Has someone offered you a huge sum of money or a valuable consignment? It's a 419 or advance fee fraud - find out how they work, and what to do to be safe.
by buried under 419s Wed Sep 14, 2011 5:58 pm
Return-path: <[email protected]>
Envelope-to:
Delivery-date: Wed, 14 Sep 2011 14:21:34 -0700
Received: from fmail17.walla.com ([192.118.69.17] helo=walla.com)
by with esmtp (Exim 4.69)
(envelope-from <[email protected]>)
id 1R3wtg-0001vl-GH
for ; Wed, 14 Sep 2011 14:21:34 -0700
Received: from omail165.walla.co.il (omail165.walla.co.il [192.118.71.165])
by fmail17.walla.co.il with ESMTP id p8ELL0PZ015616-p8ELL0Pa015616;
Thu, 15 Sep 2011 00:21:00 +0300
Received: from omail165.walla.co.il (omail165 [127.0.0.1])
by omail165.walla.co.il (8.14.3/8.13.5) with ESMTP id p8ELJg18001686;
Thu, 15 Sep 2011 00:19:42 +0300
Received: (from informix@localhost)
by omail165.walla.co.il (8.14.3/8.13.1/Submit) id p8ELIZ84000986;
Thu, 15 Sep 2011 00:18:35 +0300
Date: Thu, 15 Sep 2011 00:18:35 +0300
Received: from ([82.128.44.219])
by omail165.walla.co.il ([192.118.71.165]) with HTTP;
Thu, 15 Sep 2011 00:18:35 +0300
From: =?UTF-8?Q?=62=61=72=72=69=73=74=65=72=63=68=69=6E=61=7A=61=6D=20=63=68=61=6D=62=65=72=73?= <[email protected]>
X-Sender: [email protected]
X-Originating-Email: [[email protected]]
X-Originating-IP: [82.128.44.219]
Bcc:
Subject: =?UTF-8?Q?=55=53=44=24=35=35=20=4F=4E=4C=59?=
Message-Id: <[email protected]>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="------=_EREZ_P_WallaMail_14210_1547_P_0"
X-FEAS-SPF: PASS / PASS ( ip="192.118.71.165", helo="omail165.walla.co.il", mailFrom="[email protected]" ) ( headerFrom="[email protected]" )
X-Spam-Subject: ***SPAM*** USD$55 ONLY
X-Spam-Status: Yes, score=13.4
X-Spam-Score: 134
X-Spam-Bar: +++++++++++++
X-Spam-Report: Spam detection software, running on the system "", has
identified this incoming email as possible spam. The original message
has been attached to this so you can view it (if it isn't spam) or label
similar future email. If you have any questions, see
the administrator of that system for details.
Content preview: WESTERN UNION PAYMENT OFFICE ADDRESS;2 WESTERN AVENUE ROAD
LAGOS.ROAD,REPUBLIC OF BENIN OFFICE BRANCH CONDUCT CODE(829) EMAIL;[email protected]
ATTENTION; BENEFICIARY. MINISTER OF FINANCE BENIN,COTONOU,APPROVED YOUR PAYMENT
OF USD$3,500,000 AND SAID THE ONLY MONEY YOU WILL PAY IS USD$55.00 I ADVISE
YOU TO SEND $55.00 DOLLARS IMMEDIATELY YOU RECEIVE THIS EMAIL, SO THAT WE
FINALIZE THING REGARDS YOUR PAYMENT PROCEEDING TRANSFER TO YOUR RECEIVING
ADDRESS. BELOW ARE THE PAYMENT INFORMATION TO SEND $55 US DOLLARS OK, [...]
Content analysis details: (13.4 points, 7.0 required)
pts rule name description
---- ---------------------- --------------------------------------------------
0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider
(barristerchinazamchambers[at]walla.com)
-0.0 SPF_HELO_PASS SPF: HELO matches SPF record
1.5 SUBJ_ALL_CAPS Subject is all capitals
-0.0 SPF_PASS SPF: sender matches SPF record
-0.5 RP_MATCHES_RCVD Envelope sender domain matches handover relay domain
1.0 MISSING_HEADERS Missing To: header
3.1 DEAR_BENEFICIARY BODY: Dear Beneficiary:
1.8 US_DOLLARS_3 BODY: Mentions millions of $ ($NN,NNN,NNN.NN)
0.0 HTML_MESSAGE BODY: HTML included in message
0.8 BAYES_50 BODY: Bayes spam probability is 40 to 60%
[score: 0.5000]
0.8 MPART_ALT_DIFF BODY: HTML and text parts are different
0.7 MIME_HTML_ONLY BODY: Message only has text/html MIME parts
0.4 HTML_MIME_NO_HTML_TAG HTML-only message, but there is no HTML tag
0.0 LOTS_OF_MONEY Huge... sums of money
0.0 UPPERCASE_75_100 message body is 75-100% uppercase
1.9 FREEMAIL_REPLY From and body contain different freemails
0.8 ADVANCE_FEE_3_NEW Appears to be advance fee fraud (Nigerian 419)
0.0 ADVANCE_FEE_3_NEW_MONEY Advance Fee fraud and lots of money
1.0 ADVANCE_FEE_2_NEW_MONEY Advance Fee fraud and lots of money
0.0 T_TO_NO_BRKTS_FREEMAIL To: misformatted and free email service
0.0 MONEY_FRAUD_3 Lots of money and several fraud phrases
X-Spam-Flag: YES

--------=_EREZ_P_WallaMail_14210_1547_P_0
Content-Type: multipart/alternative; boundary="------=_EREZ_P_WallaMail_22201_2372_P_1"

--------=_EREZ_P_WallaMail_22201_2372_P_1
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: base64

WESTERN UNION PAYMENT OFFICE
ADDRESS;2 WESTERN AVENUE ROAD
LAGOS.ROAD,REPUBLIC OF BENIN
OFFICE BRANCH CONDUCT CODE(829) EMAIL; [email protected]
ATTENTION;&nbsp; BENEFICIARY.
MINISTER OF FINANCE BENIN,COTONOU,APPROVED YOUR PAYMENT OF USD$3,500,000 AND SAID THE ONLY MONEY YOU WILL PAY IS USD$55.00
I ADVISE YOU TO SEND $55.00 DOLLARS IMMEDIATELY YOU RECEIVE THIS EMAIL, SO THAT WE FINALIZE THING REGARDS YOUR PAYMENT PROCEEDING TRANSFER TO YOUR RECEIVING ADDRESS.
BELOW ARE THE PAYMENT INFORMATION TO SEND $55 US DOLLARS OK,
RECIVER NAME....OKAFOR ANTHONY
CITY..............COTONOU
COUNTRY.........BENIN REPUBLIC
QUESTION........COLOR
ANSWER..........RED
AMOUNT..........$55
MTCN...............
SENDERS NAME;......
SENDERS ORIGIN.....
DOMINIC JOHNSON (MANAGER)USD$55 ONLY

Questions about scams? fraudatiocruor @ gmail.com to contact remove spaces
Advertisement

Who is online

Users browsing this forum: Bing [Bot], ClaudeBot and 20 guests