Scam Money Transfers - Banks, Bank Managers

They now create wrong account, with wrong titles and references just to cheat users.


Then they send this kind of letter to users


Hello Cédric Walter,
I am DR. BENJAMIN DEBRAH a citizen of GHANA .I have in my bank the existence of a big amount of money that belongs to a customer, Mr. Daniel Walter and who happen to have the same surname as yours .The fund is now without any claim because Mr. Daniel died in a deadly earthquake in China in 2008 . I want your cooperation so as to make the bank send you the fund as the beneficiary and next of kin to the fund.
This transaction will be of a great mutual assistance to us. Send me your reply of interest so that I will give you the details .
Strictly send it to my private email account : This email address is being protected from spambots. You need JavaScript enabled to view it. or send me your email address to send you details of this transaction.
At the receipt of your reply, I will give you details of the transaction. And a copy of the Deposit certificate of the fund and also the incorporation certificate of the company that generated the fund .
Best regards,

Here is a copy


Don’t be a fool, it is just a scam made up to get money from you!

You might like also

I also get caught in the Spam infographics business
TechCrunch has an interesting article “the Truth about infographics” Turns out that those info graphics that are so popular these days are part of an incredibly sophisticated keyword-spamming operation! Which is convenient, because, honestly, we are all kind of getting a little tired of them. Technically, just add a rel="nofollow" to the href link provided (I change the link for Google Revenues Streams infographic) So that for sure my last info graphics published. But this one is really interesting. …
3457 Days ago
Hosts file protection
The hosts file is a computer file used by an operating system to map hostnames to IP addresses. This method is one of several methods used by an operating system to locate network nodes on a computer network. Spybot Search and Destroy is using this technique when you click on immunize button behind the scene. Found at Use this file to prevent your computer from connecting to selected internet hosts. This is an easy and effective way to protect …
3799 Days ago
I am a victim of HTTP Referrer attacks...
I look today at my statistics, trying to discover some strange URLs (maybe an attack, I recommend You to do it) or tracking Referrer of my visitors in order to see who is back linking me, or where someone is talking about me.I found 201 referrer coming from a famous hardcore movie site, 201? this is not a hazard. Going there for the sake of truth (;-)) I found that they are offering free porn images, video and I immediately …
5029 Days ago
Comment lutter contre le spam?
Definition: On défnit le spam comme étant l'envoi non solicité de mails à des centaines, des milliers ou des millions d'utilisateurs au hasard. Ces messages propose des biens matériels, des services financiers, des fichiers importants et même de la pornographie. Les technologies internet étant en perpétuelle évolution, le spam évolue en même temps. On a même vu des spammeurs attaquer des forums de discussions en y postant des messages sans rapport avec les sujets.Cette page va être constamment mise à …
5653 Days ago