scamFRAUDalert see it appropriate to issue this ALERT regarding LinkedIn.com. This is to warn individuals that it is un-advisable to post PROFESSIONAL, PERSONAL or DETAIL information on PUBLIC FORUMS and to exercise case and caution.
________________________________
Email Header Analysis
IP Address: 178.63.185.165 (static.165.185.63.178.clients.your-server.de)
IP Address Country: Germany
IP Continent: Europe
IP Address City Location:
IP Address Region:
IP Address Latitude: 51,
IP Address Longtitude: 9
Organization: Joao Filipe Santos Rebordao Neves
__________________________________
Email header by email header analysis (show/hide)
X-Apparently-To: scamFRAUDalert via 98.138.213.211; Thu, 04 Apr 2013 06:33:23 -0700
Return-Path: <forbes3@static.165.185.63.178.clients.your-server.de>
X-Yahoofilteredbulk: 178.63.185.165
Received-Spf: none (domain of static.165.185.63.178.clients.your-server.de does not designate permitted sender hosts)X-Ymailisg: 9evfIUgWLDu9Vw4mCDDFBeF5f4z6VlLFz9qxJMtdrD.x5CkvDIGZKUmz8YEYB8XzYvp
T4Vl499HRBhItJJ0KeFvapZz2WrZhevvzvKrh8aeznjm4n6BOlMtdnVZRpoI
8Vkfle6RKGMOzput5nEgrXftmsYwxWM_c9Fyw_E5 i8I6SZ6DNdU7k6aOCw7.Wu7UOujJaXjJ_MEUoAZnH_AD5IpHAmqPvf3Foso. TR95G5OQiSxDbX4F1Qktx4LbY2x55u6qH86lB4zsFjWozrtaj63rtxikADI9 xCesANm5I5adOP4CGW3pAtPHo6hBgPkMNOA3GKXtx5ZbkUQ40buvhKu5RqSQ tC7zTuHNtqKtX3piUpZpYlajGye.8y9b0bJlQF7Y6tESOXxlgR0xZdno.9.r T5FG2iVocPbndRGpYOoy.SFCE8cr9yqIGlDOFbSc2EOuwAkzRZ3fQiGpTK88 kJL_cHTt2h5qaHG3n_h5vWaBm9PuE5ey6m_HPvuyBj6pL29igwQ7MuQTJPcs o1PtyEcxftwswGWll18bxP7U9YaYbnuJhPBShXm8zxXcgIIawbzQViiElaR9 RzUxymhLVWgdXL16G61t8X8dBV.ygjEDoGuaLOmNO2d4qPT2aVCxp0OM.R3h Ox2oL5WGcZdkzFJ0l3pAfsBrM3T9A2iQAi5nuFOPXHnppGgQRl87hb_s2n9k BbX3WbSgYnlRLTZr1hIFtTMixK0LwctOsRm2tL9.Rz1IAvt5tTEnkNDsQ_eA Zo0ilgWTetJcYV8AdiC4f.S5THF2SuW7eXHt7S61m8hVUjE7.bcHWTuYBfaC g8INjCWW5vYodnpUZtrgXkoGWVi3zw3wRMFmW0YNzLVwPM.2GjcLBMYgsNQZ 72p4LF7bNz5CwbBnRni0nvNEpHrN16QZG3E0O0QC2DNOslhXmcgylwH9Hd9y 3fw7D3aZmiSWhXllbSPTaV9VNgWLC.uRamvkP52_niixzLQmt0btiHZvjK10 scmQ17y6JPa7jV6.vTpQWJhUXsOHptwqbCL94nIYhy9VlilrnLsQ8p4B9eL2 dLoQa9cluKNrvVkojMQi8fkfUANLb0WSxNS7xhJAjVLA0qh4otky7WF8983j Hl3q0GUz4wT0Tg410VZNbNwoDeUgOcgf7DArErw3_P3smbCBqE5xUbFQ8Nht o1q5jScX.Z492pMR0uklmZekBxsmz8cpJtljJ_X3nm28
X-Originating-Ip: [178.63.185.165]
Authentication-Results: mta1221.sbc.mail.gq1.yahoo.com from=static.165.185.63.178.clients.your-server.de; domainkeys=neutral (no sig); from=static.165.185.63.178.clients.your-server.de; dkim=neutral (no sig)
Received: from 127.0.0.1 (HELO static.165.185.63.178.clients.your-server.de) (178.63.185.165) by mta1221.sbc.mail.gq1.yahoo.com with SMTP; Thu, 04 Apr 2013 06:33:22 -0700
Date: Thu, 4 Apr 2013 15:33:22 -0600
From: “Brendan Richardson via LinkedIn” <forbes3@static.165.185.63.178.clients.your-server.de>
To: “scamFRAUDalert
Message-Id: <cd28b1_faa87e95.47d473@static.165.185.63.178.clients.your-server.de>
Subject: Brendan Richardson just sent you a direct message
Mime-Version: 1.0
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: 7bit
Content-Length: 1153
LinkedIn May Have Been Link to Internet Check Scam
Posted: Thursday, April 4, 2013 6:22 am
Jeff Stanton jeff@msgr.com
A Putnam County man contacted the sheriff’s office when he learned from his bank he was a victim of an Internet check scheme.
Donald Borreson, 105 Rose Creek Road, met with Capt. Anthony Frazier March 1, and told him he had been contacted by a prospective employer through the networking website, LinkedIn.
Southside Equipment Indulge Salon
Frazier’s report says Borreson thought he was being recruited by the Chugai Pharmaceutical Company of Japan as a U.S. representative. Borreson said the email communication with LinkedIn appeared to be legitimate.
Borreson was later contacted through email by a man identifying himself as John Ford. Borreson said Ford mailed him a check $1,495 with instructions on how to distribute the funds via money order.
Borreson told Frazier he deposited the check into his account at Regions Bank, and waited three days before attempting to withdraw the funds, but instead, learned his account was in arrears. He contacted Regions and was told the $1,495 check he received from Ford was forged.
Frazier told Borreson he would file a report, and received copies of all communications regarding the incident, including a copy of the bad check.
But he told Borreson there was little that could be done, because most likely, the people responsible for the fraud were outside the U.S.
On March 7, Borreson forwarded more information to Frazier, including email traffic, and a copy of another forged check from Ford.
Frazier noted the address on the copy of the mailing receipt was from Canada.
http://www.msgr.com/news/crime/article_553f53ee-9d11-11e2-b9b3-0019bb2963f4.html