Beispiel für eine Phishing-Email vom Typ HTML.Phishing.Bank-386

Achtung:
Bitte keine Klicks im Text unten durchführen (mit Ausnahme des "Zurück"-Links am Ende der Seite), es handelt sich um realen Schadcode!!!

Zurück


  
    <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://wwww3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>Untitled Document</title>
</head>

<body>
<table width="673" border="0">
 <tr>
   <td><div align="right"><a href="http://cpe-24-221-82-147.mi.sprintbbd.net:81/colappmgr/" target="_blank"><img src="http://www.chase.com/ccpmweb/shared/image/chaseNewlogo.gif" width="138" height="27" border="0" /></a></div></td>
 </tr>
</table>
<table width="673" height="232" border="0">
 <tr>
   <td><p>Your online credit card account has high-risk activity status. We are contacting you to remind that on March 27 2006 our Account Review Team identified some unusual activity in your account. In accordance with Chase Bank User Agreement and to ensure that your account has not been compromised, access your account was limited. Your account access will remain limited until this issue has been resolved.</p>
   <p>We encourage you to log in and perform the steps necessary to restore your account access as soon as possible. Allowing your account access to remain limited for an extended period of time may result in further limitations on the use of your account and possible account closure.<br />
   </p>
   <p>Login to your limit account and restore online access:<br />
     <a href="http://cpe-24-221-82-147.mi.sprintbbd.net:81/colappmgr/" target="_blank">https://www.chase.com/asp/services/update.php?account313985</a></p>
   <p>This notification is part of the All-Electronic Program you enrolled in to receive your activity report online.<br />
   </p></td>
 </tr>
</table>
<p>&nbsp;</p>
</body>
</html>
  

Zurück

 Please look here!