<?xml version="1.0"?>
<News hasArchived="false" page="112" pageCount="242" pageSize="10" timestamp="Sat, 25 Apr 2026 16:11:21 -0400" url="https://beta.my.umbc.edu/groups/doit/posts.xml?page=112">
<NewsItem contentIssues="false" id="94672" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94672">
<Title>Webex Dial-in Service Restored</Title>
<Tagline>The dial in feature in Webex Meeting is now working agin</Tagline>
<Body>
<![CDATA[
    <div class="html-content">After working with Cisco's engineering team we have restored the dial in feature in Webex Meetings. This was restored around 10am this morning and all our testing appears positive.<div><br>If you continue to see problems dialing into Meetings please reach out and let us know.</div><div><br></div><div>Ray Soellner</div><div>DoIT - UMBC</div><div><a href="mailto:rays1@umbc.edu">rays1@umbc.edu</a></div><div>410-455-3256</div></div>
]]>
</Body>
<Summary>After working with Cisco's engineering team we have restored the dial in feature in Webex Meetings. This was restored around 10am this morning and all our testing appears positive.  If you...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94672/guest@my.umbc.edu/e7815e34b572820727f59d22b3cfb817/api/pixel</TrackingUrl>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology (DoIT)</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 05 Aug 2020 16:06:42 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94641" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94641">
<Title>Webex Dial-in Feature Outage</Title>
<Tagline>DoIT is working with Cisco on the call-in function outage</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p>DoIT has been made aware of a problem with the dial-in feature in Webex Meetings. The symptom is that when joining a meeting through the phone that users will receive an error of “You have dialed a call in number that is not supported for this meeting”.<br><br><br>Our vendor, Cisco, is working on the problem now. As a work around, you may use the join audio by computer function which appears to be unaffected by the problem.</p><p><br></p><p>Updates will be posted as the problem is resolved. </p><p><br></p><p><br></p><p>Ray Soellner</p><p>DoIT - UMBC</p><p><a href="mailto:rays1@umbc.edu">rays1@umbc.edu</a></p><p>410-455-3256</p></div>
]]>
</Body>
<Summary>DoIT has been made aware of a problem with the dial-in feature in Webex Meetings. The symptom is that when joining a meeting through the phone that users will receive an error of “You have dialed...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94641/guest@my.umbc.edu/d0a1362e6992e9fd95f140dbb62ec072/api/pixel</TrackingUrl>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology (DoIT)</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 04 Aug 2020 12:44:31 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94634" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94634">
<Title>Account Data Breach: Dave</Title>
<Tagline>Data Breach On Digital Banking App</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>In June 2020,  Dave, a digital banking app, suffered a data breach. 7.5 million rows of data were leaked to the public on a hacking forum. The breach exposed individuals’ Personal Identifiable Information (PII) such as </span><span>names, dates of birth, encrypted social security numbers and passwords.</span></p><br><p><span>UMBC’s Division of Information Technology (DoIT) has been notified that over 20 UMBC accounts might have been affected by this breach. </span></p><p><span>The individuals who have been affected by the data breach were notified via their UMBC email and/or their alternate emails. If you do not have an alternate email listed on your UMBC account, we suggest that you create one, preferably different from your UMBC email account. </span></p><br><p><span>To link an alternate email account to your UMBC account follow the instructions below:</span></p><ol><li><p><span>Login to your myUMBC account: </span><a href="http://my.umbc.edu/account" rel="nofollow external" class="bo"><span>http://my.umbc.edu/account</span></a></p></li><li><p><span>Go to </span><a href="https://webadmin.umbc.edu/admin//Security/Setup/View" rel="nofollow external" class="bo"><span>https://webadmin.umbc.edu/admin//Security/Setup/View</span></a></p></li><li><p><span>Click </span><span>Account security setup</span></p></li><li><p><span>At the top of the page, enter your alternate email address</span></p></li><li><p><span>Scroll down to the bottom of the page and click </span><span>Update my security settings</span></p></li></ol><br><p><span>If you have a Dave account we suggest that you contact them to see if your information has been leaked. </span></p><br><p><span>The data about Dave was provided to the breach notification service Have I Been Pwned (HIBP) by </span><a href="https://dehashed.com/" rel="nofollow external" class="bo"><span>dehashed.com</span></a><span>.</span></p><br><p><span>For more information on Dave data breach visit:</span></p><br><p><a href="https://www.zdnet.com/article/tech-unicorn-dave-admits-to-security-breach-impacting-7-5-million-users/" rel="nofollow external" class="bo"><span>https://www.zdnet.com/article/tech-unicorn-dave-admits-to-security-breach-impacting-7-5-million-users/</span></a></p><br><p><a href="https://www.tomsguide.com/news/dave-data-breach" rel="nofollow external" class="bo"><span>https://www.tomsguide.com/news/dave-data-breach</span></a><span> </span></p><br><br><p><span>If you have any questions or concerns email us: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> </span></p><p><span>_________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><span>Forward it to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></div>
]]>
</Body>
<Summary>In June 2020,  Dave, a digital banking app, suffered a data breach. 7.5 million rows of data were leaked to the public on a hacking forum. The breach exposed individuals’ Personal Identifiable...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94634/guest@my.umbc.edu/09cd9a32f896cbc2706abcd515234137/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777132458</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/images/avatars/group/7/original.png?1777132458</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777132458</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777132458</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1777132458</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777132458</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1777132458</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777132458</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777132458</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 04 Aug 2020 10:34:58 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="94622" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94622">
<Title>Mothur is now Installed on Taki</Title>
<Tagline>New Bioinformatics Software is available</Tagline>
<Body>
<![CDATA[
    <div class="html-content">We have installed the Mothur software on the Taki cluster. Documentation on the software is available <a href="https://mothur.org/wiki/mothur_manual/" rel="nofollow external" class="bo">here</a>. This is available as a module on Taki.<div><br></div><div><br></div></div>
]]>
</Body>
<Summary>We have installed the Mothur software on the Taki cluster. Documentation on the software is available here. This is available as a module on Taki.</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94622/guest@my.umbc.edu/c9f49412a42699c6c23e74f2912e4338/api/pixel</TrackingUrl>
<Group token="hpcf">HPCF</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/hpcf</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/659/63ae3e64663572042ecdd0ef493c16e1/xsmall.png?1596736674</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/659/63ae3e64663572042ecdd0ef493c16e1/original.png?1596736674</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/659/63ae3e64663572042ecdd0ef493c16e1/xxlarge.png?1596736674</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/659/63ae3e64663572042ecdd0ef493c16e1/xlarge.png?1596736674</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/659/63ae3e64663572042ecdd0ef493c16e1/large.png?1596736674</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/659/63ae3e64663572042ecdd0ef493c16e1/medium.png?1596736674</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/659/63ae3e64663572042ecdd0ef493c16e1/small.png?1596736674</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/659/63ae3e64663572042ecdd0ef493c16e1/xsmall.png?1596736674</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/659/63ae3e64663572042ecdd0ef493c16e1/xxsmall.png?1596736674</AvatarUrl>
<Sponsor>HPCF</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/622/fd6db04cd5c83c72e26625f063595d2c/xxlarge.jpg?1596488936</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/622/fd6db04cd5c83c72e26625f063595d2c/xlarge.jpg?1596488936</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/622/fd6db04cd5c83c72e26625f063595d2c/large.jpg?1596488936</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/622/fd6db04cd5c83c72e26625f063595d2c/medium.jpg?1596488936</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/622/fd6db04cd5c83c72e26625f063595d2c/small.jpg?1596488936</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/622/fd6db04cd5c83c72e26625f063595d2c/xsmall.jpg?1596488936</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/622/fd6db04cd5c83c72e26625f063595d2c/xxsmall.jpg?1596488936</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 03 Aug 2020 17:13:07 -0400</PostedAt>
<EditAt>Mon, 03 Aug 2020 17:30:23 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="94553" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94553">
<Title>Phishing Emails from SurveyMonkey</Title>
<Tagline>The Survey Site Is Legitimate.  The Survey Is Not.</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>According to an article at </span><a href="https://www.infosecurity-magazine.com" rel="nofollow external" class="bo"><span>https://www.infosecurity-magazine.com</span></a><span>,  Abnormal Security recently discovered a new phishing campaign using malicious emails from a legitimate SurveyMonkey domain. A malicious actor is using this legitimate domain because it allows them to bypass most security filters. </span></p><br><p><span>Even though these emails are sent from the actual SurveyMonkey domain, the reply-to address is in a different domain. Within the email there is a hidden URL that appears as the text ‘Navigate to access statement’ with a message ‘Please do not forward this email as its survey link is unique to you.’”</span></p><br><p><span>Clicking on the link will redirect the user to a form asking for their Office 365 credentials such as email address and password. If the user’s information is entered into this malicious site, then the user’s account will be compromised.</span></p><br><p><span>The article states that the reason this attack is so effective is due to the use of a legitimate email sender, as well as concealing the malicious site URL and the description of the email being “unique” to every user.</span></p><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> and delete the message.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><p><span><br></span><span>For more information, please check out: </span></p><p><a href="https://www.infosecurity-magazine.com/news/surveymonkey-phishers-office-365/" rel="nofollow external" class="bo"><span>https://www.infosecurity-magazine.com/news/surveymonkey-phishers-office-365/</span></a></p><p><a href="https://abnormalsecurity.com/blog/abnormal-attack-stories-phishing-through-surveymonkey/" rel="nofollow external" class="bo"><span>https://abnormalsecurity.com/blog/abnormal-attack-stories-phishing-through-surveymonkey/</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><br><br></div>
]]>
</Body>
<Summary>According to an article at https://www.infosecurity-magazine.com,  Abnormal Security recently discovered a new phishing campaign using malicious emails from a legitimate SurveyMonkey domain. A...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94553/guest@my.umbc.edu/5750a760c5ff3d4c9e9d994a31d49ee0/api/pixel</TrackingUrl>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777132458</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/images/avatars/group/7/original.png?1777132458</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777132458</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777132458</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1777132458</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777132458</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1777132458</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777132458</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777132458</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 30 Jul 2020 16:37:43 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94550" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94550">
<Title>Recent Spear-phishing Emails</Title>
<Tagline>Faked Email Messages Looking For Your Phone Number</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>A new wave of Spear-phishing emails hit roughly 300 UMBC inboxes this weekend. An example is shown below, with the From field altered and the To field removed for privacy. There is no body in this particular email.</span></p><p><span>From: Forged Name &lt;<a href="mailto:name@gmail.com">name@gmail.com</a>&gt;</span></p><p><span>Date: Sat, Jul 25, 2020 at 9:26 AM</span></p><p><span>Subject: Send me your available text number?</span></p><p><span>To:</span></p><p><span> </span></p><p><span>This malicious email uses the name of a UMBC staffer in an attempt to appear credible. However, the Gmail address, unnatural-sounding subject line, and lack of body content are all clear red flags. More generally, be wary of emails from unverified sources with any urgent but unexplained request. Similar emails that were reported previously were precursors to gift card scams.</span></p><p><span>The best way to avoid these scams is to simply not respond. Instead, report suspicious emails by forwarding them to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. Include the full email headers by following the instructions at</span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>For more information on scams and phishing, please visit </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=36766495" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=36766495</span></a><span>.</span></p><br><span>To read more articles published by DOIT visit: </span><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>.</span></div>
]]>
</Body>
<Summary>A new wave of Spear-phishing emails hit roughly 300 UMBC inboxes this weekend. An example is shown below, with the From field altered and the To field removed for privacy. There is no body in this...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94550/guest@my.umbc.edu/cdf202fee9c64f4fbff01ee671da24d1/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777132458</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/images/avatars/group/7/original.png?1777132458</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777132458</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777132458</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1777132458</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777132458</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1777132458</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777132458</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777132458</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 30 Jul 2020 15:42:43 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="94549" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94549">
<Title>Fake Job Offers from Corestaff</Title>
<Tagline>UMBC Community Gets More Fake Job Offers</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Jobs phishing Alert: Corestaff</span></p><br><p><span>During the past week, DOIT has received several notifications of phishing emails impersonating Corestaff. Below is a sample message that was sent to many UMBC students. The To field was removed for privacy purposes.</span></p><br><p><span>From: </span><span>Corestaff Services</span><span> &lt;</span><span><a href="mailto:corestaffserviceshr@gmail.com">corestaffserviceshr@gmail.com</a></span><span>&gt;</span></p><p><span>Date: Wed, Jul 22, 2020 at 7:42 PM</span></p><p><span>Subject: JOB DESCRIPTION</span></p><br><br><p><span>Dear applicant,</span></p><p> </p><p><span>Thanks for getting back to us with your interest in the job position, </span><span>CORESTAFF SERVICES Inc®</span><span> is a privately held company within Allegis Group, the largest private talent management firm in the world. Our long-standing history and industry-leading position speak to our success in providing the IT staffing solutions, IT services, and talent management insight required for our clients to actualize ROI and sustain a truly competitive advantage in a fast-changing market. We have established successful relationships with thousands of companies, government agencies, and small entrepreneurial firms across all industries. </span></p><p> </p><p><span>COMMITMENT:</span><span> Our commitment to meeting our customers’ and consultants’ expectations is the foundation for building trust in our business relationships. Simply put, we foster an environment that demands integrity and accountability for results. To ensure our clients and consultants know exactly what they can expect from us, we make it our mission to hire smart, honest, and hardworking individuals who possess a great deal of pride in setting the bar high and keeping their word.</span></p><p> </p><p><span>JOB DESCRIPTION: </span><span>CORESTAFF SERVICES Inc® is seeking a production support analyst to support our client's production environment. This person will be responsible for analyzing, reporting, and ordering production supplies. This is a remote part-time job that does not deter you from doing any other. You just need a few hours of your time to do this weekly and you can have your own part of the work completed in t your leisure time in school or at home.</span></p><p> </p><p><span>SALARY/WAGES:</span><span> $300 Weekly.</span></p><p> </p><p><span>The successful candidate will need to be able to: </span></p><p><span>- Provide Quality communication etiquette skills and good organizational skills.</span></p><p><span>- Perform duties with accuracy, quality, and integrity.</span></p><p> </p><p><span>We will always email you guidelines and instructions to follow in getting your job done perfectly as soon as you start working. if you care to proceed with the job offer, get back to us with the information listed below so we can process your information as to consider it valid to commence working with us.</span></p><p> </p><p><span>NAME:</span></p><p><span>PHYSICAL CONTACT ADDRESS (PREFERRED MAILING ADDR)</span></p><p><span>CITY:</span></p><p><span>STATE:</span></p><p><span>ZIPCODE:</span></p><p><span>D.O.B:</span></p><p><span>GENDER:</span></p><p><span>MOBILE (Must be able to receive text): </span></p><p><span>PERSONAL EMAIL:</span></p><p><span>CURRENT JOB:</span></p><p> </p><p><span>We shall be contacting you as soon as we receive and validate this information.</span></p><p> </p><p><span>Kind Regards,</span></p><p> </p><p><span>Jasmine Orozco</span></p><p><span>HR Recruiting Dept.</span></p><p><span>Corestaff </span><span>Services Inc®</span></p><br><p><span>From addresses of Corestaff impersonator emails that we have received are listed below</span></p><ul><li><p><span>Corestaff Services</span><span> &lt;</span><a href="mailto:corestaffserviceshr@gmail.com" rel="nofollow external" class="bo"><span>corestaffserviceshr@gmail.com</span></a><span>&gt;</span></p></li><li><p><span>CORESTAFF SERVICES Inc®</span><span> &lt;</span><a href="mailto:corestaff@consultant.com" rel="nofollow external" class="bo"><span>corestaff@consultant.com</span></a><span>&gt; </span></p></li></ul><p> </p><p><span> </span><span>If you have received any message similar to the one listed above, </span><span>DO NOT RESPOND</span><span>. Please forward the message to  </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. Please attach the email headers, information on how to find the email headers can be found here: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>We have also received notification that students who have responded to this email have received checks. </span><span>DO NOT DEPOSIT THE CHECKS</span><span>, they are fake.</span></p><br><p><span>Students have also been asked for their Cash App, and other card information. </span><span>DON’T SEND YOUR FINANCIAL INFORMATION.</span><span> Listed below is a sample message from the impersonator asking for your financial information. For privacy purposes, the To field, and victim’s name have been removed.</span></p><br><p><span>From: </span><span>CORESTAFF SERVICES Inc®</span><span> &lt;</span><span><a href="mailto:corestaff@consultant.com">corestaff@consultant.com</a></span><span>&gt;</span></p><p><span>Date: Mon, Jul 27, 2020 at 11:54 AM</span></p><p><span>Subject: Further Information Required</span></p><br><br><p><span>Hello &lt;VICTIM NAME&gt; , </span></p><p><span> </span></p><p><span>I hope you are having a good day?</span></p><p><span> </span></p><p><span>Our external financial institution is in the process of adding your information to the payroll system where they will be sending funds for you to complete your weekly tasks/orders and your ($300) weekly earnings via Cash-app simply because it is fast (lets you get paid early), safe and reliable and it can be used anywhere Visa is accepted, both online and in stores.</span></p><p> </p><p><span>So, do you have Cash-app? Has it been verified? Do you have a cash-card too?</span></p><p><span> </span></p><p><span>If yes, kindly send in the details below to make us proceed.</span></p><p><span> </span></p><p><span>Account #</span></p><p><span>Routine #</span></p><p> </p><p><span>If you don't have Cash-app, kindly set it up, verify it, and order a cash-card as soon as you can today. It's free/</span></p><p><span> </span></p><p><span>I await your prompt response.</span></p><p><span> </span></p><p><span>Devon Baynard</span><span> </span></p><p><span>Sr. Recruiting &amp; Account Manager</span></p><p> </p><p><span>Corestaff Services Inc®</span></p><p> </p><p><span> </span><span>If you have received any message similar to the one listed above, </span><span>DO NOT RESPOND</span><span>. Please forward the message to  </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. Please attach the email headers, information on how to find the email headers can be found here: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span> By refusing to provide your financial information or depositing the checks, you might receive threats similar to the one listed below.</span></p><br><p><span><span><img src="https://lh6.googleusercontent.com/A-NUjqAeqe7OPtG-Q3wffvuHRTXLAVPTpUegUFhB4CI9fkTQq5P5kCBBG4sfKOItBw9DtuylCqdY9EInpk6xe6O4hzRbICt4FnUpIR5CcPUmDg9coeCusUOfuIp_Hi5q5rKZBs_5" width="375.5639097744361" height="757.3770491803278" style="max-width: 100%; height: auto;"></span></span></p><br><p><span>This threatening tone is often used by Scammers to strike fear into individuals which will often cause them to fall victim to scams. If you have received any threats, please send the screenshot to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. </span></p><br><br><p><span>More information on other job scams can be found here: </span><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a></p><br><p><span>For more information on scams and phishing handling, please visit</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=36766495" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=36766495</span></a><span> </span></p><br><p><span>For more information on how to spot a Scam, please visit</span></p><p><a href="https://itsecurity.umbc.edu/critical/?id=94345" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?id=94345</span></a></p><br><p><a href="https://itsecurity.umbc.edu/critical/?id=93891" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?id=93891</span></a></p><br><br></div>
]]>
</Body>
<Summary>Jobs phishing Alert: Corestaff   During the past week, DOIT has received several notifications of phishing emails impersonating Corestaff. Below is a sample message that was sent to many UMBC...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94549/guest@my.umbc.edu/db9ff1c2ef4e4f1424ced27f53d5342b/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777132458</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/images/avatars/group/7/original.png?1777132458</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777132458</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777132458</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1777132458</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777132458</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1777132458</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777132458</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777132458</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 30 Jul 2020 15:40:31 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94548" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94548">
<Title>WORK-FROM-HOME Phishing Email Scam</Title>
<Tagline>Job Scams, Checks, and Threats</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>UMBC continues to receive phishing email campaigns from a malicious actor pretending to be from either Cisco or Corestaff. This phishing email has the goal of not only getting users personal information but also to try and get them to cash a fraudulent check. An example of the email can be seen below:</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: willliams rolase &lt;<a href="mailto:rolasewillliams08@gmail.com">rolasewillliams08@gmail.com</a>&gt;</span></p><p><span>Date: Thu, Jul 9, 2020 at 2:22 AM</span></p><p><span>Subject: WORK FROM HOME</span></p><p><span>To: &lt; @umbc.edu&gt;</span></p><br><p><span>Dear Student,</span></p><br><p><span>We got your contact through your school database and I'm happy to inform you that our reputable company Cisco Systems Inc® is currently running a student empowerment program. This program is to help devoted and hardworking students secure a part time job which does not deter them from doing any other, you just need a few hours to do this weekly and with an attractive weekly wages.</span></p><br><p><span>KINDLY EMAIL BACK WITH YOUR PERSONAL EMAIL ADDRESS IF INTERESTED IN THIS JOB POSITION.</span></p><br><p><span>Best Regards,</span></p><br><p><span>willliams rolase</span></p><p><span>HR Manager/Consultant</span></p><p><span>Cisco Systems Inc®</span></p></td></tr></tbody></table></div><br><p><span>If the user responds to the initial message the malicious actor will then respond asking the user for more personal information like name, address, city, state, Zip code, date of birth, gender, phone number, personal email and current job. Which can be seen in the below:</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>Dear Applicant,</span></p><br><p><span>Thanks for getting back to us with your interest about the job position.</span></p><br><p><span>ABOUT US: Cisco systems® is a privately held company within Allegis Group, the largest private talent management firm in the world. Our long-standing history and industry-leading position speak to our success in providing the IT staffing solutions, IT services and talent management insight required for our clients to actualize ROI and sustain a truly competitive advantage in a fast-changing market. We have established successful relationships with thousands of companies, government agencies and small entrepreneurial firms across all industries.</span></p><br><p><span>COMMITMENT: Our commitment to meeting our customers’ and consultants’ expectations is the foundation for building trust in our business relationships. Simply put, we foster an environment that demands integrity and accountability for results. To ensure our clients and consultants know exactly what they can expect from us, we make it our mission to hire smart, honest and hardworking individuals who possess a great deal of pride in setting the bar high and keeping their word.</span></p><br><p><span>JOB DESCRIPTION: Cisco systems® is seeking a production assistance to provide analysis and support for our clients production environment. This person will act as an intermediary between our suppliers and our agents in order to reduce their workload. As an intermediary/liaison, you'll be ordering production supplies, analyzing and making reports. This is a part time job that does not deter you from doing any other. You just need a few hours of your time to do this weekly and you can have your own part of the work completed at your leisure time in school or at home.</span></p><br><p><span>HOURS OF WORK: The specific hours of work will vary each week but you will NOT be scheduled more than 6-8 hours per week.</span></p><br><p><span>SALARY/WAGE: $400 Weekly.</span></p><br><p><span>The successful candidate will need to be able to:</span></p><p><span>-Provide Quality communication etiquette skills and good organizational skills.</span></p><p><span>-Perform duties with accuracy, quality, and integrity.</span></p><p><span>-Strong attention to detail, while under pressure with frequent interruptions.</span></p><p><span>-Demonstrated ability to effectively coordinate multiple tasks and able to react to spontaneous changes in priorities.</span></p><br><p><span>We will always email/text you guidelines and instructions to follow in getting your job done perfectly as soon as you start working. if you care to proceed with the job offer, kindly get back to us with the information listed below so we can process your information as to consider it valid to commence working with us.</span></p><br><p><span>FULL NAME:</span></p><p><span>PHYSICAL CONTACT ADDRESS (NOT PO BOX):</span></p><p><span>CITY:</span></p><p><span>STATE:</span></p><p><span>ZIP CODE:</span></p><p><span>D.O.B:</span></p><p><span>GENDER:</span></p><p><span>MOBILE (Must be able to receive text) :</span></p><p><span>PERSONAL EMAIL:</span></p><p><span>CURRENT JOB:</span></p><br><p><span>We shall be contacting you as soon as we receive and validate this information.</span></p><br><p><span>Regards,</span></p><br><p><span>willliams rolase,</span></p><p><span>HR Manager/Consultant</span></p><p><span>Cisco Systems Inc®.   </span></p></td></tr></tbody></table></div><br><br><p><span>If the user responds with their personal information the scammer will then inform the user that they have been accepted to the job, but due to Covid-19 they cannot do a one-on-one interview. They inform that a check will arrive with enough to cover your wage and your first task.</span></p><br><p><span>If you do receive this or a similar scam, please DO NOT respond any further. If you have provided any banking or financial information, please notify your bank or financial institution immediately. If you have been sent a check, you should not attempt to cash or deposit it. If you have deposited a check already, please contact your bank and tell them that it may be part of a scam.</span></p><br><p><span>Once you stop cooperating with the scam, you may receive a text message from the scammers.  It may look something like:</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>Please be fully informed that this is a legitimate company and the HR department fully conducted a post survey before you were selected for this Employment.The company has put in maximum resources such as cost of shipment  of check to you and profiling. Under the company Employee policy you are required to proceed by returning all the costs of shipment and profiling you for this position to the sum of $400.  You are subjected to a lawsuit should you not return the company cost of shipment and profiling as you are responsible for the abrupt reject of this position.</span></p><p><span>We will provide you details of the method of payment shortly.  Please be aware that the company Attorney will in 24 hours profile  you before the law court should you not comply with this terms of policy. I hope that you understand.</span></p></td></tr></tbody></table></div><br><p><span>This is part of the scam and seems to be intended to scare you.  The real Cisco Systems doesn’t threaten legal action through text messaging and can afford to employ people who write grammatical sentences.</span></p><p><span><br></span><span>If you did receive this or any other email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Whether or not you responded to the scam, please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.  We will also keep track of any other information you submit about the scammers, such as phone numbers if you get a text message.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span><span><br></span><span><br></span></a><span>To read more tips on how to spot and avoid phishing scams:</span></p><p><a href="https://itsecurity.umbc.edu/critical/?id=93891" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?id=93891</span></a></p><p><a href="https://itsecurity.umbc.edu/critical/?id=93743" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?id=93743</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>UMBC continues to receive phishing email campaigns from a malicious actor pretending to be from either Cisco or Corestaff. This phishing email has the goal of not only getting users personal...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94548/guest@my.umbc.edu/249ba3bd1da978d3349ea0127be7fce8/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777132458</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/images/avatars/group/7/original.png?1777132458</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777132458</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777132458</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1777132458</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777132458</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1777132458</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777132458</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777132458</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 30 Jul 2020 15:36:36 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94513" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94513">
<Title>Recent Spear-phishing Emails</Title>
<Tagline>Phishers Want Your Phone Number</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>A new wave of Spear-phishing emails hit roughly 300 UMBC inboxes this weekend. An example is shown below, with the From field altered and the To field removed for privacy. There is no body in this particular email.</span></p><p><span>From: Forged Name &lt;<a href="mailto:name@gmail.com">name@gmail.com</a>&gt;</span></p><p><span>Date: Sat, Jul 25, 2020 at 9:26 AM</span></p><p><span>Subject: Send me your available text number?</span></p><p><span>To:</span></p><p><span> </span></p><p><span>This malicious email uses the name of a UMBC staffer in an attempt to appear credible. However, the Gmail address, unnatural-sounding subject line, and lack of body content are all clear red flags. More generally, be wary of emails from unverified sources with any urgent but unexplained request. Similar emails that were reported previously were precursors to gift card scams.</span></p><p><span>The best way to avoid these scams is to simply not respond. Instead, report suspicious emails by forwarding them to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. Include the full email headers by following the instructions at</span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>For more information on scams and phishing, please visit </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=36766495" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=36766495</span></a><span>.</span></p><br><span>To read more articles published by DOIT visit: </span><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>.</span></div>
]]>
</Body>
<Summary>A new wave of Spear-phishing emails hit roughly 300 UMBC inboxes this weekend. An example is shown below, with the From field altered and the To field removed for privacy. There is no body in this...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94513/guest@my.umbc.edu/0c421632f321749bc96782a50e9c9d7e/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777132458</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/images/avatars/group/7/original.png?1777132458</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777132458</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777132458</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1777132458</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777132458</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1777132458</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777132458</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777132458</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 28 Jul 2020 16:28:40 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="94496" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94496">
<Title>Content Editor Updates Enhance Announcements, Embedded Media</Title>
<Tagline>Ultra journals now included in course copy</Tagline>
<Body>
<![CDATA[
    <div class="html-content">The August <a href="https://wiki.umbc.edu/x/LohnB" rel="nofollow external" class="bo">Blackboard update</a> introduces an enhanced text editor to the Ultra course announcement tool, allowing faculty to add and display more types of content, embed web links and media, and insert file attachments. A future update to this tool will support sending the announcement as an email to students.<div><br></div><div><img src="https://umbc-test.blackboard.com/bbcswebdav/institution/myumbc/ultra_instr_announ_editor_2.png" width="600 px" alt="New content editor for Ultra course announcements" style="max-width: 100%; height: auto;"></div><div><br></div><div>The text editor also features another update across all areas where it is available. The <em>Insert Video</em> function, indicated by a video icon, will now be called <em>Insert Media from Web</em>. Users can add media from these sites: Panopto, VoiceThread, YouTube, Vimeo, Quizlet, and Soundcloud, among others. Please <a href="https://wiki.umbc.edu/x/GosMBg" rel="nofollow external" class="bo">check the FAQ</a> for more supported sites and how-to steps.</div><div><br></div><div>Finally, Blackboard adds support for Ultra journals in the course copy and Original course conversion processes. Now, journals and their prompts can be copied from one course to another, regardless of the course view. Faculty can use Copy Content in an Ultra course to copy journals between Ultra courses. Journals can also be converted from an Original course to an Ultra course as part of the Ultra Course Preview. NOTE: These capabilities apply to journals prompt and entries only and do not include comments.</div><div><span><br></span></div><div><span>The </span><a href="https://wiki.umbc.edu/x/LohnB" rel="nofollow external" class="bo"><span>next Blackboard Learn update</span></a><span> will be posted to our test site around August 11 and pushed to production around September 3, 2020. Faculty who are interested in test driving new features before they are released to production should </span><a href="http://my.umbc.edu/go/request-help" rel="nofollow external" class="bo"><span>open an RT ticket</span></a><span> to request early access. </span></div><div><span><br></span></div><div><span>As always, if you have any questions, please consider the following options:</span><ul><li><a href="https://doit.umbc.edu/itnm/academic-continuity/" rel="nofollow external" class="bo"><span>Academic Continuity</span></a><span> </span><span>|</span><span> </span><a href="https://fdc.umbc.edu/resources/keep-on-teaching/" rel="nofollow external" class="bo"><span>Keep On Teaching</span></a><span> </span><span>|</span><span> </span><span><a href="https://doit.umbc.edu/students" rel="nofollow external" class="bo">Student Technology Resources</a></span></li><li><a href="http://www.umbc.edu/faq" rel="nofollow external" class="bo"><span>Check our extensive FAQ collection</span></a><span> </span></li><ul><li><span><a href="https://wiki.umbc.edu/x/LohnB" rel="nofollow external" class="bo"><span>What’s new in Ultra?</span></a><span> </span><span>|</span><span> </span><a href="https://wiki.umbc.edu/x/bwrSAQ" rel="nofollow external" class="bo"><span>Known Issues</span></a><span> </span></span></li></ul><li><span><a href="http://my.umbc.edu/go/request-help" rel="nofollow external" class="bo">Open a ticket via RT</a></span></li><li><span>Follow the </span><a href="http://my.umbc.edu/groups/instructional-technology" rel="nofollow external" class="bo"><span>Instructional Technology</span></a><span> &amp; </span><a href="http://my.umbc.edu/groups/doit" rel="nofollow external" class="bo"><span>DoIT</span></a><span> myUMBC groups</span></li><li><a href="http://doit.umbc.edu/itnm/staff/" rel="nofollow external" class="bo"><span>Request a consult</span></a><span> with instructional technology staff</span><p></p></li></ul></div></div>
]]>
</Body>
<Summary>The August Blackboard update introduces an enhanced text editor to the Ultra course announcement tool, allowing faculty to add and display more types of content, embed web links and media, and...</Summary>
<Website>https://my3.my.umbc.edu/groups/instructional-technology/posts/94496</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94496/guest@my.umbc.edu/ebcdecca5aba74a456379ad0e5457b79/api/pixel</TrackingUrl>
<Tag>blackboard</Tag>
<Tag>ultra-experience</Tag>
<Tag>ultra-update</Tag>
<Group token="instructional-technology">Instructional Technology</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/instructional-technology</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/original.png?1446126703</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/large.png?1446126703</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/medium.png?1446126703</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/small.png?1446126703</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxsmall.png?1446126703</AvatarUrl>
<Sponsor>Instructional Technology</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/496/c3c38bb0b4ba731e8843b8229f8b2457/xxlarge.jpg?1595937991</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/496/c3c38bb0b4ba731e8843b8229f8b2457/xlarge.jpg?1595937991</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/496/c3c38bb0b4ba731e8843b8229f8b2457/large.jpg?1595937991</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/496/c3c38bb0b4ba731e8843b8229f8b2457/medium.jpg?1595937991</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/496/c3c38bb0b4ba731e8843b8229f8b2457/small.jpg?1595937991</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/496/c3c38bb0b4ba731e8843b8229f8b2457/xsmall.jpg?1595937991</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/496/c3c38bb0b4ba731e8843b8229f8b2457/xxsmall.jpg?1595937991</ThumbnailUrl>
<PawCount>3</PawCount>
<CommentCount>2</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 28 Jul 2020 11:43:14 -0400</PostedAt>
<EditAt>Tue, 28 Jul 2020 11:43:45 -0400</EditAt>
</NewsItem>

</News>
