<?xml version="1.0"?>
<News hasArchived="false" page="1" pageCount="1" pageSize="10" timestamp="Thu, 30 Apr 2026 19:36:36 -0400" url="https://beta.my.umbc.edu/groups/bethekey/posts.xml?tag=notice">
<NewsItem contentIssues="false" id="85396" important="false" status="posted" url="https://beta.my.umbc.edu/groups/bethekey/posts/85396">
<Title>Hacker Posing as Graduate Program Director - Phishing Scam</Title>
<Body>
<![CDATA[
    <div class="html-content"><p>Today the Security team at DoIT received reports of a phishing scam targeted at the Physics Department.  We have decided to make this a campus-wide announcement, as hackers could potentially send this email out to students, or other faculty and staff; compromising their safety.</p><p>This phishing email content is as follows:</p><p>“From: <a href="mailto:heperezufl.edu@gmail.com">heperezufl.edu@gmail.com</a>&gt;</p><p>Hello. Are you available?</p><p>Please, I need your assistance urgently</p><p>Dr. Theodosia Gougousi</p><p>Professor</p>
    <p>Graduate Program Director </p>
    <p>Department of Physics</p>
    <p>University of Maryland, Baltimore County</p>
    <p>Office:</p>
    <p>Physics”</p><p>There are many characteristics that lend to this email being considered a phishing email; for example, the vague nature of the email content, coupled with the unknown and suspicious sender. </p>
    <p>However, the biggest red flag here is the hacker posing as a trusted entity. Here the hacker uses a specific form of phishing known as spear phishing to target specific members of the Physics Department. Hackers often gather information about organizations in order to make their phishing scams more personal and believable. Here, the hacker impersonates the Graduate Program Director in order to target staff within this department with the intention that they’d reveal confidential information. </p><p>If you receive this email, please be aware of its malicious nature and do NOT reply to it. Replying to this email could further engage the hacker in hopes that you’ll reveal sensitive information such as your location; which will compromise your safety.</p><p>The DoIT security group is fully aware of this phishing email and is currently working on fixing the issue. </p><p>If you receive this email or one with related content, please forward it to <span><em><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo">security@umbc.edu</a> </em>with full headers (directions here:<em> </em></span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo">https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</a>) delete the email immediately.  If you feel your information or safety has been violated in any way, you are encouraged to call UMBC Police at (410) 455-5555.  </p><p>For more information regarding phishing and spam FAQs, please see the</p>
    <p><em>PHISHING/SPAM FAQS </em>section of <em>itsecurity.umbc.edu.</em></p></div>
]]>
</Body>
<Summary>Today the Security team at DoIT received reports of a phishing scam targeted at the Physics Department.  We have decided to make this a campus-wide announcement, as hackers could potentially send...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/85396/guest@my.umbc.edu/3bf03328889eaef29a9716630544947e/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="bethekey">Be the Key</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/bethekey</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/original.jpg?1507133129</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/large.png?1507133129</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/medium.png?1507133129</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/small.png?1507133129</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxsmall.png?1507133129</AvatarUrl>
<Sponsor>Be the Key</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 15 Jul 2019 10:56:41 -0400</PostedAt>
<EditAt>Mon, 15 Jul 2019 11:29:34 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="84980" important="false" status="posted" url="https://beta.my.umbc.edu/groups/bethekey/posts/84980">
<Title>"Department Admin" Phishing Scam</Title>
<Body>
<![CDATA[
    <div class="html-content">
    
    
    <p>This past week, UMBC users have reported an increase in the occurrence of a particular phishing attack from a specific domain. This phishing email content is as follows:</p>
    <p><br></p>
    <p>“From: UMBC <a href="mailto:noreply@umbc.edu">noreply@umbc.edu</a> <a href="mailto:ctirrell@tds.net">ctirrell@tds.net</a> &lt;<a href="mailto:ctirrell@tds.net">ctirrell@tds.net</a>&gt;<br>
    Date: Thu, Jun 13, 2019 at 6:35 PM<br>
    Subject: UMBC<br>
    To:<span> </span></p>
    <p><br>
    Greetings.<br>
    <br>
    A private message has been sent to you by the Admin department. Click <a href="hxxps://www.umbc.edu/">hxxps://www.umbc.edu/</a> and view your message.<br>
    <br>
    Sign.<br>
    HEAD of the department”</p>
    <p>(<em>This link has been edited so that in longer points to the suspicious web page</em>)</p>
    <p> </p>
    <p>There are many characteristics that lend to this email being considered a phishing email; for example, the vague nature of the email content, coupled with the suspicious source domain and ambiguous signature are red flags when receiving unsolicited emails. In addition to this, hackers often gather information about organizations in order to make their phishing scams more personal and believable. This phishing email in particular was targeted at UMBC faculty and staff where the content of the email presented as being from a trusted entity (head of the department); something phishers often do to scam victims into offering sensitive information, or clicking on malicious links.</p>
    <p><br></p>
    <p>If you receive this email, please be aware of its malicious nature and do not click on the link as it points to an unverified web page. The DoIT security group is fully aware of this phishing email and is currently working on fixing the issue.<span> </span></p>
    <p><br></p>
    <p>If you receive this email or one with related content, please forward it to <a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span><em>security@umbc.edu</em></span></a>and delete the email immediately.  If you feel your information has been violated in any way, you are encouraged to call UMBC Police at (410) 455-5555.  </p>
    <p><br></p>
    <p>For more information regarding phishing and spam FAQs, please see the</p>
    <p><em>PHISHING/SPAM FAQS </em>section of <em>itsecurity.umbc.edu.</em></p></div>
]]>
</Body>
<Summary>This past week, UMBC users have reported an increase in the occurrence of a particular phishing attack from a specific domain. This phishing email content is as follows:       “From: UMBC...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/84980/guest@my.umbc.edu/b42c08767885e65d3571283ddc21e2b5/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="bethekey">Be the Key</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/bethekey</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/original.jpg?1507133129</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/large.png?1507133129</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/medium.png?1507133129</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/small.png?1507133129</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxsmall.png?1507133129</AvatarUrl>
<Sponsor>Be the Key</Sponsor>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 14 Jun 2019 11:45:31 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="84745" important="false" status="posted" url="https://beta.my.umbc.edu/groups/bethekey/posts/84745">
<Title>"Part-Time Job Opportunity" Phishing Scam</Title>
<Body>
<![CDATA[
    <div class="html-content"><p>Recently, UMBC users have reported the increased receipt of a specific phishing attack stemming from a particular domain. The phishing email content is as follows:</p>
    <p><br></p>
    <p>“From: <strong>Guthrie, Melinna</strong> &lt;<a href="mailto:Melinna.Guthrie@stonybrookmedicine.edu">Melinna.Guthrie@stonybrookmedicine.edu</a>&gt;</p>
    <p>Date: Fri, May 24, 2019 at 8:48 AM</p>
    <p>Subject: EARN MORE /PART TIIME JOB OPPORTUNITY</p>
    <p>To:<span> </span></p>
    <p><span> </span>       Customer Impact Services, secret survey company is currently hiring people from all over USA/CANADA to visit local stores as a shopper and test customer service professionalism while you earn commission of $300 flat on each visit which does not take more than an hour.</p>
    <p><span> </span></p>
    <p>You will be given funds to visit a store and pretend as a normal customer while you make purchases and take note of the quality of service as well as environment after which you will give a short report or feed back to the company for business development and customer service improvement decisions via email and earn your commission of $300 per visit.Usually, you will have 2 visits in a week and make $600 or more in a week. I am giving assurance over the legitimacy of this company.</p>
    <p><br></p>
    <p>Note:</p>
    <p>Only local stores are given, no traveling required</p>
    <p>You do not have to pay any money to begin, you'll rather be making money from home</p>
    <p>No rigorous process in registering and commencement of assignment(s)</p>
    <p>1) Shopper take personal satisfaction in watching service levels rise knowing that they played an instrumental part in that improvement.</p>
    <p><span> </span></p>
    <p>2) Shopper know the importance of following directions, they read and follow each client's evaluation criteria to the letter.</p>
    <p>**To register</p>
    <p>[&lt;<a href="hxxps://docs[.]google[.]com/forms/d/1wab3UlNppQepch_ApuXxGYyJWIa6mwCrOthbe0nThnI&amp;gt">hxxps://docs[.]google[.]com/forms/d/1wab3UlNppQepch_ApuXxGYyJWIa6mwCrOthbe0nThnI&gt</a>;]”</p>
    <p><br></p>
    <p>This phishing email is a particularly malicious one owing to number of factors; these include the professional format and grammar, the believable content of the email, as well as the presence of apparently legitimate links and source address. The DoIT security group is aware of the phishing scam and is currently investigating the issue.</p>
    <p>Due to the fact that the links contained within the email are google docs, we are unable to block or report them to google as malicious content. With that in mind, we ask that if you receive this email, please forward it to <a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span><em>security@umbc.edu</em></span></a><em>, </em>and to treat it as a malicious phishing attack. In order to mitigate potential damages, under no circumstances are users encouraged to click on the link or follow any instructions contained within it; upon receipt of the email please delete it immediately. If you have already done so and feel your personal information has been compromised in any way, please contact UMBC Police at <em>(410) 455-5555.<span> </span></em></p>
    <p>For more information regarding phishing and spam FAQs, please see the</p>
    <p><em>PHISHING/SPAM FAQS </em>section of <a href="mailto:itsecurity@umbc.edu" rel="nofollow external" class="bo"><span><em>itsecurity.umbc.edu</em></span></a><span><em>.</em></span></p><p><br></p><p><em><u>**This link has been altered so that it is unable to be clicked and directed to a malicious website or download any malicious software to your machine.</u></em></p></div>
]]>
</Body>
<Summary>Recently, UMBC users have reported the increased receipt of a specific phishing attack stemming from a particular domain. The phishing email content is as follows:       “From: Guthrie, Melinna...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/84745/guest@my.umbc.edu/3ada3e12c6974fe0fd1076536de76b76/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="bethekey">Be the Key</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/bethekey</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/original.jpg?1507133129</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/large.png?1507133129</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/medium.png?1507133129</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/small.png?1507133129</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxsmall.png?1507133129</AvatarUrl>
<Sponsor>Be the Key</Sponsor>
<PawCount>8</PawCount>
<CommentCount>1</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 24 May 2019 13:00:51 -0400</PostedAt>
<EditAt>Fri, 14 Jun 2019 11:47:58 -0400</EditAt>
</NewsItem>

</News>
