<?xml version="1.0"?>
<News hasArchived="false" page="17" pageCount="29" pageSize="10" timestamp="Sun, 26 Apr 2026 21:21:30 -0400" url="https://beta.my.umbc.edu/groups/itsecurity/posts.xml?mode=activity&amp;page=17">
<NewsItem contentIssues="true" id="95109" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/95109">
<Title>Phishing Email from Fake UMBC IT Desk</Title>
<Tagline>Phsihing Attack Sent To Over 1000 UMBC Accounts</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>A compromised UMBC account was used to send phishing emails to over 1200 other UMBC accounts today. These malicious emails, claiming to be from the “UMBC IT Desk,” contained a link to a fake myUMBC login page, potentially allowing the malicious actors to steal any passwords entered on the site. To prevent further malicious activity, DoIT Security has scrambled the password of the account used to send the emails.</span></p><p><span>From: &lt;name removed&gt;</span></p><p><span>Date: Mon, Aug 24, 2020 at 10:40 AM</span></p><p><span>Subject: COVID-19 Update</span></p><p><span>To:</span></p><br><br><p><span>This is the UMBC IT Desk. Kindly Update your details to avoid beinglocked out of your email account.</span></p><p><span>Follow the URLbelow to proceed to setup umbc.edu/cas-web/login/Update</span></p><p><span>IT DeskUMBC</span></p><p><span> </span></p><p><span>The link leads to this fake login page:</span></p><p><span><span><img src="https://lh4.googleusercontent.com/qESGwhhjWX4Eq5wLk8x42DzKncvfCb8MXubrCFGRovWZciOQQsHK6zJeWxyP7DN1T_md66vgViBCx9OrzF8VzKuK80L_Fa0zwPSBj7nNvnyN0GeV4NUMm96XgnZWvIoo5G-LEJkF" width="624" height="351" style="max-width: 100%; height: auto;"></span></span></p><p><span>Always check the URL before entering credentials online. Notice that this site is not in the umbc.edu domain, despite claiming to be myUMBC. In addition, you can compare it to the real login page by navigating to myUMBC without using a link to see that it does not match.</span></p><p><span>As of this writing, approximately 150 people have clicked this link. If you have entered your UMBC password after clicking the link in this phishing email, please change it to something substantively different as soon as possible. Instructions for doing so can be found here:</span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867939" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867939</span></a><span>.</span></p><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p></div>
]]>
</Body>
<Summary>A compromised UMBC account was used to send phishing emails to over 1200 other UMBC accounts today. These malicious emails, claiming to be from the “UMBC IT Desk,” contained a link to a fake...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95109/guest@my.umbc.edu/76a7aa4617da4d330558aa3e1cf11818/api/pixel</TrackingUrl>
<Tag>covid19</Tag>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 24 Aug 2020 16:00:48 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="95090" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/95090">
<Title>Account data breach: Zoosk (2020)</Title>
<Tagline>Credentials Breach Report</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>In January 2020, Zoosk 2020, an online dating service, suffered a data breach. This breach contained 24 million users data that was posted online. The user information includes dates of birth, drinking habits, education levels, email addresses, ethnicities, family structure, genders, geographic locations, income levels, names, nicknames, physical attributes, political views, relationship statuses, religions, sexual orientations,and smoking habits. While the passwords posted were not valid for access to UMBC accounts, we suggest you change your UMBC password as a safety precaution.</span></p><br><p><span>76 UMBC accounts were victims of this breach. The victims are being notified via their UMBC emails and/or their alternate emails. If you have a Zoosk (2020) account, please contact them to see if you have been affected by this breach. To see if you were involved in any other breach visit: </span><a href="https://haveibeenpwned.com/" rel="nofollow external" class="bo"><span>https://haveibeenpwned.com/</span></a><span>.</span></p><br><br><p><span>More about Zoosk(2020) data breach:</span></p><p><a href="https://grahamcluley.com/zoosk-hacking/" rel="nofollow external" class="bo"><span>https://grahamcluley.com/zoosk-hacking/</span></a></p><br><p><a href="https://www.justice4you.com/blog/zoosk-data-breach.html#:~:text=According%20to%20the%20notice%2C%20an%20unauthorized%20party%20breached,by%20email%2C%20including%20more%20than%20560%2C000%20California%20residents." rel="nofollow external" class="bo"><span>https://www.justice4you.com/blog/zoosk-data-breach.html#:~:text=According%20to%20the%20notice%2C%20an%20unauthorized%20party%20breached,by%20email%2C%20including%20more%20than%20560%2C000%20California%20residents.</span></a></p><br><p><span>If you have any questions or concerns email us: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> </span></p><br><p><span>Information about this breach was provided to us by Have I Been Pwned(HIBP). </span></p><p> </p><p><span>_____________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><p> </p><p><span>Need to set up a recovery email for your UMBC account?</span></p><p><span>Follow the instructions here: </span><a href="https://my3.my.umbc.edu/groups/itsecurity/posts/94776" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity/posts/94776</span></a></p><br><p><span>Follow us on myUMBC</span><span>:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></p></div>
]]>
</Body>
<Summary>In January 2020, Zoosk 2020, an online dating service, suffered a data breach. This breach contained 24 million users data that was posted online. The user information includes dates of birth,...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95090/guest@my.umbc.edu/e19d02e85d33f6e43f12987559f2f8a4/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 24 Aug 2020 13:00:41 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="95089" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/95089">
<Title>Account data breach: Drizly</Title>
<Tagline>Credentials Breach Report</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>In July 2020, an online alcohol delivery service, Drizly, suffered a data breach. This breach contained 2.5 million customers data that was sold online, and then posted on a hacking forum. The customer information includes names, email addresses, IP addresses, physical addresses, date of birth, phone numbers, and passwords. No financial information was leaked.</span></p><br><p><span>106 UMBC accounts were victims of this breach. The victims are being notified via their UMBC emails and/or their alternate emails. If you have a Drizly account, please contact them to see if you have been affected by this breach. To see if you were involved in any other breach visit: </span><a href="https://haveibeenpwned.com/" rel="nofollow external" class="bo"><span>https://haveibeenpwned.com/</span></a><span>.</span></p><br><br><p><span>More about Drizly data breach:</span></p><p><a href="https://techcrunch.com/2020/07/28/drizly-data-breach/" rel="nofollow external" class="bo"><span>https://techcrunch.com/2020/07/28/drizly-data-breach/</span></a></p><br><p><a href="https://www.forbes.com/sites/katedingwall/2020/07/29/alcohol-e-commerce-giant-drizly-hit-with-huge-data-breach/#63b0d40b5a96" rel="nofollow external" class="bo"><span>https://www.forbes.com/sites/katedingwall/2020/07/29/alcohol-e-commerce-giant-drizly-hit-with-huge-data-breach/#63b0d40b5a96</span></a></p><br><p><span>If you have any questions or concerns email us: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> </span></p><br><p><span>Information about this breach was provided to us by Have I Been Pwned(HIBP). </span></p><p> </p><p><span>_____________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><p> </p><p><span>Need to set up a recovery email for your UMBC account?</span></p><p><span>Follow the instructions here: </span><a href="https://my3.my.umbc.edu/groups/itsecurity/posts/94776" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity/posts/94776</span></a></p><br><span>Follow us on myUMBC</span><span>:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></div>
]]>
</Body>
<Summary>In July 2020, an online alcohol delivery service, Drizly, suffered a data breach. This breach contained 2.5 million customers data that was sold online, and then posted on a hacking forum. The...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95089/guest@my.umbc.edu/89316cd852a70895cf563be575901740/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 24 Aug 2020 12:27:41 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="95088" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/95088">
<Title>Account Data Breach: Havenly</Title>
<Tagline>Credentials Breach Report</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>In June 2020, Havenly, an interior design website, suffered a data breach. Approximately 1.4 million members' personal information was exposed. This data includes names, email, phone numbers, addresses and passwords stored as SHA-1 hashes. This information was shared on an online hacking community. </span></p><br><p><span>28 UMBC accounts were affected by this breach. The victims have been notified via their UMBC emails and/or their alternate emails. If you have a Havenly account, please contact them to see if you have been affected by this breach.</span></p><br><p><span>More about Heavenly data breach:</span></p><p><a href="https://www.bleepingcomputer.com/news/security/hacker-leaks-386-million-user-records-from-18-companies-for-free/" rel="nofollow external" class="bo"><span>https://www.bleepingcomputer.com/news/security/hacker-leaks-386-million-user-records-from-18-companies-for-free/</span></a><span> </span></p><br><p><span>If you have any questions or concerns email us: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> </span></p><br><p><span>Information about this breach was provided to us by Have I Been Pwned(HIBP).</span></p><br><p> </p><p><span>_____________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><p> </p><p><span>Need to set up a recovery email for your UMBC account?</span></p><p><span>Follow the instructions here: </span><a href="https://my3.my.umbc.edu/groups/itsecurity/posts/94776" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity/posts/94776</span></a></p><br><p><span>Follow us on myUMBC</span><span>:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></p></div>
]]>
</Body>
<Summary>In June 2020, Havenly, an interior design website, suffered a data breach. Approximately 1.4 million members' personal information was exposed. This data includes names, email, phone numbers,...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95088/guest@my.umbc.edu/37cde20daa1e1e214e861b07e9f048a8/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 24 Aug 2020 12:25:16 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="95087" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/95087">
<Title>Account Data Breach: Promo</Title>
<Tagline>Credentials Breach Report</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>In June 2020, a marketing video creator website, Promo, suffered a data breach. 22 million users' personal information was leaked on an online hacking forum. This data includes names, email, gender, IP addresses and passwords stored as SHA-256 hashes. This information was shared on an online hacking community. </span></p><br><p><span>34 UMBC accounts were affected by this breach. The victims have been notified via their UMBC emails and/or their alternate emails. If you have a Promo account, please contact them to see if you have been affected by this breach. Also visit </span><a href="https://haveibeenpwned.com/" rel="nofollow external" class="bo"><span>https://haveibeenpwned.com/</span></a><span> to see if you were involved in any other breach.</span></p><br><p><span>More about Promo data breach:</span></p><p><a href="https://support.promo.com/en/articles/4276475-promo-data-breach-faq" rel="nofollow external" class="bo"><span>https://support.promo.com/en/articles/4276475-promo-data-breach-faq</span></a><span> </span></p><br><p><a href="https://www.bleepingcomputer.com/news/security/promocom-discloses-data-breach-after-22m-user-records-leaked-online/#:~:text=Promo.com%2C%20an%20Israeli-based%20marketing%20video%20creation%20site%2C%20has,networks%20such%20as%20Facebook%2C%20Instagram%2C%20Twitter%2C%20and%20LinkedIn." rel="nofollow external" class="bo"><span>https://www.bleepingcomputer.com/news/security/promocom-discloses-data-breach-after-22m-user-records-leaked-online/#:~:text=Promo.com%2C%20an%20Israeli-based%20marketing%20video%20creation%20site%2C%20has,networks%20such%20as%20Facebook%2C%20Instagram%2C%20Twitter%2C%20and%20LinkedIn.</span></a></p><br><br><p><span>If you have any questions or concerns email us: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> </span></p><br><p><span>Information about this breach was provided to us by Have I Been Pwned(HIBP). </span></p><p> </p><p><span>_____________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><p> </p><p><span>Need to set up a recovery email for your UMBC account?</span></p><p><span>Follow the instructions here: </span><a href="https://my3.my.umbc.edu/groups/itsecurity/posts/94776" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity/posts/94776</span></a></p><br><p><span>Follow us on myUMBC</span><span>:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></p></div>
]]>
</Body>
<Summary>In June 2020, a marketing video creator website, Promo, suffered a data breach. 22 million users' personal information was leaked on an online hacking forum. This data includes names, email,...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95087/guest@my.umbc.edu/9b440e99fda3d256ddc3796c3a64a556/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 24 Aug 2020 12:24:27 -0400</PostedAt>
<EditAt>Mon, 24 Aug 2020 12:25:39 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="95086" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/95086">
<Title>Account Data breach: ProctorU</Title>
<Tagline>Credentials Breach Report</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>In June 2020, ProctorU, an online examination service, suffered a data breach. Over 444K user records were exposed and posted to an online hacking community. These records contain names, emails, physical addresses, phone numbers and passwords.</span></p><br><p><span>36</span><span>UMBC accounts were affected by this breach. The victims have been notified via their UMBC emails and/or their alternate emails. If you have a ProctorU account, please contact them to see if you have been affected by this breach. To see if you were involved in any other breach visit: </span><a href="https://haveibeenpwned.com/" rel="nofollow external" class="bo"><span>https://haveibeenpwned.com/</span></a><span>.</span></p><br><p><span>More about ProctorU data breach:</span></p><p><a href="https://www.smh.com.au/national/hackers-hit-university-online-exam-tool-20200806-p55j6h.html" rel="nofollow external" class="bo"><span>https://www.smh.com.au/national/hackers-hit-university-online-exam-tool-20200806-p55j6h.html</span></a></p><br><p><a href="https://www.bleepingcomputer.com/news/security/proctoru-confirms-data-breach-after-database-leaked-online/" rel="nofollow external" class="bo"><span>https://www.bleepingcomputer.com/news/security/proctoru-confirms-data-breach-after-database-leaked-online/</span></a></p><br><p><span>If you have any questions or concerns email us: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> </span></p><br><p><span>Information about this breach was provided to us by Have I Been Pwned(HIBP). </span></p><p> </p><p><span>_____________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><p> </p><p><span>Need to set up a recovery email for your UMBC account?</span></p><p><span>Follow the instructions here: </span><a href="https://my3.my.umbc.edu/groups/itsecurity/posts/94776" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity/posts/94776</span></a></p><br><p><span>Follow us on myUMBC</span><span>:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></p></div>
]]>
</Body>
<Summary>In June 2020, ProctorU, an online examination service, suffered a data breach. Over 444K user records were exposed and posted to an online hacking community. These records contain names, emails,...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95086/guest@my.umbc.edu/00f49b7a650a2111ae6eca31a0576d38/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 24 Aug 2020 12:21:59 -0400</PostedAt>
<EditAt>Mon, 24 Aug 2020 12:26:02 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="95085" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/95085">
<Title>Microsoft SharePoint Phishing Scam</Title>
<Tagline>A Scam Targeting Microsoft SharePoint Users</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Malicious actors are using Covid-19 and current economic conditions to exploit victims with new phishing scams. The article linked below talks about two similar phishing scams. One scam claims to be giving the user a bonus while mimicking a Microsoft SharePoint notification. The other attempts to spoof a Microsoft Planner email notification. Both scams are trying to steal the user’s Microsoft login credentials. </span></p><br><p><span>“Summer Bonus” Phishing Scam</span></p><br><p><span>The scammer sends an email that looks like a legitimate Microsoft SharePoint notification. The email offers what looks like a bonus for the month while also having an “open” button to display an explanatory file. An example of this email is shown below.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span><span><img src="https://lh6.googleusercontent.com/zpGReAPSZiSRNJQ_35ZnLTRLFk1y7FppGEXMd9ijXbyR9XwRyZpWlIJaoqAJ78fu0q4fXb7-_nR9RgLUmjsZH_7XpuchopERN2ZViG3tHs54W4qfvVbwFtPADMVnVWdwzvpR1Qd8" width="610" height="527" style="max-width: 100%; height: auto;"></span></span></p></td></tr></tbody></table></div><br><p><span>If the victim clicks on the “open” button they will be brought to a website that looks very similar to a Microsoft login page. A closer look reveals that this is not a link to a Microsoft login page but to an AppSpot site created by the scammers. Appspot.com is a cloud computing platform for developing and hosting web applications in Google-managed data centers.</span></p><br><p><span>If the victim enters their login credentials into the fake Microsoft login page, their account would be compromised.</span></p><br><p><span>Microsoft Planner Phishing Scam</span></p><br><p><span>Similar to the “Summer Bonus” scam, this Microsoft Planner Phishing Scam uses an email that tries to spoof a Microsoft Planner notification. As in the “Summer Bonus” scam, it has a button but this one says “Open in Microsoft Planner” and will take you to a fake Microsoft login page. An example of this email is shown below.</span></p><p><span> </span></p><div><table><colgroup></colgroup><tbody><tr><td><p><span><span><img src="https://lh5.googleusercontent.com/CXJUnqd9G1yL7OP-dLc7__wnmI5KZ7WtUpY95ZF5ooHBLVWdDMwQ4CwzvJ_06MeWYwPpPyxv0Y3XX2PAzArgpEhnO668nD3zHUHEWKkVgaq-SZUC60rPoywdkIVbhjIz9nT54TnM" width="610" height="524" style="max-width: 100%; height: auto;"></span></span></p></td></tr></tbody></table></div><br><p><span>As with the previous scam, if the victim enters their login credentials into the fake Microsoft login page, their account would be compromised.</span></p><br><p><span>To avoid these scams, make sure the site you land on after clicking the button is really a Microsoft domain. If the site is a login for Microsoft then the URL should direct your browser to a legitimate Microsoft domain.</span></p><br><p><span>Even before clicking any buttons, look at the From address in the headers. </span><span>The scammer’s display name makes it appear as if it belongs to the targeted company. The headers can show if the From email address itself is spoofed and who is actually sending the email to you. </span></p><br><p><span>Always remember that if it feels “too good to be true”, then it is probably too good to be true. It is also good practice to check with a supervisor before responding to any unsolicited requests for credentials or logins that appear to come from your employer.</span></p><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>The images and the original article can be found here. Please check it out for more information: </span></p><p><a href="https://www.area1security.com/blog/july-bonus-microsoft-spear-phishing/?utm_medium=email&amp;utm_source=blast&amp;utm_term=na&amp;utm_content=na&amp;utm_campaign=2020-Q3-Email-Blast-Spot-Campaign&amp;mkt_tok=eyJpIjoiWVdKbE1HVXlOakkzWVRWaiIsInQiOiJFWnFFZVYxYXBuTFpcLytrc1hzNkFodUZ1XC9CbWRPcUROYmhMWlM0NisyZmo3K0cybFFyY0xmMnhYXC9lYUIzMit2UXZGYzFPTURmTSt2Z1cxRDkxOTladFUwVGl5Wmczd2FmZWFvSkRZZm9iN0FVZGh0TGs2b2FlazhaSFU0ZWhzbSJ9" rel="nofollow external" class="bo"><span>https://www.area1security.com/blog/july-bonus-microsoft-spear-phishing/?utm_medium=email&amp;utm_source=blast&amp;utm_term=na&amp;utm_content=na&amp;utm_campaign=2020-Q3-Email-Blast-Spot-Campaign&amp;mkt_tok=eyJpIjoiWVdKbE1HVXlOakkzWVRWaiIsInQiOiJFWnFFZVYxYXBuTFpcLytrc1hzNkFodUZ1XC9CbWRPcUROYmhMWlM0NisyZmo3K0cybFFyY0xmMnhYXC9lYUIzMit2UXZGYzFPTURmTSt2Z1cxRDkxOTladFUwVGl5Wmczd2FmZWFvSkRZZm9iN0FVZGh0TGs2b2FlazhaSFU0ZWhzbSJ9</span></a></p><br><p><span>To read more articles published by DoIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>Malicious actors are using Covid-19 and current economic conditions to exploit victims with new phishing scams. The article linked below talks about two similar phishing scams. One scam claims to...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95085/guest@my.umbc.edu/b71f97a748a34795397c539c4c6983f8/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 24 Aug 2020 12:20:48 -0400</PostedAt>
<EditAt>Mon, 24 Aug 2020 12:26:24 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="95084" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/95084">
<Title>"Quick Response" - A UMBC Impersonation Scam</Title>
<Tagline>A Common Scam That Still Works</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Recently DoIT has been notified that an email scammer has been trying to impersonate other UMBC staffers. The email comes from a scammer who is claiming to be someone from UMBC and has the Subject “Quick response.” An example of this phishing email can be seen below.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: </span><span>FORGED NAME </span><span>&lt;</span><span><a href="mailto:.umbc@gmail.com">.umbc@gmail.com</a></span><span>&gt;</span></p><p><span>Date: Thu, Aug 20, 2020</span></p><p><span>Subject: Quick response</span></p><p><span>To: </span><span>&lt;@umbc.edu</span><span>&gt;</span></p><p> </p><p><span>Available?</span></p><p> </p><p><span>--</span></p><p><span>FORGED NAME</span></p></td></tr></tbody></table></div><br><p><span>The email that is shown above is only the first email that the scammer will send to users to try and get their attention. In similar phishing emails, once the user responds  the scammers would claim that they were stuck in a meeting and ask the user if they could go to the store and buy them gift cards. </span></p><br><p><span>Even though this email is short it still shows some red flags of a phishing email. </span></p><br><ul><li><p><span>The email itself is not personalized and is very vague</span><span>. The reason for this is so that the scammer can send the email to as many people as possible.</span></p></li><li><p><span>There is a sense of urgency</span><span>. Even with this email being so short, the sense of urgency comes with the subject line of “Quick response” trying to show that they need you to respond as soon as possible.</span></p></li><li><p><span>The From email address is suspicious</span><span>. Some scammers will use addresses of the form &lt;johnsmith.</span><a href="mailto:umbc@gmail.com" rel="nofollow external" class="bo"><span>umbc@gmail.com</span></a><span>&gt;. Without a closer examination some might assume it is coming from a UMBC source while in actuality it is coming from an unknown Google mail address.</span></p></li><li><p><span>The email signature and name are meant to look legitimate</span><span>. The scammer will try to base their phishing email on that of the person they are trying to impersonate. This will include an email signature meant to look like an actual UMBC staff member’s and the sender's name being that of the person they are trying to impersonate, often a supervisor. </span></p></li></ul><br><p><span>You can find other examples of similar scams here </span><a href="https://itsecurity.umbc.edu/critical/?id=94968" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?id=94968</span></a><span> and </span><a href="https://itsecurity.umbc.edu/critical/?id=94950" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?id=94950</span></a><span> or check out the DoIT Security page main page for more updated information.</span></p><br><p><span>If you do receive this or a similar email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>Recently DoIT has been notified that an email scammer has been trying to impersonate other UMBC staffers. The email comes from a scammer who is claiming to be someone from UMBC and has the Subject...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95084/guest@my.umbc.edu/9c777090fa25c9ed45f2e31e935ec17d/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 24 Aug 2020 12:19:31 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="95006" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/95006">
<Title>Account Data Breach: Truefire</Title>
<Tagline>Truefire Data Breach</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>In February 2020, the guitar tuition website TrueFire suffered a data breach. Over 600,000 individuals were affected. Information such as names, emails, addresses, account balances, and passwords were exposed. </span></p><br><p><span>Five UMBC email addresses were victims of this breach. These individuals were notified via their UMBC emails and/or their recovery emails. If you have a Truefire membership, please contact them to see if you were affected by this breach. If you have any questions or concerns email us: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a></p><p> </p><p><span>Information about this breach was provided to Have I Been Pwned(HIBP) by </span><a href="https://dehashed.com/" rel="nofollow external" class="bo"><span>dehashed.com</span></a><span>.</span></p><br><br><p><span>More about Truefire data breach:</span></p><br><p><a href="https://guitar.com/news/industry-news/truefire-data-breach/" rel="nofollow external" class="bo"><span>https://guitar.com/news/industry-news/truefire-data-breach/https://guitar.com/news/industry-news/truefire-data-breach/</span></a></p><br><p> </p><p><span>_____________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><p> </p><p><span>Need to set up a recovery email for your UMBC account?</span></p><p><span>Follow the instructions here: </span><a href="https://my3.my.umbc.edu/groups/itsecurity/posts/94776" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity/posts/94776</span></a></p><br><p><span>Follow us on myUMBC</span><span>:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></p></div>
]]>
</Body>
<Summary>In February 2020, the guitar tuition website TrueFire suffered a data breach. Over 600,000 individuals were affected. Information such as names, emails, addresses, account balances, and passwords...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95006/guest@my.umbc.edu/2158b1aafd30648876752703c2af24de/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 21 Aug 2020 12:14:19 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94968" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94968">
<Title>&#8220;QUICK REQUEST&#8221; UMBC Impersonation Scam</Title>
<Tagline>Another Example Of A Gift Card Scam Targeting UMBC accounts</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>The DoIT has recently been notified of a malicious actor trying to impersonate a UMBC staffer. This scammer is sending emails with the subject line “QUICK REQUEST” and asking victims if they are available with the goal of getting gift cards from the victim. An example of an email chain is shown below with the name of the From and the email signature removed for privacy reasons.</span><span><br><br></span></p><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: FORGED NAME &lt;<a href="mailto:.umbc@gmail.com">.umbc@gmail.com</a>&gt;</span><span><br></span><span>Date: Aug 19, 2020, at 11:33 AM</span></p><p><span>Subject QUICK REQUEST</span></p><p><span>To :&lt;@umbc.edu&gt;</span></p><br><p><span>Available?</span></p><br><p><span>--</span></p><p><span>FORGED NAME</span></p></td></tr></tbody></table></div><br><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>FORGED NAME&lt;<a href="mailto:.umbc@gmail.com">.umbc@gmail.com</a>&gt; wrote:</span><span><br><br></span></p><p><span>I’m in an impromptu meeting right now and that's why i'm contacting you through here. I should have called you, but phone is not allowed to be used during the meeting. I don't know when the meeting will be rounding up, And i want you to help me out on something very important  from a store around you and I will reimburse you back when I’m out of the meeting. Let me know if you can do this.</span></p><p><span>--</span><span><br></span><span>FORGED NAME</span></p></td></tr></tbody></table></div><br><p><span>The scammer targets a department and tries to impersonate some senior person in that department. The scammer will send emails asking the victim if they are “available.” </span></p><br><p><span>If the victim respondes, they will receive a second email asking the victim to purchase gift cards because the scammer is currently in a meeting and can’t do it themselves. Note that the second email has poor grammar and random capitalizations. This email also has a sense of urgency with the scammer claiming to be in a meeting and using words like “important” and the subject “QUICK REQUEST” all in caps.</span></p><br><p><span>Note that the sender’s address in both messages is &lt;</span><a href="mailto:.umbc@gmail.com" rel="nofollow external" class="bo"><span>.umbc@gmail.com</span></a><span>&gt;. The full email from the scammer was shortened for privacy reasons. This address allows the victim to see the “umbc” and, without close examination, to assume that the message is coming from a UMBC source when in actuality it is coming from an unknown Google mail address. The email also had an email signature which was based on that of an actual UMBC staff member.</span></p><br><p><span>If you do receive this or any other email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>The DoIT has recently been notified of a malicious actor trying to impersonate a UMBC staffer. This scammer is sending emails with the subject line “QUICK REQUEST” and asking victims if they are...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94968/guest@my.umbc.edu/de8dfe20a0867f3a7563b3ebfac2f660/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 20 Aug 2020 00:01:41 -0400</PostedAt>
</NewsItem>

</News>
