Phishing Spam

From - Fri Jul 26 11:10:33 2013

X-Account-Key: account1

X-UIDL: 000020424f5d9180

X-Mozilla-Status: 0001

X-Mozilla-Status2: 00000000

X-Mozilla-Keys:

Return-path:

Envelope-to: dave@doctor.nl2k.ab.ca

Delivery-date: Fri, 26 Jul 2013 02:07:58 -0600

Received: from va3ehsobe006.messaging.microsoft.com ([216.32.180.16] helo=va3outboundpool.messaging.microsoft.com)

by doctor.nl2k.ab.ca with esmtps (TLSv1:AES128-SHA:128)

(Exim 4.80.1)

(envelope-from )

id 1V2d40-0000NB-Nm

for dave@doctor.nl2k.ab.ca; Fri, 26 Jul 2013 02:07:58 -0600

Received: from mail93-va3-R.bigfish.com (10.7.14.232) by

VA3EHSOBE010.bigfish.com (10.7.40.12) with Microsoft SMTP Server id

14.1.225.22; Fri, 26 Jul 2013 08:07:43 +0000

Received: from mail93-va3 (localhost [127.0.0.1]) by mail93-va3-R.bigfish.com

(Postfix) with ESMTP id 9A94D3402AF for ; Fri, 26 Jul

2013 08:07:43 +0000 (UTC)

X-Forefront-Antispam-Report: CIP:164.107.81.212;KIP:(null);UIP:(null);IPV:NLI;H:cio-krc-pf05;RD:none;EFVD:NLI

X-SpamScore: 5

X-BigFish: VPS5(zzc85dhzz1f42h1d77h208ch1ee6h1de0h1fdah2073h1202h1e76h1d1ah1d2ah1fc6h1082kzz17326ah18c673h1de097h1de096hz2fh2a8h668h839hc60hd24hf0ah1288h12a5h12bdh137ah1441h1504h1537h153bh162dh1631h1758h18e1h1946h19b5h19ceh1ad9h1b0ah1bceh1d0ch1d2eh1d3fh1dc1h1dfeh1dffh99di1b1bi1155h)

Received-SPF: pass (mail93-va3: domain of osu.edu designates 164.107.81.212 as permitted sender) client-ip=164.107.81.212; envelope-from=gluck.17@osu.edu; helo=cio-krc-pf05 ;cio-krc-pf05 ;

Received: from mail93-va3 (localhost.localdomain [127.0.0.1]) by mail93-va3

(MessageSwitch) id 1374826062678165_31041; Fri, 26 Jul 2013 08:07:42 +0000

(UTC)

Received: from VA3EHSMHS012.bigfish.com (unknown [10.7.14.229]) by

mail93-va3.bigfish.com (Postfix) with ESMTP id A13544E004C for

; Fri, 26 Jul 2013 08:07:42 +0000 (UTC)

Received: from cio-krc-pf05 (164.107.81.212) by VA3EHSMHS012.bigfish.com

(10.7.99.22) with Microsoft SMTP Server (TLS) id 14.1.225.23; Fri, 26 Jul

2013 08:07:42 +0000

Received: from CIO-KRC-HT03.osuad.osu.edu (localhost [127.0.0.1]) by

cio-krc-pf05 (Postfix) with ESMTP id EDFFB60047 for ;

Fri, 26 Jul 2013 04:07:41 -0400 (EDT)

Received: from [10.119.74.202] (190.120.231.38) by smtp.service.osu.edu

(164.107.81.254) with Microsoft SMTP Server (TLS) id 14.3.123.3; Fri, 26 Jul

2013 04:07:40 -0400

Content-Type: multipart/alternative; boundary="===============1687655477=="

MIME-Version: 1.0

Subject: 1 New Alert Secure Document

To:

From: GoogleSecure Server

Date: Fri, 26 Jul 2013 01:07:36 -0700

Message-ID:

X-Originating-IP: [190.120.231.38]

X-CFilter-Loop: Forward

X-OriginatorOrg: osu.edu

X-Antivirus: AVG for E-mail 10.0.1432 [3209/6023]

X-AVG-ID: ID454D4B58-4F1EE44F



--===============1687655477==

Content-Type: text/plain; charset="iso-8859-1"

MIME-Version: 1.0

Content-Transfer-Encoding: quoted-printable

Content-Description: Mail message body



Online Drive Server



Please click on the link below to view the secure document sent to your em=

ail



View



GoogleSecure Server







-----

No virus found in this message.

Checked by AVG - www.avg.com

Version: 10.0.1432 / Virus Database: 3209/6023 - Release Date: 07/26/13



--===============1687655477==

Content-Type: text/html; charset="iso-8859-1"

MIME-Version: 1.0

Content-Transfer-Encoding: quoted-printable

Content-Description: Mail message body










1">

Attention Member









Online Drive Server





Please click on the link below to view the secure document sent to your ema=

il






ecure/docs.google.com.html">View






GoogleSecure Server











t" color=3D"#000000">No virus found in this message.


Checked by AVG - www.avg.com


Version: 10.0.1432 / Virus Database: 3209/6023 - Release Date: 07/26/13

=







--===============1687655477==--







Trackbacks

Trackback specific URI for this entry

This link is not meant to be clicked. It contains the trackback URI for this entry. You can use this URI to send ping- & trackbacks from your own blog to this entry. To copy the link, right click and select "Copy Shortcut" in Internet Explorer or "Copy Link Location" in Mozilla.

No Trackbacks

Comments

Display comments as Linear | Threaded

No comments

Add Comment

Enclosing asterisks marks text as bold (*word*), underscore are made via _word_.
Standard emoticons like :-) and ;-) are converted to images.

To prevent automated Bots from commentspamming, please enter the string you see in the image below in the appropriate input box. Your comment will only be submitted if the strings match. Please ensure that your browser supports and accepts cookies, or your comment cannot be verified correctly.
CAPTCHA

Enclosing asterisks marks text as bold (*word*), underscore are made via _word_.
Standard emoticons like :-) and ;-) are converted to images.

To prevent automated Bots from commentspamming, please enter the string you see in the image below in the appropriate input box. Your comment will only be submitted if the strings match. Please ensure that your browser supports and accepts cookies, or your comment cannot be verified correctly.
CAPTCHA