Apple Phish

From - Thu Feb 20 07:16:17 2014

X-Account-Key: account2

X-UIDL: 00056eb7501fb806

X-Mozilla-Status: 0001

X-Mozilla-Status2: 00000000

X-Mozilla-Keys:

Return-path:

Envelope-to: aboo@doctor.nl2k.ab.ca

Delivery-date: Thu, 20 Feb 2014 07:15:06 -0700

Received: from root by doctor.nl2k.ab.ca with local (Exim 4.82)

(envelope-from )

id 1WGU3q-00022K-Un

for aboo@doctor.nl2k.ab.ca; Thu, 20 Feb 2014 06:53:10 -0700

Resent-From: root@doctor.nl2k.ab.ca

Resent-Date: Thu, 20 Feb 2014 06:53:10 -0700

Resent-Message-ID: <20140220135310.GA7482@doctor.nl2k.ab.ca>

Resent-To: See root

Received: from vds785.sivit.org ([80.248.221.52])

by doctor.nl2k.ab.ca with esmtp (Exim 4.82)

(envelope-from )

id 1WGTVG-0005yZ-7N

for root@doctor.nl2k.ab.ca; Thu, 20 Feb 2014 06:18:06 -0700

Received: by vds785.sivit.org (Postfix, from userid 0)

id 08B4B632AE; Thu, 20 Feb 2014 14:17:14 +0100 (CET)

To: root@doctor.nl2k.ab.ca

Subject: Apple Store customers update

From:Apple Id

Content-Type: text/html

Message-Id: <20140220131714.08B4B632AE@vds785.sivit.org>

Date: Thu, 20 Feb 2014 14:17:14 +0100 (CET)

X-Spam_score: 5.4

X-Spam_score_int: 54

X-Spam_bar: +++++

X-Spam_report: Spam detection software, running on the system "gallifrey.nk.ca", has

identified this incoming email as possible spam. The original message

has been attached to this so you can view it (if it isn't spam) or label

similar future email. If you have any questions, see

the administrator of that system for details.



Content preview: Dear Valued Member, At Apple Store we have upgrade our server

go give you extra protection when using the Apple online Store services.

Some member longer have access to thier account information online that is

why we asked you to verify all your personal and account information through

this link. [...]



Content analysis details: (5.4 points, 5.0 required)



pts rule name description

---- ---------------------- --------------------------------------------------

1.6 RCVD_IN_BRBL_LASTEXT RBL: RCVD_IN_BRBL_LASTEXT

[80.248.221.52 listed in bb.barracudacentral.org]

-0.0 T_RP_MATCHES_RCVD Envelope sender domain matches handover relay

domain

0.0 HTML_MESSAGE BODY: HTML included in message

1.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts

0.6 HTML_MIME_NO_HTML_TAG HTML-only message, but there is no HTML tag

2.0 MIME_HEADER_CTYPE_ONLY 'Content-Type' found without required MIME

headers

Subject: {SPAM?} Apple Store customers update





Dear Valued Member,








At Apple Store we have upgrade our server go give you extra




protection when using the Apple online Store services.




Some member longer have access to thier account




information online that is why we asked you to verify




all your personal and account information through this




link.












href="http://assignmentstoday.com/indexe.html">Upgrade Now










Sincerely,




Apple Group









P.S. The link in this massage will be expire within 24




hours .








© 2014 Apple GROUP. All Rights Reserved.













Trackbacks

Trackback specific URI for this entry

This link is not meant to be clicked. It contains the trackback URI for this entry. You can use this URI to send ping- & trackbacks from your own blog to this entry. To copy the link, right click and select "Copy Shortcut" in Internet Explorer or "Copy Link Location" in Mozilla.

No Trackbacks

Comments

Display comments as Linear | Threaded

No comments

Add Comment

Enclosing asterisks marks text as bold (*word*), underscore are made via _word_.
Standard emoticons like :-) and ;-) are converted to images.

To prevent automated Bots from commentspamming, please enter the string you see in the image below in the appropriate input box. Your comment will only be submitted if the strings match. Please ensure that your browser supports and accepts cookies, or your comment cannot be verified correctly.
CAPTCHA

Enclosing asterisks marks text as bold (*word*), underscore are made via _word_.
Standard emoticons like :-) and ;-) are converted to images.

To prevent automated Bots from commentspamming, please enter the string you see in the image below in the appropriate input box. Your comment will only be submitted if the strings match. Please ensure that your browser supports and accepts cookies, or your comment cannot be verified correctly.
CAPTCHA