Så sidder man her og nyder sommerferien i et land langt langt væk, og denne e-mail tikker ind.
---------- Forwarded message ---------- From: Abuse Team - EasySpeedy.com <abuse@easyspeedy.com> Date: 2012/7/19 Subject: Fwd: Takedown request for phishing site hosted at xx.xxx.xxx.xx IP To:
----- Forwarded Message ----- > I am investigating a URL > (hXXp://frederikvonderosten.dk/cxe/direct.php), the content of which > is being hosted by yourselves (xx.xxx.xx.xx IP) > > The site is hosting content that resembles our live banking site > (hXXps://personal.co-operativebank.co.uk/CBIBSWeb/start.do), and we > have received reports regarding phishing emails requesting > unsuspecting individuals to go to the site and update their security > details (part of the scam to collect account information from > customers of The Co-operative Bank, a UK based bank). > > Could you please investigate the website with a view to removing the > copyrighted content if my claim is upheld. > > Please also forward any related scripts and logs from the server that > you envisage will assist us in our enquiries into this criminal > activity. > > Please confirm your actions by return email. > > > > -- > > > Mark Oakley > > > > > Threat and Vulnerability Technical Specialist > > IT Security > The Co-operative Banking Group > 1 st Floor, CIS Tower, Miller Street > Manchester M60 0AL > goodwithmoney.co.uk > > t: telefonnummer > e: email > > The Co-operative Banking Group operates through the brands The > Co-operative Bank, The Co-operative Insurance, The Co-operative > Investments, The Co-operative Asset Management, Britannia, Platform > and smile the internet bank > > Proud to be the Europe's Most Sustainable Bank - FT sustainable bank > awards 2011
____
Hvad fanden gør jeg her? Jeg har disabled mine sites i databasen, men det løser jo selvfølgelig ikke mit problem.
Nogle foreslog til en lidt forskrækket iværksætter?