![]() |
Is there a paycom Phishing / virus trojan going around?
i just got an email with a dodgy ZIp with an .Exe inside that appears forged from [email protected]
X-Persona: <spamarrest> Return-Path: <> X-Original-To: spanno Delivered-To: [email protected] Received: from m12 (m12.spamarrest.com [10.1.1.12]) by m12.spamarrest.com (Postfix) with ESMTP id D03F4138C61 for <spanno>; Thu, 5 Jan 2006 15:12:11 -0800 (PST) Delivered-To: [email protected] Received: (qmail 72593 invoked by uid 1017); 5 Jan 2006 23:09:16 -0000 Delivered-To: [email protected] Received: (qmail 72590 invoked from network); 5 Jan 2006 23:09:16 -0000 Received: from 66.148.205.238.nw.nuvox.net (HELO ?192.168.0.1?) (66.148.205.238) by 64.237.48.163 with SMTP; 5 Jan 2006 23:09:16 -0000 From: "Paycom Support" <[email protected]> To: <dan@********.com> Subject: Payment Receipt Date: Thu, 5 Jan 2006 23:09:46 -0500 MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="----=_NextPart_73185B1945048E193130" X-Priority: 3 X-SA-Poll-Id: 1136502731243..1136502556.72596.budha.ptekcom.com. .3..1136520586000 X-SA-USERIDNR: 250747 Received-SPF: unknown(paycom.net: domain uses a mechanism not recognized by this client) X-SA-MPREASON: sender enabled Message-Id: <[email protected]> Dear customer. Transaction and Billing Services.zip |
I wouldn't be surprised at all. The volume of phishmails are getting out of hand.
|
All times are GMT -7. The time now is 04:53 AM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123