| 
 
 | 
joewein.de LLC 
fighting spam and scams on the Internet 
 | 
 | 
"419" Scam – Advance Fee / Fake Lottery Scam
The so-called "419" scam is a type of fraud dominated by criminals from Nigeria and other countries in Africa. Victims of the scam are promised a large amount of money, such as a lottery prize, inheritance, money sitting in some bank account, etc.
Victims never receive this non-existent fortune but are tricked into sending their money to the criminals, who remain anonymous. They hide their real identity and location by using fake names and fake postal addresses as well as communicating via anonymous free email accounts and mobile phones. 
Keep in mind that scammers DO NOT use their real names when defrauding people.
The criminals either abuse names of real people or companies or invent names or addresses.
Any real people or companies mentioned below have NO CONNECTION to the scammers!
Read more about such scams here or in our 419 FAQ. Use the Scam-O-Matic to verify suspect emails.
Click here to report a problem with this page.
 
 
Some comments by the Scam-O-Matic about the following email:
 -  This email message is a 419 scam. Please see our 419 FAQ for more details on such scams. 
 
Fraud email example:
From: "ATM CARD DEPARTMENT.."<loriyounglay@yahoo.com> 
Date: Sat, 28 Aug 2010 16:33:39 -0700 
Subject: ATM CARD PAYMENT CENTRE. 
 
 
O programa antispam que roda em nosso servidor "maq01.crcrj.org.br", 
identificou essa mensagem como um possível spam. Caso não se trate de spam 
favor seleciona-la e clicar no botão "learn Ham" no canto superior esquerdo 
da tela. Se houver dúvidas entre em contato conosco através do email 
informatica@crcrj.org.br não esquecendo de colocar no corpo da mensagem 
o quadro abaixo para que possamos analisar os itens pontuados e fazer as devidas 
manutenções se necessário. 
 
Análise da Mensagem:   (15.1 points, 6.8 required) 
 
 pts rule name              description 
---- ---------------------- -------------------------------------------------- 
 0.9 RCVD_IN_PBL            RBL: Received via a relay in Spamhaus PBL 
                            [82.128.7.17 listed in zen.spamhaus.org] 
 0.9 RCVD_IN_SORBS_DUL      RBL: SORBS: sent directly from dynamic IP address 
                            [82.128.7.17 listed in dnsbl.sorbs.net] 
 1.1 DNS_FROM_OPENWHOIS     RBL: Envelope sender listed in bl.open-whois.org. 
 3.5 BAYES_99               BODY: Bayesian spam probability is 99 to 100% 
                            [score: 1.0000] 
 1.2 FH_DATE_PAST_20XX      The date is grossly in the future. 
 0.1 SUBJ_ALL_CAPS          Subject is all capitals 
 1.9 DATE_IN_FUTURE_06_12   Date: is 6 to 12 hours after Received: date 
 2.3 FORGED_YAHOO_RCVD      'From' yahoo.com does not match 'Received' headers 
 1.5 MILLION_USD            BODY: Talks about millions of dollars 
 0.6 US_DOLLARS_3           BODY: Mentions millions of $ ($NN,NNN,NNN.NN) 
 0.1 RDNS_DYNAMIC           Delivered to trusted network by host with 
                            dynamic-looking rDNS 
 0.8 MSOE_MID_WRONG_CASE    MSOE_MID_WRONG_CASE 
 0.1 FORGED_MUA_OUTLOOK     Forged mail pretending to be from MS Outlook 
-0.0 AWL                    AWL: From: address is in the auto white-list 
 
 
 
 
 | 
Anti-fraud resources: