<table class="messageheader" cellspacing="0" cellpadding="0" width="100%" border="0"><tbody><tr><td class="label"> </p> I'm not a customer,it's not addressed to me personally butthe link takes you to HSBC.co.uk</p> </p> Date:</p></td><td> </p> Sat, 29 Mar 2008 19:20:28 -0400</p></td></tr></tbody></table><div class="msgbody clearfix" id="message7113354261594671188188102080318843144393775" style="visibility: visible"><div id="yiv1979308274"><div id="yiv1486829270"><div> </p> Security Alert </p> Dear HSBC Customer,</p></div><div> We recently reviewed your account, and suspect that your HSBC account may have been accessed by an unauthorized third party. Protecting the security of your account is our primary concern. Therefore, as a preemptive measure, we have temporarily limited access to sensitive account features.</p> </div><div><ul>[*]To restore your account access, we need you to confirm your identity. [/list]</div><div><ul>[*]To do so we need you to follow the link below and proceed to confirm your information. [/list]</div><div><ul>[*]The log in attempt was made from: [/list]<blockquote> ISP host : web05.btcentralplus-24.7.google.com</p></blockquote></div><div> </div><div><div align="center">To restore your account access click on the link below:</div></div><div><div align="center"> <font color="#003399">http://www.hsbc.co.uk/1/2/HSBCINTEGRATION/CAM10;jsessionid=0000WHt1DHQzITCuusXdvBmOoQ2:11j74lld0?IDV_URL=hsbc.MyHSBC_pib</font></p> <p align="left">J. F. Steve</p><p align="left">Online Security Manager</p><p align="left">HSBC Bank plc.</p></div></div></div></div></div>
Its spam trying to get your bank details. Look at the source of it, there is some javascript that changes where the link goes to when you click it. Although it looks like when you pasted it onto here the javascript got freaked and doesn't work properly. In the original email it might have worked depending on your email client. The spammers are getting clever because people have started to check the link by hovering over it, so they use the real address, but change it using javascript. </p> It actually tries to take you to http://www.hsbc.co.uk.es33.info</p>
Get those, Nationwide and Bank of Scotland in me work e-mails on a daily basis. Don't have an account with any of them. Dodgy fckers.
The proper HSBC link is this http://www.hsbc.co.uk/1/2/personal/internet-banking Your bank will never send you email asking for you to confirm your details, and if you do get such an email, then use your normal link from your favourites to access the site rather than any link you've been sent. If in doubt contact your bank.
Never ever click any bank emails you receive that are like this. If there is a security issue the bank will always call or write. They will never send emails asking you to sign in. Its the retards that do click that make it worthwhile for the spammers. If people just stopped clicking links in spam they would become worthless and we would get less.
Don't think I made my point properly. </p> The address the link leads to starts - http://www.hsbc.co.ukHow can they do that?</p>
RE: Don't think I made my point properly. Because when you have a domain name, say es33.info, you can have any server names underneath there. Normally you just have www, but there is nothing to stop you having anything at all. The resolution works backwards, so it finds .info, then es33.info, then uk.es33.info etc. So it never actually points to hsbc at all. </p> http://www.hsbc.co.uk.es33.info </p>
They can even send an email to you from your email address ....cunning people...report them immediatly...and dont ever open them again....certainly dont give them any information....!!!!!
RE: Don't think I made my point properly. They can do most things with email. I worked for Barclays for 12 years, always report it and even send copies to your banks head office, as they do have dedicated teams dealing with this sort of thing
Also You can set up wildcard dns, which will catch anything at all underneath the top level domain. This means that anything underneath es33.info will be sent to the main website, which means you don't even need to set specific servers up.</p> For example</p> http://****.off.windy.es33.info/</p> will work, although don't click that cos it will take you to their dodgy site.</p>