Seen a scammer? Been caught out? Let the world know so they don't get burned. Add information if you see one that's already been logged - scammers move quickly and change details often to avoid detection. Details you log here will be in major search engines within an hour or two.Please Like, Share, Tweet etc. to spread the word.
Medina, OH, United States
| ANOTHER SCAMMER IMPERSONATING USAA CREDIT UNION. THIS EMAIL DOMAIN LOCATED IN HONG KONG |
MalWare, Trojans, Virus payloads
|Email Addressemail@example.com ⇒|
|Alternate Email||imsantv71.netvigator.com ⇒|
|Alternate Emailfirstname.lastname@example.org ⇒|
Subject: USAA: Confirm Your Pending E-Payment
from "usaa" sun may 1 21: 56:39 2016
received-spf: none (domain of usaa1.com does not designate permitted sender hosts)
authentication-results: mta1265.mail.ne1.yahoo.com from=usaa1.com; domainkeys=neutral (no sig); from=usaa1.com; dkim=neutral (no sig)
received: from [22.214.171.124] ([126.96.36.199:58931] helo=[192.168.100.233])by smtpout.cincibell.syn-alias.com (envelope-from
content-type: multipart/mixed; boundary="===============1278489975=="
date: Sun, 01 May 2016 17:56:39 -0400