Received: from doctor.nl2k.ab.ca ([127.0.0.1])

by localhost (doctor.nl2k.ab.ca [127.0.0.1]) (amavisd-new, port 10024)

with ESMTP id kkNDIpbJBE6i for ;

Tue, 23 Aug 2011 08:58:09 -0600 (MDT)

Received: from correoweb.wonderl.com (kompassocean.com [200.74.218.204])

(using SSLv3 with cipher EDH-RSA-DES-CBC3-SHA (168/168 bits))

(No client certificate requested)

by doctor.nl2k.ab.ca (Postfix) with ESMTPS id DF3ED12CFAB4

for ; Tue, 23 Aug 2011 08:58:04 -0600 (MDT)

Received: from User ([173.184.125.121])

by correoweb.wonderl.com (Merak 6.1.0) with ASMTP id MWK37904;

Tue, 23 Aug 2011 10:15:46 -0430

From: CIBC Online Banking

Subject: ***SPAM**
CIBC Bank -Anti-Fraud International

Date: Tue, 23 Aug 2011 08:57:49 -0600

MIME-Version: 1.0

Content-Type: text/html;

charset="Windows-1251"

Content-Transfer-Encoding: 7bit

X-Priority: 3

X-MSMail-Priority: Normal

X-Mailer: Microsoft Outlook Express 6.00.2600.0000

X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000

X-Sanitizer: This message has been sanitized!

X-Sanitizer-URL: http://mailtools.anomy.net/

X-Sanitizer-Rev: $Id: Sanitizer.pm,v 1.94 2006/01/02 16:43:10 bre Exp $
















src="https://www.cibconline.cibc.com/olb/img/cibc-logo.gif"



width="100" height="82">

















Our Valued Customer,












For your security, CIBC Bank has safeguard your account



when there is a

possibility that someone other than you is attempting



to sign on.




You now need to verify your Identity.





To verify your identity, kindly follow



style="font-size: 10pt; font-family: Arial; color: black">

reference below and take the directions to instant



activation.













size="2">







https://www.cibconline.cibc.com/olbtxn/authentication/PreSign



On






face="Tahoma">







face="Arial">Thank you for

helping us to protect you.



color="black" size="2" face="Tahoma">







Security Advisor


color="#006699"face="Arial"size="2">





color=""face="Arial"size="2">The CIBC Online Security



Guarantee











This message has been

+'sanitized'. This means that potentially

dangerous content has been rewritten or removed. The following

log describes which actions were taken.





Sanitizer (start="1314111500"):

SanitizeFile (filename="unnamed.html, filetype.html", mimetype="text/html"):

Match (names="unnamed.html, filetype.html", rule="2"):

Enforced policy: accept



Rewrote HTML tag: >>_table id="table3" style="BORDER-COLLAPSE: collapse"

+width="564" border="0"_<<

as: >>_table id="table3" DEFANGED_style="BORDER-COLLAPSE:

+collapse" width="564" border=0_<<

Note: Styles and layers give attackers many tools to fool the

user and common browsers interpret Javascript code found

within style definitions.



Rewrote HTML tag: >>_span style="font-size: 10pt; font-family: Arial;

+color: black"_<<

as: >>_DEFANGED_span style="font-size: 10pt; font-family:

+Arial; color: black"_<<

Rewrote HTML tag: >>_/span_<<

as: >>_/DEFANGED_span_<<

Rewrote HTML tag: >>_/div_<<

as: >>_/p__DEFANGED_div_<<

Total modifications so far: 4







Anomy 0.0.0 : Sanitizer.pm

$Id: Sanitizer.pm,v 1.94 2006/01/02 16:43:10 bre Exp $









This message has been

+'sanitized'. This means that potentially dangerous content has been rewritten or removed. The following

log describes which actions were taken.





Sanitizer (start="1314111500"):

SanitizeFile (filename="unnamed.html, filetype.html", mimetype="text/html"):

Match (names="unnamed.html, filetype.html", rule="2"):

Enforced policy: accept



Rewrote HTML tag: >>_table id="table3" style="BORDER-COLLAPSE: collapse"

+width="564" border="0"_<<

as: >>_table id="table3" DEFANGED_style="BORDER-COLLAPSE:

+collapse" width="564" border=0_<<

Note: Styles and layers give attackers many tools to fool the

user and common browsers interpret Javascript code found

within style definitions.



Rewrote HTML tag: >>_span style="font-size: 10pt; font-family: Arial;

+color: black"_<<

as: >>_DEFANGED_span style="font-size: 10pt; font-family:

+Arial; color: black"_<<

Rewrote HTML tag: >>_/span_<<

as: >>_/DEFANGED_span_<<

Rewrote HTML tag: >>_/div_<<

as: >>_/p__DEFANGED_div_<<

Total modifications so far: 4







Anomy 0.0.0 : Sanitizer.pm

$Id: Sanitizer.pm,v 1.94 2006/01/02 16:43:10 bre Exp $









This message has been

+'sanitized'. This means that potentially

dangerous content has been rewritten or removed. The following

log describes which actions were taken.





Sanitizer (start="1314111500"):

SanitizeFile (filename="unnamed.html, filetype.html", mimetype="text/html"):

Match (names="unnamed.html, filetype.html", rule="2"):

Enforced policy: accept



Rewrote HTML tag: >>_table id="table3" style="BORDER-COLLAPSE: collapse"

+width="564" border="0"_<<

as: >>_table id="table3" DEFANGED_style="BORDER-COLLAPSE:

+collapse" width="564" border=0_<<

Note: Styles and layers give attackers many tools to fool the

user and common browsers interpret Javascript code found

within style definitions.



Rewrote HTML tag: >>_span style="font-size: 10pt; font-family: Arial;color: black"_<<

as: >>_DEFANGED_span style="font-size: 10pt; font-family:Arial; color: black"_<<

Rewrote HTML tag: >>_/span_<<

as: >>_/DEFANGED_span_<<

Rewrote HTML tag: >>_/div_<<

as: >>_/p__DEFANGED_div_<<

Total modifications so far: 4







Anomy 0.0.0 : Sanitizer.pm

$Id: Sanitizer.pm,v 1.94 2006/01/02 16:43:10 bre Exp $



Trackbacks

Trackback specific URI for this entry

This link is not meant to be clicked. It contains the trackback URI for this entry. You can use this URI to send ping- & trackbacks from your own blog to this entry. To copy the link, right click and select "Copy Shortcut" in Internet Explorer or "Copy Link Location" in Mozilla.

No Trackbacks

Comments

Display comments as Linear | Threaded

No comments

Add Comment

Enclosing asterisks marks text as bold (*word*), underscore are made via _word_.
Standard emoticons like :-) and ;-) are converted to images.

To prevent automated Bots from commentspamming, please enter the string you see in the image below in the appropriate input box. Your comment will only be submitted if the strings match. Please ensure that your browser supports and accepts cookies, or your comment cannot be verified correctly.
CAPTCHA

Enclosing asterisks marks text as bold (*word*), underscore are made via _word_.
Standard emoticons like :-) and ;-) are converted to images.

To prevent automated Bots from commentspamming, please enter the string you see in the image below in the appropriate input box. Your comment will only be submitted if the strings match. Please ensure that your browser supports and accepts cookies, or your comment cannot be verified correctly.
CAPTCHA