**SPAM** Unauthorized third party

From: WellsFargo Online <onlinebanking@wellsfargo-online.com>
Date: Mon Feb 04 2008 - 17:35:29 EST

Spam detection software, running on the system "einstein.physics.drexel.edu", has
identified this incoming email as possible spam. The original message
has been attached to this so you can view it (if it isn't spam) or label
similar future email. If you have any questions, see
the administrator of this system for details.

Content preview: Wells Fargo Customer, We recently reviewed your account,
  and suspect that your Wells Fargo account may have been accessed by an
  unauthorized third party. Protecting the security of your account and of
  the Wells Fargo network is our primary concern. Therefore, as a
  preventative measure, we have temporarily limited access to sensitive
  account features. [...]

Content analysis details: (19.4 points, 4.1 required)

 pts rule name description
---- ---------------------- --------------------------------------------------
 2.2 INVALID_DATE Invalid Date: header (not RFC 2822)
 0.8 DATE_IN_PAST_06_12 Date: is 6 to 12 hours before Received: date
 1.4 MSGID_FROM_MTA_ID Message-Id for external message added locally
 0.0 UNPARSEABLE_RELAY Informational: message has unparseable relay lines
 2.0 BIZ_TLD URI: Contains an URL in the BIZ top-level domain
-0.2 BAYES_40 BODY: Bayesian spam probability is 20 to 40%
                            [score: 0.3101]
 1.2 HTML_IMAGE_ONLY_20 BODY: HTML: images with 1600-2000 bytes of words
 0.0 HTML_MESSAGE BODY: HTML included in message
 1.4 HTML_10_20 BODY: Message is 10% to 20% HTML
 0.0 MIME_HTML_ONLY BODY: Message only has text/html MIME parts
 2.7 FORGED_OUTLOOK_HTML Outlook can't send HTML message only
 1.1 HTML_MIME_NO_HTML_TAG HTML-only message, but there is no HTML tag
 2.5 FORGED_OUTLOOK_TAGS Outlook can't send HTML in this format
 0.0 MSGID_FROM_MTA_HEADER Message-Id was added by a relay
 0.1 TO_CC_NONE No To: or Cc: header
 0.0 RCVD_DOUBLE_IP_LOOSE Received: by and from look like IP addresses
 4.1 FORGED_MUA_OUTLOOK Forged mail pretending to be from MS Outlook
 0.2 AWL AWL: From: address is in the auto white-list

The original message was not completely plain text, and may be unsafe to
open with some email clients; in particular, it may contain a virus,
or confirm that your address can receive spam. If you wish to view
it, it may be safer to save it to a file and open it with an editor.

attached mail follows:




Wells Fargo Customer,

We recently reviewed your account, and suspect that your Wells Fargo account may have been accessed by an unauthorized third party.
Protecting the security of your account and of the Wells Fargo network is our primary concern.
Therefore, as a preventative measure, we have temporarily limited access to sensitive account features.

To restore your account access, please take the following steps to ensure that your account has not been compromised:

Login to your Wells Fargo account with your Username and Password and wait to update your account.

Review your recent account history for any unauthorized withdrawals or deposits, and check your account profile to make sure no changes have been made.
If any unauthorized activity has taken place on your account, report to Wells Fargo immediately.

To get started, go the link below:

http://www.wellsfargo.com/das/cgi-bin/session-cgi/logon.html

We apologize for any inconvenience this may cause, and appreciate your assistance in helping us maintain the integrity of the entire Wells Fargo system.
Thank your for your prompt attention to this matter. Wells Fargo - Online Banking

Sincerely, Wells Fargo Team.

Please do not reply to this email. Mails sent to this address cannot be answered.
For assistance, log in to your Wells Fargo account and choose the "Help" link in the header of any page. Received on Mon Feb 4 17:35:29 2008

This archive was generated by hypermail 2.1.8 : Fri Aug 08 2008 - 19:25:03 EDT