Monday, October 14, 2013

China Still Owes $100 Million in American Debts And Refuses To Pay

Charlotte, N.C. – Oct. 15, 2013 – A North Carolina-based manufacturer is calling foul today over inflammatory statements Chinese leaders made in U.S. media outlets Monday that demanded an immediate resolution to government debt ceiling discussions while China still owes hundreds of millions of dollars to American-owned businesses.

http://www.chem.info/news/2013/10/china-still-owes-100-million-american-debts-and-refuses-pay#.UlydE1Ckp-c


#NCFraud

China Still Owes $100 Million in American Debts And Refuses To Pay

Charlotte, N.C. – Oct. 15, 2013 – A North Carolina-based manufacturer is calling foul today over inflammatory statements Chinese leaders made in U.S. media outlets Monday that demanded an immediate resolution to government debt ceiling discussions while China still owes hundreds of millions of dollars to American-owned businesses.

http://www.chem.info/news/2013/10/china-still-owes-100-million-american-debts-and-refuses-pay#.UlydE1Ckp-c


#NCFraud

New Microsoft Vulnerabilities



Microsoft -- .Net Framework The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT, and .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5, allow remote attackers to execute arbitrary code via a crafted OpenType font (OTF) file, aka "OpenType Font Parsing Vulnerability." 2013-10-09 9.3 CVE-2013-3128

Microsoft -- windows_7 The DSA_InsertItem function in Comctl32.dll in the Windows common control library in Microsoft Windows XP SP2, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly allocate memory, which allows remote attackers to execute arbitrary code via a crafted value in an argument to an ASP.NET web application, aka "Comctl32 Integer Overflow Vulnerability." 2013-10-09 10.0 CVE-2013-3195

Microsoft -- windows_7 The USB drivers in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allow physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability." 2013-10-09 7.2 CVE-2013-3200

Microsoft -- .Net Framework Microsoft .NET Framework 2.0 SP2, 3.5, 3.5 SP1, 3.5.1, 4, and 4.5 does not properly parse a DTD during XML digital-signature validation, which allows remote attackers to cause a denial of service (application crash or hang) via a crafted signed XML document, aka "Entity Expansion Vulnerability." 2013-10-09 7.8 CVE-2013-3860

Microsoft -- .Net Framework Microsoft .NET Framework 2.0 SP2, 3.5, 3.5 SP1, 3.5.1, 4, and 4.5 allows remote attackers to cause a denial of service (application crash or hang) via crafted character sequences in JSON data, aka "JSON Parsing Vulnerability." 2013-10-09 7.8 CVE-2013-3861

Microsoft -- Internet Explorer Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." 2013-10-09 9.3 CVE-2013-3871

Microsoft -- Internet Explorer Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3873, CVE-2013-3882, and CVE-2013-3885. 2013-10-09 9.3 CVE-2013-3872

Microsoft -- Internet Explorer Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3872, CVE-2013-3882, and CVE-2013-3885. 2013-10-09 9.3 CVE-2013-3873

Microsoft -- Internet Explorer Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." 2013-10-09 9.3 CVE-2013-3874

Microsoft -- Internet Explorer Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." 2013-10-09 9.3 CVE-2013-3875

Microsoft -- windows_7 Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Use After Free Vulnerability." 2013-10-09 7.2 CVE-2013-3879

Microsoft -- windows_7 win32k.sys in the kernel-mode drivers in Microsoft Windows 7 SP1 and Windows Server 2008 R2 SP1 allows local users to gain privileges via a crafted application, aka "Win32k NULL Page Vulnerability." 2013-10-09 7.2 CVE-2013-3881

Microsoft -- Internet Explorer Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3872, CVE-2013-3873, and CVE-2013-3885. 2013-10-09 9.3 CVE-2013-3882

Microsoft -- Internet Explorer Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3872, CVE-2013-3873, and CVE-2013-3882. 2013-10-09 9.3 CVE-2013-3885

Microsoft -- Internet Explorer Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." 2013-10-09 9.3 CVE-2013-3886

Microsoft -- windows_7 dxgkrnl.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows local users to gain privileges via a crafted application, aka "DirectX Graphics Kernel Subsystem Double Fetch Vulnerability." 2013-10-09 7.2 CVE-2013-3888

Microsoft -- excel Microsoft Excel 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Office 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Office for Mac 2011; Excel Viewer; Office Compatibility Pack SP3; and Excel Services and Word Automation Services in SharePoint Server 2013 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Excel Memory Corruption Vulnerability." 2013-10-09 9.3 CVE-2013-3889

Microsoft -- excel Microsoft Excel 2007 SP3, Excel Viewer, and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Excel Memory Corruption Vulnerability." 2013-10-09 9.3 CVE-2013-3890

Microsoft -- word Microsoft Word 2003 SP3 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Memory Corruption Vulnerability." 2013-10-09 9.3 CVE-2013-3891

Microsoft -- word Microsoft Word 2007 SP3 and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Memory Corruption Vulnerability." 2013-10-09 9.3 CVE-2013-3892

Microsoft -- windows_7 The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allow remote attackers to execute arbitrary code via a crafted CMAP table in a TrueType font (TTF) file, aka "TrueType Font CMAP Table Vulnerability." 2013-10-09 9.3 CVE-2013-3894


Microsoft -- Internet Explorer Use-after-free vulnerability in the CDisplayPointer class in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted JavaScript code that uses the onpropertychange event handler, as exploited in the wild in September and October 2013, aka "Internet Explorer Memory Corruption Vulnerability." 2013-10-09 9.3 CVE-2013-3897

New Microsoft Vulnerabilities



Microsoft -- .Net Framework The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT, and .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5, allow remote attackers to execute arbitrary code via a crafted OpenType font (OTF) file, aka "OpenType Font Parsing Vulnerability." 2013-10-09 9.3 CVE-2013-3128

Microsoft -- windows_7 The DSA_InsertItem function in Comctl32.dll in the Windows common control library in Microsoft Windows XP SP2, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly allocate memory, which allows remote attackers to execute arbitrary code via a crafted value in an argument to an ASP.NET web application, aka "Comctl32 Integer Overflow Vulnerability." 2013-10-09 10.0 CVE-2013-3195

Microsoft -- windows_7 The USB drivers in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allow physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability." 2013-10-09 7.2 CVE-2013-3200

Microsoft -- .Net Framework Microsoft .NET Framework 2.0 SP2, 3.5, 3.5 SP1, 3.5.1, 4, and 4.5 does not properly parse a DTD during XML digital-signature validation, which allows remote attackers to cause a denial of service (application crash or hang) via a crafted signed XML document, aka "Entity Expansion Vulnerability." 2013-10-09 7.8 CVE-2013-3860

Microsoft -- .Net Framework Microsoft .NET Framework 2.0 SP2, 3.5, 3.5 SP1, 3.5.1, 4, and 4.5 allows remote attackers to cause a denial of service (application crash or hang) via crafted character sequences in JSON data, aka "JSON Parsing Vulnerability." 2013-10-09 7.8 CVE-2013-3861

Microsoft -- Internet Explorer Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." 2013-10-09 9.3 CVE-2013-3871

Microsoft -- Internet Explorer Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3873, CVE-2013-3882, and CVE-2013-3885. 2013-10-09 9.3 CVE-2013-3872

Microsoft -- Internet Explorer Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3872, CVE-2013-3882, and CVE-2013-3885. 2013-10-09 9.3 CVE-2013-3873

Microsoft -- Internet Explorer Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." 2013-10-09 9.3 CVE-2013-3874

Microsoft -- Internet Explorer Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." 2013-10-09 9.3 CVE-2013-3875

Microsoft -- windows_7 Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Use After Free Vulnerability." 2013-10-09 7.2 CVE-2013-3879

Microsoft -- windows_7 win32k.sys in the kernel-mode drivers in Microsoft Windows 7 SP1 and Windows Server 2008 R2 SP1 allows local users to gain privileges via a crafted application, aka "Win32k NULL Page Vulnerability." 2013-10-09 7.2 CVE-2013-3881

Microsoft -- Internet Explorer Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3872, CVE-2013-3873, and CVE-2013-3885. 2013-10-09 9.3 CVE-2013-3882

Microsoft -- Internet Explorer Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3872, CVE-2013-3873, and CVE-2013-3882. 2013-10-09 9.3 CVE-2013-3885

Microsoft -- Internet Explorer Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." 2013-10-09 9.3 CVE-2013-3886

Microsoft -- windows_7 dxgkrnl.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows local users to gain privileges via a crafted application, aka "DirectX Graphics Kernel Subsystem Double Fetch Vulnerability." 2013-10-09 7.2 CVE-2013-3888

Microsoft -- excel Microsoft Excel 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Office 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Office for Mac 2011; Excel Viewer; Office Compatibility Pack SP3; and Excel Services and Word Automation Services in SharePoint Server 2013 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Excel Memory Corruption Vulnerability." 2013-10-09 9.3 CVE-2013-3889

Microsoft -- excel Microsoft Excel 2007 SP3, Excel Viewer, and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Excel Memory Corruption Vulnerability." 2013-10-09 9.3 CVE-2013-3890

Microsoft -- word Microsoft Word 2003 SP3 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Memory Corruption Vulnerability." 2013-10-09 9.3 CVE-2013-3891

Microsoft -- word Microsoft Word 2007 SP3 and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Memory Corruption Vulnerability." 2013-10-09 9.3 CVE-2013-3892

Microsoft -- windows_7 The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allow remote attackers to execute arbitrary code via a crafted CMAP table in a TrueType font (TTF) file, aka "TrueType Font CMAP Table Vulnerability." 2013-10-09 9.3 CVE-2013-3894


Microsoft -- Internet Explorer Use-after-free vulnerability in the CDisplayPointer class in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted JavaScript code that uses the onpropertychange event handler, as exploited in the wild in September and October 2013, aka "Internet Explorer Memory Corruption Vulnerability." 2013-10-09 9.3 CVE-2013-3897

Thursday, October 10, 2013

First Local Security Conference Thoughts A+ For the Association

OK, today I attended my first North Carolina Banks Association information security meeting.
First off I was a little excited, I have been to CarolinaCon, DefCon, BlackHat and many more.  I knew this wasn't going to be just like those or anywhere close to them. 

I was just happy to get out of my office with and speak with others in my line of work and learn some new things.  I did, we had two or three speakers that made the whole time worth it. I would also to include the staff and such that put it together many thanks to you and your efforts for the chance to go.

What I am about to say has nothing to do with my employer or any representations of my work place.  Hell my boss drove me there, don’t tell him but I enjoyed his company.

I would like to say that 85% of the information that came out was good advice for keeping up with standards, new applications, even new tech to semi proactive subjects.

I would have to say most of us geeks get no time together and speak and reach out with other IT people in our field. You want us to come up with the solutions for the work place and be able to prevent the circumvent hackers/blackhats or at least have plans in place with policies to handle certain emergency’s. You know we are no different than your Sales, Management Teams, and etc. It just seems like we are last at the line for any gatherings to where we feel comfortable and can speak and dress like we want too in a relaxed environment to exchange ideas and new information.













IT is incorporated with Geeks, Nerds, Strangers, etc.  that have a strange understanding of technology that no one else does “No this is not a manifesto LOL” and I am fine with that. I am so lucky to have a work place that semi-understands this.  A real IT person that is in his/her prime that will take any mission on solo or not, they have gaming, brute forcing, and dropping honey boxes to see what happens when so to speak the Baking Soda hits the Vinegar, or builds a giant Tesla Coil just to watch what happens. 
It is the love of technology that drives us. Yes 50% of us are white hats trying to learn as much as we can. If you really want us at the top of the technology then help us by taking time to realize we might not make you cold hard cash, but we keep you losing billions.

I hope I get a chance next year to go; I would rather speak though for the simple reason of miss information on the latest technology and scams. I have several ideas on building of information sharing without everyone having to spend out a ton of money while we have up to date information at the same time.

One more thing I did not hear one thing about Fuzzing or the Crime Origination’s hiring black-hats selling software to create major SDK structures for selling on the black market just to take advantage of wires, ach’s or even id theft.  Heck they even left out Lulzsec. This was the damaging effort of the DDoS attacks for Op’s Operations via Occupy.  Also mention of Syslogging for free to see if someone is protecting your IDS/ASA/LDAP system which is free Open source projects.

Example, 1 Module New Business Plan for Organized Crime Industry.


First Local Security Conference Thoughts A+ For the Association

OK, today I attended my first North Carolina Banks Association information security meeting.
First off I was a little excited, I have been to CarolinaCon, DefCon, BlackHat and many more.  I knew this wasn't going to be just like those or anywhere close to them. 

I was just happy to get out of my office with and speak with others in my line of work and learn some new things.  I did, we had two or three speakers that made the whole time worth it. I would also to include the staff and such that put it together many thanks to you and your efforts for the chance to go.

What I am about to say has nothing to do with my employer or any representations of my work place.  Hell my boss drove me there, don’t tell him but I enjoyed his company.

I would like to say that 85% of the information that came out was good advice for keeping up with standards, new applications, even new tech to semi proactive subjects.

I would have to say most of us geeks get no time together and speak and reach out with other IT people in our field. You want us to come up with the solutions for the work place and be able to prevent the circumvent hackers/blackhats or at least have plans in place with policies to handle certain emergency’s. You know we are no different than your Sales, Management Teams, and etc. It just seems like we are last at the line for any gatherings to where we feel comfortable and can speak and dress like we want too in a relaxed environment to exchange ideas and new information.













IT is incorporated with Geeks, Nerds, Strangers, etc.  that have a strange understanding of technology that no one else does “No this is not a manifesto LOL” and I am fine with that. I am so lucky to have a work place that semi-understands this.  A real IT person that is in his/her prime that will take any mission on solo or not, they have gaming, brute forcing, and dropping honey boxes to see what happens when so to speak the Baking Soda hits the Vinegar, or builds a giant Tesla Coil just to watch what happens. 
It is the love of technology that drives us. Yes 50% of us are white hats trying to learn as much as we can. If you really want us at the top of the technology then help us by taking time to realize we might not make you cold hard cash, but we keep you losing billions.

I hope I get a chance next year to go; I would rather speak though for the simple reason of miss information on the latest technology and scams. I have several ideas on building of information sharing without everyone having to spend out a ton of money while we have up to date information at the same time.

One more thing I did not hear one thing about Fuzzing or the Crime Origination’s hiring black-hats selling software to create major SDK structures for selling on the black market just to take advantage of wires, ach’s or even id theft.  Heck they even left out Lulzsec. This was the damaging effort of the DDoS attacks for Op’s Operations via Occupy.  Also mention of Syslogging for free to see if someone is protecting your IDS/ASA/LDAP system which is free Open source projects.

Example, 1 Module New Business Plan for Organized Crime Industry.


Funny Phishing Post of the Day

FAKE EMAIL DO NOT USE

UN/ WORLD BANK COMPENSATION
PAYMENT UNIT
3 WHITEHALL COURT
LONDON, SW1A 2EL.
UNITED KINGDOM
Respected Beneficiary,
RE: UNITED NATIONS/ WORLD BANK COMPENSATION PAYMENT GBP 950,000.00
The United Nations Compensation Commission in Affiliation with the World Bank is using this medium to compensate all Victims of Natural Disaster and those Lottery winners who have not yet received their winning prizes/compensations due to corrupt officials of the lottery payment department. We have received so many complain about the widespread corruption and irregularities within the officials both in Government and Banking sector and within the Lottery organization. So many Lucky winners of the UK National Lottery, Irish Lottery, Coca Cola Lottery, FIFA World cup Lottery, Microsoft/Yahoo Lottery, Common Wealth Lottery, Shell Petroleum Lottery and Euro Million Lotteries have not received their winning prizes and compensations up till now.
The United Nation Compensation Commission is receiving a direct support from the World Bank and the United Kingdom government to compensate all Lottery winners and Victims of Natural Disaster who have not yet received their winning prizes/compensations due to corrupt officials in the Lottery organization and corrupt delivery agents who were suppose to deliver the winning prizes to the lucky winners. In most cases, these corrupt officials have diverted the lottery prizes into their own personal bank accounts. After the last auditing carried out by the United Nations senior auditors, we discovered that 58 % of lottery winners and Victims of Natural Disaster did not receive their winning compensations. After series of investigations, we discovered that some corrupt officials within the Lottery organization have diverted the lottery compensation into their own personal account.
The United Nations Compensation Commission is using this medium to apologize to all lottery winners and Victims of Natural Disaster who have not received their winning compensations. Your name and e-mail address appeared among the list of lottery winners/beneficiaries who have not yet received their winning compensations. Therefore, we are compensating you with the sum of GBP 950,000.00 Great British Pounds Sterling.
To claim your compensation fund you must stop any further communication with any office/ individuals and contact the Central Bank of India known as Reserve Bank of India through the help of British legal administrator under British High Commission India.
Please contact British administrator under British High Commission who is currently in India through his email address below so that he will help you to speed up the official procedure with the Reserve Bank of India as we have already told him about you.
THE PRINCIPALE ATTORNEY
BRITISH ACCREDITED ATTORNEY
SHANTIPATH CHANAKYAPURI
NEW DELHI - 110021
OFFICE HOURS: 0900-1700 HRS
CONTACT PERSON:  HON. BARRISTER ANTHONY COLLINS
PHONE NUMBER: 91-8377952174
You have to provide them with your information as stated below:
Your full Name:
 Home address:
Occupation:
Age and Sex:
 Contact Mobile Phone Number:
Regards,
Mrs. Patricia Williams
Coordinator

Funny Phishing Post of the Day

FAKE EMAIL DO NOT USE

UN/ WORLD BANK COMPENSATION
PAYMENT UNIT
3 WHITEHALL COURT
LONDON, SW1A 2EL.
UNITED KINGDOM
Respected Beneficiary,
RE: UNITED NATIONS/ WORLD BANK COMPENSATION PAYMENT GBP 950,000.00
The United Nations Compensation Commission in Affiliation with the World Bank is using this medium to compensate all Victims of Natural Disaster and those Lottery winners who have not yet received their winning prizes/compensations due to corrupt officials of the lottery payment department. We have received so many complain about the widespread corruption and irregularities within the officials both in Government and Banking sector and within the Lottery organization. So many Lucky winners of the UK National Lottery, Irish Lottery, Coca Cola Lottery, FIFA World cup Lottery, Microsoft/Yahoo Lottery, Common Wealth Lottery, Shell Petroleum Lottery and Euro Million Lotteries have not received their winning prizes and compensations up till now.
The United Nation Compensation Commission is receiving a direct support from the World Bank and the United Kingdom government to compensate all Lottery winners and Victims of Natural Disaster who have not yet received their winning prizes/compensations due to corrupt officials in the Lottery organization and corrupt delivery agents who were suppose to deliver the winning prizes to the lucky winners. In most cases, these corrupt officials have diverted the lottery prizes into their own personal bank accounts. After the last auditing carried out by the United Nations senior auditors, we discovered that 58 % of lottery winners and Victims of Natural Disaster did not receive their winning compensations. After series of investigations, we discovered that some corrupt officials within the Lottery organization have diverted the lottery compensation into their own personal account.
The United Nations Compensation Commission is using this medium to apologize to all lottery winners and Victims of Natural Disaster who have not received their winning compensations. Your name and e-mail address appeared among the list of lottery winners/beneficiaries who have not yet received their winning compensations. Therefore, we are compensating you with the sum of GBP 950,000.00 Great British Pounds Sterling.
To claim your compensation fund you must stop any further communication with any office/ individuals and contact the Central Bank of India known as Reserve Bank of India through the help of British legal administrator under British High Commission India.
Please contact British administrator under British High Commission who is currently in India through his email address below so that he will help you to speed up the official procedure with the Reserve Bank of India as we have already told him about you.
THE PRINCIPALE ATTORNEY
BRITISH ACCREDITED ATTORNEY
SHANTIPATH CHANAKYAPURI
NEW DELHI - 110021
OFFICE HOURS: 0900-1700 HRS
CONTACT PERSON:  HON. BARRISTER ANTHONY COLLINS
PHONE NUMBER: 91-8377952174
You have to provide them with your information as stated below:
Your full Name:
 Home address:
Occupation:
Age and Sex:
 Contact Mobile Phone Number:
Regards,
Mrs. Patricia Williams
Coordinator