Scams, Scams, Scams
Don't fall prey to these scams.
from: do_not_reply@calofestival.co.uk PG & E ENERGY STATEMENT Account No: XXX535763-5 Statement Date: 01/10/2014 Due Date: 02/01/2014 Your Account Summary Amount Due on Previous Statement Payment(s) Recieved Since Last Statement Previous Unpaid Balance Current Electric Charges Current Gas Charges $344.70 0.0 $344.70 $165.80 Total Amount Due BY 02/01/2014 $559.7
Allegedly from: JPMorgan Chase & Co onlinehelpdesk@secure-chase.com Another attempt to steal your credentials from another hacked WordPress site. Forward the messages to spoof@chase.com Dear Customer, Our records shows that your online session has been blocked due to the following reason. (1) Log On attempts with invalid information such as your Email Address and mother maiden name .
Is this a MLM scheme? I can't read Spanish, but the website looks like an affiliate marketing system built on spamming the world. Olá! Tenha Seu Site de Revenda On-Line Tô ganhando R$ 200,00 a 300,00 todo dia! Só divulgar como estou fazendo agora! Este não é um Marketig Multi-Nível e não existem níveis nem recrutamento. Veja como este sistema é realmente poderoso: Abraço, Oxi
Wants you to open: voicemail.zip. The attachment most likely contains a virus. Forward it to spoof@att.com and then delete it. Voicemail Message You have received a voicemail at 2013-19-12 25:24:34 CST.
Allegedly from: Trusted mail server (impersonates your email service) Spam Quarantine Notification The message(s) below have been blocked by your administrator as suspected spam. If any of the messages below are not spam, click the Release link to have them sent to your Inbox. To see all quarantined messages view your email quarantine. Quarantined Email From Subject Date
Allegedly from: Billy Hunt. This email attempts to get your information by having you download and install malicious software. Delete it. Dear Visa card holder, For more details please see the attached transaction report. Billy_Hunt Data Protection Officer VISA EUROPE LIMITED 1 Sheldon Square London W2 6WH United Kingdom CONFIDENTIALITY NOTICE:
These people sending you this email are attempting to steal your email information. Do not reply. Just report it as junk and move on. Dear WEBMAIL Subscriber, This is to inform you that We have noticed some unusual activities in your WEBMAIL account. As a result, access to your WEBMAIL WEBMAIL email Terms And Condition User Agreement.
This emails subject is: "Your order is complete - Please save this email". After many promises about how this is the greatest program ever; this email ultimately leads you to: https://www.securepps.com/lazy_cash_system/order.php?a_aid=509e3acaa558a where you can give them $12.00. Click on the link below to access your download: http://www.soloprofitads.info/link/41 This expires in 48 hours.
The 15.2 million would be released to you within 10 working days according to the director and I working to make sure you receive it with the same period. I await your immediate response. Regards, Gerard Elias QC
Hello I sent you a document via Google drive, follow the link VIEW Here just sign in with your email to view it. Thank you -- Kathryn B. Clayton-Hachey The link took me to: http://kajakolor.pl/wp-admin/css/remaxdoocs/
Allegedly from: eFax Corporate service You have received a 17 page(s) fax at 2013-21-21 03:14:34 CST. * The reference number for this fax is latf1_did11-1712973269-9475225404-06. Thank you for using the eFax Corporate service! 2013 j2 Global, Inc. All rights reserved. eFax Corporate is a registered trademark of j2 Global, Inc.
Allegedly from: your own website Please download the document. It was scanned and sent to you using a Xerox multifunction device. File Type: pdf Download: Scanned from a Xerox multi~1.pdf multifunction device Location: machine location not set Device Name: Xerox3278 For more information on Xerox products and solutions, please visit http://www.xerox.com
Recent scam communications