Has someone offered you a huge sum of money or a valuable consignment? It's a 419 or advance fee fraud - find out how they work, and what to do to be safe.
by buried under 419s Thu Dec 25, 2014 2:50 am
Return-path: <[email protected]>
Envelope-to:
Delivery-date: Tue, 23 Dec 2014 20:23:42 -0800
Received: from cs12-dallas.accountservergroup.com ([173.192.98.208]:36179)
by with esmtps (TLSv1:DHE-RSA-AES256-SHA:256)
(Exim 4.80)
(envelope-from <[email protected]>)
id 1Y3dU4-0002Kp-Rg
for ; Tue, 23 Dec 2014 20:23:42 -0800
Received: from [74.194.0.170] (port=6320 helo=User)
by cs12-dallas.accountservergroup.com with esmtpa (Exim 4.82)
(envelope-from <[email protected]>)
id 1Y3dTz-000800-4V; Tue, 23 Dec 2014 22:23:35 -0600
Reply-To: <[email protected]>
From: "Dev Sanyal, PhD."<[email protected]>
To: [email protected]
Date: Tue, 23 Dec 2014 22:23:35 -0600
MIME-Version: 1.0
Content-Type: text/html;
charset="_iso-2022-jp$ESC"
Content-Transfer-Encoding: 7bit
X-Priority: 1
X-MSMail-Priority: High
X-Mailer: Microsoft Outlook Express 6.00.2800.1081
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1081
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - cs12-dallas.accountservergroup.com
X-AntiAbuse: Original Domain -
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - petroleum.com
X-Get-Message-Sender-Via: cs12-dallas.accountservergroup.com: authenticated_id: [email protected]
X-Spam-Status: Yes, score=19.4
X-Spam-Score: 194
X-Spam-Bar: +++++++++++++++++++
X-Spam-Report: Spam detection software, running on the system "", has
identified this incoming email as possible spam. The original message
has been attached to this so you can view it (if it isn't spam) or label
similar future email. If you have any questions, see
the administrator of that system for details.

Content preview: Dear sir, I have been assigned by my colleagues to contact
you. I am the Executive Vice President and Group Chief of Staff of the British
Petroleum Plc. I am also a member of the audit and compensation committee
of BP Plc saddled with the duty to investigate and research contracts awarded
by the British Petroleum Plc in 2010 consequent upon the oil spill in the
Gulf of Mexico and make recommendations to the board. In the course of our
duty, we discovered among other things, that a staggering sum of ?47,900,000.00
(Great British Pounds) is floating in one of the bank accounts of the British
Petroleum Plc unclaimed. [...]

Content analysis details: (19.4 points, 7.0 required)

pts rule name description
---- ---------------------- --------------------------------------------------
2.0 DEAR_SOMETHING BODY: Contains 'Dear (something)'
0.9 NSL_RCVD_HELO_USER Received from HELO User
0.2 FREEMAIL_REPLYTO_END_DIGIT Reply-To freemail username ends in digit
(<devsanyal1[at]yahoo.com>
)
0.0 HTML_MESSAGE BODY: HTML included in message
0.8 BAYES_50 BODY: Bayes spam probability is 40 to 60%
[score: 0.5000]
0.7 MIME_HTML_ONLY BODY: Message only has text/html MIME parts
0.1 FORGED_OUTLOOK_TAGS Outlook can't send HTML in this format
0.5 MISSING_MID Missing Message-Id: header
0.0 FROM_MISSP_MSFT From misspaced + supposed Microsoft tool
0.0 FSL_NEW_HELO_USER Spam's using Helo and User
0.0 FORGED_OUTLOOK_HTML Outlook can't send HTML message only
1.3 AXB_XMAILER_MIMEOLE_OL_1ECD5 Yet another X header trait
2.1 FREEMAIL_FORGED_REPLYTO Freemail in Reply-To, but not From
0.0 FROM_MISSP_REPLYTO From misspaced, has Reply-To
0.4 TO_NO_BRKTS_FROM_MSSP Multiple formatting errors
1.9 FORGED_MUA_OUTLOOK Forged mail pretending to be from MS Outlook
1.4 LOTTO_DEPT Claims Department
3.5 TO_NO_BRKTS_MSFT To: misformatted and supposed Microsoft tool
0.1 ADVANCE_FEE_4_NEW Appears to be advance fee fraud (Nigerian 419)
0.0 ADVANCE_FEE_5_NEW Appears to be advance fee fraud (Nigerian 419)
3.5 ADVANCE_FEE_3_NEW Appears to be advance fee fraud (Nigerian 419)
X-Spam-Flag: YES
Subject: ***SPAM*** I have been assigned by my colleagues to contact you.


Dear sir,

I have been assigned by my colleagues to contact you. I am the Executive Vice President and Group Chief of Staff of the British Petroleum Plc. I am also a member of the audit and compensation committee of BP Plc saddled with the duty to investigate and research contracts awarded by the British Petroleum Plc in 2010 consequent upon the oil spill in the Gulf of Mexico and make recommendations to the board. In the course of our duty, we discovered among other things, that a staggering sum of ?47,900,000.00 (Great British Pounds) is floating in one of the bank accounts of the British Petroleum Plc unclaimed.

After a more thorough investigation, we discovered that the amount was the result of an over-invoiced contract for the supply of Scavenger 2000 Depollution Boats with Voraxial Separators for the cleaning of the oil spills/habours in the Gulf of Mexico, which was originally masterminded by the BP Contract Award Committee with the intention to transfer and use the money. Due to the caliber of people involved in the deal, we have therefore teamed up with them to finalize, tidy -up the account records and close the deal with your assistance, as we need a foreign firm/individual to be presented by us as a sub-contractor for the claim of the money.

Upon receipt of your reply confirming your interest in working with us on this project, we will discuss the terms of transaction and give you details as we have carefully worked out the modalities for a safe transfer of the funds.

N / B: Please, this information is strictly confidential and should not be divulged to any other person for security reasons. Thank you for your understanding expected.

Respectfully,

Dev Sanyal, PhD.

(Executive Vice President and Group Chief of Staff)

British Petroleum&nbsp; Plc (BP).

International Headquarters, 1, St James's Square,

London SW1Y 4PD United Kingdom

+447700030804

http;//www.bp.com

[email protected]

Questions about scams? fraudatiocruor @ gmail.com to contact remove spaces
Advertisement

Who is online

Users browsing this forum: ClaudeBot, Google [Bot], Google Adsense [Bot] and 33 guests