Since, like anyone else, I receive tons of scam emails and snail mail letters, I decided to present here some of these. All of these (and many more which I just delete) are scams. This means, what the senders have in mind is to racket one of us. And according to what I've seen, they do succeed quite often.
If you have similar letters in your mailbox, either disregard or play with the person knowing that you can't give him (or her) any information about:
-
Your bank account,
-
Your address — or any valid address if that matter,
-
Your family, and
-
any other information that you judge private or even intimate.
Ha! I say "Your"... even if you don't like your neighbor at all, don't give his information either. The Internet leaves tracks (hackers in the US are being caught one after another!) and you would certainly be in even bigger trouble.
In the meantime, I hope you will enjoy reading these letters as I do myself once in a while. 8-)
I do not always add comments with the letters since I usually don't have time to do so, but there would often be a lot of joke to tell!
Latest Scams |
-
Last update: 07/06/2017
This one did bait. 8-)
I like the answer Ho! I got your resume from the resume site. Cool. So the resume site. Well, well, well... at least she has a good excuse, hey?!
Otherwise, somehow, they copied the website at http://www.statoil.ie but it is all broken. The real site is at https://www.statoil.com/ (.com instead of .ie, and I have no idea what .ie stands for, let me know if you know! — cool! someone did let me know! It's for Ireland.).
Okay... so now I asked her for the form... we'll see if I get it 8-)
...
-
Last update: 10/31/2009
X-Apparently-To: alexis_wilke@yahoo.com via 206.190.38.201; Wed, 08 Sep 2004 07:22:59 -0700
X-Originating-IP: [66.35.250.206]
Return-Path: <diamondlottria@pnetmail.co.za>
Received: from 66.35.250.206 (EHLO sc8-sf-mx1.sourceforge.net) (66.35.250.206)
by mta129.mail.re2.yahoo.com with SMTP; Wed, 08 Sep 2004 07:22:59 -0700
Received: from mailout06.infosat.net ([66.18.69.6] helo=mail02.infosat.net)
by sc8-sf-mx1.sourceforge.net with esmtp (Exim 4.34)
id 1C53La-000226-3Z; Wed, 08 Sep 2004 07:22:55 -0700
Received: from [196.38.110.28] (HELO mail01.infosat.net)
b
-
Last update: 11/23/2014
This looks like a scammer trying to get your login + password to some poker website (which I thought was illegal in the USA?! Probably a case of prohibition... he! he!) The idea is certainly to get your money and bye bye! (or lose it against a better player who's himself! then you'd have a real hard time to prove that you were stolen!!!)
I made the <a ...> tags visible instead of real links.
Return-Path: <subidor@mail.orthomedika.cl>
X-Original-To: alexis@halk.m2osw.com
Delivered-To: alexis@halk.m2osw.com
Received: from mail.orthomedika.cl (www.orthomedika.cl ...
-
Last update: 10/31/2009
First time for everything! This is the first I see of its genre! 8-)
So they have an ATM card that I could use to withdraw the wooping
total of US $500,000. Cool! But of course, I'll have to send some
money to that delivery company, and probably some extra taxes and
fees for demurrage (i.e. for the freaking delay between the time
that idiot of Sule left the packet with that delivery company and
the time I contact that company!?)
-
Last update: 10/31/2009
What I like in this one is that many characters are missing
on the left side. Ha! Ha! Ha! Know why?!
Many of these emails you receive them with '> ' on the
left side (often drawn as '| ' by Outlook & Co.). It
very much looks like this guy is not the best of all English
speaker (in Singapore they speak Chinese) and when deleting
the '> ' he went a bit too far on many lines. Very funny!
-
Last update: 02/18/2012
Return-Path: <nwinyer_n_okpala11@yahoo.co.in>
X-Original-To: alexis@halk.m2osw.com
Delivered-To: alexis@halk.m2osw.com
Received: from mail.m2osw.com (jcolo [69.55.238.181])
by halk.m2osw.com (Postfix) with ESMTP id A15CF1BDE4
for <alexis@halk.m2osw.com>; Sun, 20 Jan 2008 12:12:41 -0800 (PST)
Received: from web8903.mail.in.yahoo.com (web8903.mail.in.yahoo.com [203.84.221.31])
by mail.m2osw.com (Postfix) with SMTP id 4DBD89D402E
for <alexis@m2osw.com>; Sun, 20 Jan 2008 12:12:40 -0800 (PST)
Received: (qmail 72705 invoked by uid 60001); 20 Jan 2008
-
Last update: 10/31/2009
Return-Path: <www-data@artisweb.officinaweb.it>
X-Original-To: alexis@halk.m2osw.com
Delivered-To: alexis@halk.m2osw.com
Received: from snap.turnwatcher.com (colo [168.150.251.50])
by halk.m2osw.com (Postfix) with ESMTP id 2EFDE1BDE4
for <alexis@halk.m2osw.com>; Tue, 23 Oct 2007 12:06:29 -0700 (PDT)
Received: from ulisse.officinaweb.it (unknown [151.11.58.8])
by snap.turnwatcher.com (Postfix) with ESMTP id 9377226AD13
for <alexis@m2osw.com>; Tue, 23 Oct 2007 12:06:28 -0700 (PDT)
Received: by ulisse.officinaweb.it (Postfix, from userid 33)
id 09F3919
-
Last update: 10/31/2009
Hey! The IRS owes me money again! Oh! Yes! I got that same email last year.
Again, wrong number. Oh! Look at the link now...
http://0x7C.0xDB11D1
-
Last update: 11/23/2014
This is going on and on with pretty much all the banks I ever heard of. Many with British banks now and my less global banks! It looks like the phishers are targeting smaller banks which certainly have much less money to spend on protecting their users from giving away their credentials. This scheme most certainly work. According to the numbers I have seen, 1 in 100 people will fall for it and these people lose US $800 on average. This is quite expensive!
Notice that this one is using an account of some sort at the University of Toronto for the fake page. The URL is really bad! But still, ...
-
Last update: 10/31/2009
Funny. He calls me "President/CEO". As a matter of fact, I'm. He! He!
|