MIJN Security Partner.
Placotiweg 2K
4131 NL Vianen (Netherlands)
You are the proud hoster of alpacasvomhahnerfeld.de, which resolves to 185.41.127.3. This domain is the landing domain for a phishing email targeting USAA members.
"Dear Customer,
Placotiweg 2K
4131 NL Vianen (Netherlands)
You are the proud hoster of alpacasvomhahnerfeld.de, which resolves to 185.41.127.3. This domain is the landing domain for a phishing email targeting USAA members.
"Dear Customer,
Your account has been locked due to an update in our
security features, we were unable to update your account. For your protection,
online access to your account will remain locked until we properly verify your
identity.
To re-instate your access, view your account below to
start the update process."
Good try. You even go as far as embedding USAA content (usaa.com) into the email. There is even a twitter.com link, of all things. Very good try.
Farther down in the email you try to distance yourself from pretending to be the USAA:
"USAA means United Services Automobile Association and its insurance, banking, investment and other companies . Banks Member FDIC."
The email "from" is "foi at gkclasses.com" which is entirely irrelevant.Except that the email originated out of 104.239.173.146, which is a Rackspace IP (hoster of gkclasses.com).
This was the weakest phish I've seen in a long time. If this was you, Bearded Michiganite and neighbor of the beast, then I am disappointed. That AMEX phish you did was a Rembrandt compared to this rubbish.
Received: from [104.239.173.146] ([127.0.0.1]) by gkclasses.com with Microsoft SMTPSVC(7.5.7601.17514);
Wed, 1 Mar 2017 14:03:18 +0000
boundary="===============1676980232=="
There was even a facebook link: USAA?EID=3D87909-0411_body haha.
What does Status=CONNECT mean at ICANN though? That's pretty clever.