Raw Source Code from the Email Header with Mail Exchange IP details
Domain Name Server architecture Who Is information providing IP addresses for Commercial Organisations that can provide Personal Identifiable Information. Note the NAMECHEAP (Domain Name Server), IMPERVA (Domain Denial of Service Protection) and AMAZON WEB SERVICES (Content Delivery Network) are hosting this criminal activity, as seen in the domain architecture (DNS RECORDS).
The email contains the following BODY TEXT:Hello Customer
I am Harry Harrington , a Crypto Investigating Agent from the Anti-Money Laundering Dept of FCA-IRS (AML). This is to inform you that your invested/lost funds have been recovered and are ready to be returned to you. Meanwhile, this is your recovery exceptional code# (OJI8123-V9). You are to send the code with your name to AML information department at this email (email@example.com) AML recovery officer to apply your refund process. Note: Please disregard if you are not a victim.
Our organization is assigned to refund the lost money found under your name, number, and email.
You are required to claim this amount within the next 48 hours.
To claim the amount, you have to validate some information. However, you must confirm that you were a Fraud (cryptocurrency) Fraud victim. After confirmation, we will tell you what to do to process your transaction back to you. If you have any questions, please forward them together with your proof.