Subject: CHASE Bank - Multiple Password Failures
Sender: <[email protected]>
To:
From: [email protected]
X-Eon-DM: dm35
Received: from server.jmpanswers.com (66.132.45.186 [66.132.45.186])by dm04.mta.everyone.net (EON-INBOUND) with ESMTP id dm04.43aa5229.94041bbfor < >; Wed, 11 Jan 2006 04:44:58 -0800 (PST)
from localhost (localhost [127.0.0.1]) (uid 99) by server.jmpanswers.com with local; Wed, 11 Jan 2006 07:44:52 -0500 id 0005A66A.43C4FDC4.000056CD
Return-Path: <[email protected]>
Content-Type: text/html
Date: Wed, 11 Jan 2006 07:44:52 -0500
Message-Id: <[email protected]>
Dear CHASE bank Member ,
CHASE Bank is devoted to keeping a safe environment for its community of consumers and producers. To guarantee the safety of your account, CHASE Bank deploys some of the most advanced security measures in the world and our anti-fraud units regularly screen the CHASE Bank database for suspicious activity.
We recently have discovered that multiple computers have attempted to log into your CHASE Bank Online Banking account, and multiple password failures were presented before the logons. We now require you to re-validate your account information to us. If this is not completed by January 07 2006, we will be forced to suspend your account indefinitely, as it may have been used for fraudulent purposes. We thank you for your cooperation in this manner.
In order to confirm your Online Bank records, we may require some specific information from you.
Please Click Here or on the link below to verify your account
http://www.chase.com/verification/update/
Thank you for your prompt attention to this matter. Please understand that this is a security measure meant to help protect you and your account.
We apologize for any inconvenience.
If you choose to ignore our request, you leave us no choice but to temporary suspend your account.
CHASE Bank Security Team
offending url:
http://www.erotik-basar.de/catalog/images/chase.com/chase.html made to look like chase bank web site.
pls. take note that I don't have any chase bank account but I still receive this email about thrice a week.
Last edited:





