More paypal Phish

From srvs@notification.no Tue Sep 16 03:43:39 2008

Received: from techtonix.com

by doctor.nl2k.ab.ca (8.14.3/8.14.3) with SMTP id m8G9gRSR013661

for ; Tue, 16 Sep 2008 03:42:32 -0600 (MDT)

X-Spam-Filter: check_local@doctor.nl2k.ab.ca by digitalanswers.org

Received: from User ([67.95.121.2]) by techtonix.com with Microsoft

SMTPSVC(6.0.3790.3959); Tue, 16 Sep 2008 05:28:34 -0400

From: "service@paypal.com"

Subject: {?} You Have 1 New Security Message Alert!

Date: Tue, 16 Sep 2008 04:13:11 -0500

MIME-Version: 1.0

Content-Type: text/plain;

charset="Windows-1251"

Content-Transfer-Encoding: 7bit

X-Priority: 3

X-MSMail-Priority: Normal

X-Mailer: Microsoft Outlook Express 6.00.2600.0000

X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000

Bcc:

Message-ID:

X-OriginalArrivalTime: 16 Sep 2008 09:28:34.0140 (UTC)

FILETIME=[9710A9C0:01C917DE]

X-NetKnow-InComing-4-71-10-1-MailScanner-Information: Please contact the ISP

for more information

X-NetKnow-InComing-4-71-10-1-MailScanner-ID: m8G9gRSR013661

X-NetKnow-InComing-4-71-10-1-MailScanner: Found to be clean

X-NetKnow-InComing-4-71-10-1-MailScanner-IP-Protocol: IPv4

X-NetKnow-InComing-4-71-10-1-MailScanner-SpamCheck: spam, spamhaus-ZEN,

spamhaus-XBL, SBL+XBL, CBL, SpamAssassin (not cached, score=21.219,

required 5, autolearn=spam, BAYES_99 3.50, BOTNET 5.00,

FORGED_MUA_OUTLOOK 3.12, MISSING_HEADERS 1.29,

NORMAL_HTTP_TO_IP 0.00, RCVD_IN_XBL 3.20, RDNS_NONE 0.10,

RELAY_CHECKER 0.00, RELAY_CHECKER_IPHOSTNAME 0.01,

URIBL_PH_SURBL 5.00)

X-NetKnow-InComing-4-71-10-1-MailScanner-SpamScore: sssssssssssssssssssss

X-NetKnow-InComing-4-71-10-1-MailScanner-From: srvs@notification.no

X-NetKnow-InComing-4-71-10-1-MailScanner-Watermark:

1221990155.9603@oiBuVPiGkLuvW7GcVxugsQ

X-Spam-Status: Yes



Dear PayPal customer,



As part of our security measures, we regularly screen activity in the PayPal

+system. We recently contacted you after noticing an issue on your account.



Our system detected unusual attempts to log in to your PayPal account from

+diffrent ip locations.



In accordance with PayPal's User Agreement, your account access will remain

+limited until the issue has been resolved. Unfortunately, if access to your

+account remains limited for an extended period of time, it may result in

+further limitations or eventual account closure. We encourage you to log in to

+your PayPal account as soon as possible to help avoid this.



Please update and verify your information by checking the link below:

If you can't open this link from email just copy to your internet browser.



http://66.49.165.226/users/alex/update/account/login.php



Once you log in, you will be provided with steps to restore your account access.+We appreciate your understanding as we work to ensure account safety.



To review your account and some or all of the information that PayPal used to

+make its decision to limit your account access, please visit the Resolution

+Center. If, after reviewing your account information, you seek further

+clarification regarding your account access, please contact PayPal by visiting

+the Help Center and clicking "Contact Us".



We thank you for your prompt attention to this matter. Please understand that

+this is a security measure intended to help protect you and your account. We

+apologize for any inconvenience.



Sincerely,

PayPal Account Review Department



PayPal Email ID PP638





--

This message has been scanned for viruses and

dangerous content by MailScanner, and is

believed to be clean.

Trackbacks

Trackback specific URI for this entry

This link is not meant to be clicked. It contains the trackback URI for this entry. You can use this URI to send ping- & trackbacks from your own blog to this entry. To copy the link, right click and select "Copy Shortcut" in Internet Explorer or "Copy Link Location" in Mozilla.

No Trackbacks

Comments

Display comments as Linear | Threaded

No comments

Add Comment

Enclosing asterisks marks text as bold (*word*), underscore are made via _word_.
Standard emoticons like :-) and ;-) are converted to images.

To prevent automated Bots from commentspamming, please enter the string you see in the image below in the appropriate input box. Your comment will only be submitted if the strings match. Please ensure that your browser supports and accepts cookies, or your comment cannot be verified correctly.
CAPTCHA

Enclosing asterisks marks text as bold (*word*), underscore are made via _word_.
Standard emoticons like :-) and ;-) are converted to images.

To prevent automated Bots from commentspamming, please enter the string you see in the image below in the appropriate input box. Your comment will only be submitted if the strings match. Please ensure that your browser supports and accepts cookies, or your comment cannot be verified correctly.
CAPTCHA