Company Representative scams, Payment Processing scams and other Employment scams.
by buried under 419s Wed Apr 24, 2013 10:33 pm
Return-Path: <[email protected]>
Received: from dpc6746136017.direcpc.com (dpc6746136017.direcpc.com [67.46.136.17])
(envelope-from [email protected])
Received: from 67.46.136.17 )
with ESMTPA id 973287582 for <>; Thu, 25 Apr 2013 00:09:04 +0100
From: <>
To: <>
Subject: Looking for remote assistants, paid 100 Euro per hour helping other people
Date: Thu, 25 Apr 2013 00:09:04 +0100
MIME-Version: 1.0
Content-Type: text/plain;
charset="windows-1250"
Content-Transfer-Encoding: 7bit
X-Mailer: bcmckwnn-06
Message-ID: <[email protected]>
X-Greylist: Default is to whitelist mail, not delayed by milter-greylist-4.2.7


We invite you to work in the remote assistant position.

This work takes 2-3 hours per week and requires absolutely no investment.
The essence of this work for incoming client requests in your city.
The starting salary is about 2500 EUR per month + bonuses.

You get paid your salary every 2 weeks and your bonuses after fulfilling each task!

We guarantee work for everyone. But we accept applications this week only!
Therefore, you should write a request right now. And you will start earning money, starting from next week.

Please send the request to my email [email protected] and I will answer you personally as soon as possible

Sincerely,
Dion Newell

Questions about scams? fraudatiocruor @ gmail.com to contact remove spaces
Advertisement

by Vakis Thu Apr 25, 2013 4:49 pm
Dear Dion

We have been victims of a well organize email attack the last days. The attack has been escalated the last days since is now using in the body of the spam mail a valid company mail of our firm.

Usually the “victim” believes the validity of the email and they try to communicate with us to apply for the job position. We do receive lots of emails the last days and several “victims” believes that we are spammers. Certainly we are not original senders of the emails.

Subject and body of the email may vary, but email “spirit” remains same. Our mail server trace most of the victims @yahoo.com or other yahoo related, but we do have also a fewer other victims from others public mail server providers.

What we know is a small part of the victims replying to us and we believe that lots of more emails are being globally distributed from the attacker.

We would like to trace and stop the sender the soonest and protect the reputation of our firm.

any idea how to stop this?

Regards
Vakis

Who is online

Users browsing this forum: ClaudeBot and 5 guests