Has someone offered you a huge sum of money or a valuable consignment? It's a 419 or advance fee fraud - find out how they work, and what to do to be safe.
#4927 by 126 REIG Fri Sep 12, 2008 2:30 pm
The following was found in another forum.
Warning !

If you receive an email purporting to be from a SYGMA BANK UK be warned. This is a well known Nigerian scam site and you should be warned. There is a real Sygma Bank UK, but the emails and details below are NOT from the legitimate bank. They are from a scammer impersonating them.

The following people are involved (all fake names):

Chung Puii ([email protected])Nigerian claiming to be a banker in Hong Kong, but actually is in Nigeria (see below).

StuartPophan ([email protected]) ([email protected]) ([email protected]) ([email protected]) ([email protected])

Here are their IP addressed:


SCAM ALERT !!!!


Chung Puii: Chinese Passport is FAKE / FALSE / FRAUDULENT.

Return-Path: <sygmabauk> Received: from rly-dd01.mx.aol.com (rly-dd01.mail.aol.com []) by air-dd05.mail.aol.com (v121_r2.12) with ESMTP id MAILINDD051-b5948c559f130f; Mon, 08 Sep 2008 12:59:53 -0400 Received: from blu0-omc2-s22.blu0.hotmail.com (blu0-omc2-s22.blu0.hotmail.com [65.55.111.97]) by rly-dd01.mx.aol.com (v121_r2.11) with ESMTP id MAILRELAYINDD013-b5948c559f130f; Mon, 08 Sep 2008 12:59:29 -0400 Received: from BLU134-W1 ([65.55.111.72]) by blu0-omc2-s22.blu0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959); Mon, 8 Sep 2008 09:59:29 -0700
Message-ID: <BLU134> Content-Type: multipart/alternative; boundary="_ba43924f-b341-4dc1-b248-6035bf646080_" X-Originating-IP: [212.100.69.11] NIGERIA From: Sygma Bank <confidential> Sender: <sygmabauk> To:
Subject: Account Information With Sygma Bank UK Date: Mon, 8 Sep 2008 12:59:29 -0400 Importance: Normal
MIME-Version: 1.0
X-OriginalArrivalTime: 08 Sep 2008 16:59:29.0212 (UTC) FILETIME=[41D707C0:01C911D4] X-AOL-IP: 65.55.111.97
X-AOL-SCOLL-SCORE:1:2:327108256:93952408 X-AOL-SCOLL-URL_COUNT:1
X-AOL-SCOLL-AUTHENTICATION: domain : blu0-omc2-s22.blu0.hotmail.com ; SPF_helo = n X-AOL-SCOLL-AUTHENTICATION: domain : sybonlie.com ; SPF_822_from = +

Return-Path: <chungpuii036> Received: from rly-mh12.mx.aol.com (rly-mh12.mail.aol.com []) by air-mh04.mail.aol.com (v121_r2.12) with ESMTP id MAILINMH043-61e48c54263108; Mon, 08 Sep 2008 11:19:12 -0400 Received: from blu0-omc2-s8.blu0.hotmail.com (blu0-omc2-s8.blu0.hotmail.com [65.55.111.83]) by rly-mh12.mx.aol.com (v121_r2.11) with ESMTP id MAILRELAYINMH121-61e48c54263108; Mon, 08 Sep 2008 11:18:59 -0400 Received: from BLU113-W31 ([65.55.111.71]) by blu0-omc2-s8.blu0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959); Mon, 8 Sep 2008 08:18:59 -0700
Message-ID: <BLU113> Content-Type: multipart/alternative; boundary="_c694be54-a886-4da9-a62f-771711bb163b_" X-Originating-IP: [212.100.69.11] NIGERIA !!!!!!!!! From: Cheung Pui <chungpuii036> To: < > Subject: RE: Banking Co-ordinates. Date: Mon, 8 Sep 2008 23:18:59 +0800 Importance: Normal
In-Reply-To: <ccb> References: <ccb> MIME-Version: 1.0
X-OriginalArrivalTime: 08 Sep 2008 15:18:59.0368 (UTC) FILETIME=[ ] X-AOL-IP: 65.55.111.83
X-AOL-SCOLL-SCORE:1:2:
X-AOL-SCOLL-URL_COUNT:1
X-AOL-SCOLL-AUTHENTICATION: domain : blu0-omc2-s8.blu0.hotmail.com ; SPF_helo = n X-AOL-SCOLL-AUTHENTICATION: domain : hotmail.com ; SPF_822_from = +

http://www.joewein.de/sw/419-bl-m.htm

http://www.419legal.org/fraudulent-...

http://db.aa419.org/fakebanksview.p...

http://www.419legal.org/419-introdu...

http://www.your-application.co.uk/n...

http://www.419scam.org/emails/2008-...

http://www.joewein.de/sw/dbl-update...

http://domain-ranges.com/sybonlie.com

Domain: sybonlie.com
Status: Active
Host IP Address: 84.18.204.33


Additional Server Information:
--14:09:08-- http://sybonlie.com/ => `index.html'
Resolving sybonlie.com... 84.18.204.33 Connecting to sybonlie.com|84.18.204.33|:80... connected. HTTP request sent, awaiting response... HTTP/1.1 400 Bad Request
Content-Length: 39
Content-Type: text/html
Date: Mon, 08 Sep 2008 18:09:07 GMT Connection: close
14:09:08 ERROR 400: Bad Request.


FAKE WEBSITE


NOW, CHECK THIS WEBSITE USED BY THE SCAMMERS: http://www.sygmonlbn.com


These criminals have established a website to make it appear legit ! Wow ! Now you know where part of the money they steal is being invested....not bad for a bunch of crooks.

YOU HAVE BEEN WARNED.

Advertisement

Who is online

Users browsing this forum: Majestic-12 [Bot] and 171 guests