<?xml version="1.0"?>
<News hasArchived="false" page="18" pageCount="29" pageSize="10" timestamp="Sun, 26 Apr 2026 21:21:34 -0400" url="https://beta.my.umbc.edu/groups/itsecurity/posts.xml?mode=activity&amp;page=18">
<NewsItem contentIssues="false" id="94950" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94950">
<Title>&#8220;TASK&#8221; UMBC Impersonation Scam</Title>
<Tagline>An E-mail Exchange With A Scammer</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Recently the DoIT has been notified of a malicious actor trying to impersonate a UMBC staffer. The phishing email has the subject line “TASK” and a chain of emails from the scammer can be seen below. The example has had the name and email address of the victim removed for privacy reasons.</span><span><br><br></span></p><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: </span><span>FORGED NAME </span><span> &lt;</span><span><a href="mailto:executiveoffice76@gmail.com">executiveoffice76@gmail.com</a></span><span>&gt;</span></p><p><span>Date: Thu, Aug 13, 2020 at 10:35 AM</span></p><p><span>Subject: TASK</span></p><p><span>To: &lt;</span><span>@umbc.edu</span><span>&gt;</span></p><br><p><span>Hello,</span></p><p> </p><p><span>Confirm your availability? Need you to handle a quick request. Get back to me as soon as you can.</span></p><p> </p><p><span>Thanks.</span></p><p><span>FORGED NAME</span></p></td></tr></tbody></table></div><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: </span><span>FORGED NAME </span><span> &lt;</span><a href="mailto:executiveoffice76@gmail.com" rel="nofollow external" class="bo"><span>executiveoffice76@gmail.com</span></a><span>&gt;</span><span><br><br></span></p><p><span>How are you doing? Presently in a meeting. How fast can you get some cards from a nearby store? They are needed shortly. Get back to me as soon as you can</span></p><br><p><span>Sincerely,</span></p></td></tr></tbody></table></div><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: </span><span>FORGED NAME </span><span> &lt;</span><span><a href="mailto:executiveoffice76@gmail.com">executiveoffice76@gmail.com</a></span><span>&gt;</span><span><br></span><span><br></span><span>Need steam gift cards 5 of them in 100$ denominations. Make sure you keep the receipt for proper documentation and reimbursement purposes.  When you get them scratch off the code panel, then take clear pictures of them and attach them here.</span></p><br><p><span>Sorry for the inconvenience.</span></p></td></tr></tbody></table></div><p><span><br></span><span>First the malicious actor sends an email asking if the user is available to help them. Note that in the first email there is a  sense of urgency as well as a lack of personalization to the recipient. These can be red flags of a phishing email.</span></p><br><p><span>In the second email, the scammer asks the user if they could run out to the store and get some gift cards for a meeting that the scammer is currently in. The text continues to foster a sense of urgency using words like “fast” and “quickly”.</span></p><br><p><span>In the  last email the scammer asks the user for five one hundred dollar Steam gift cards. Steam gift cards are used on Steam, a video game digital distribution service. The scammer will ask the user to send them a copy of the codes on the back of the gift cards.</span><span><br></span><span><br></span><span>If you do receive this or a similar email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to <a href="mailto:security@umbc.edu">security@umbc.edu</a>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>Recently the DoIT has been notified of a malicious actor trying to impersonate a UMBC staffer. The phishing email has the subject line “TASK” and a chain of emails from the scammer can be seen...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94950/guest@my.umbc.edu/c64a265daac1a82114ea6975fde1ecd3/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 18 Aug 2020 18:00:36 -0400</PostedAt>
<EditAt>Tue, 18 Aug 2020 18:00:46 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="94949" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94949">
<Title>Office 365 phishing via malicious OAuth apps</Title>
<Tagline>You Can Be Tricked Into Giving Access To Your Files</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>During the pandemic, Microsoft has seen a rise in phishing campaigns. One such campaign uses the Office 365 phishing via malicious OAuth apps. The phishing attack attempts to trick individuals into giving a malicious Office 365 app permission to their legitimate Office 365 account.</span></p><br><p><span>Open Authentication(OAuth) is an open standard protocol which allows users to give websites and applications access to their information without the use of a password or username. Popular sites that use OAuth include Google, Twitter etc.</span></p><br><p><span>When granting such access, you may see something like this:</span></p><br><p><span><span><img src="https://lh5.googleusercontent.com/O39hD-enEia9P7snkYUor3iZTsk38MWaLVwso35W2t99OQXmCvic8hXl5nvCy6bQEad1hV8ZhEpZj9vMneKtUaVhVL2oa4H6VYe4F8ndEp0gSjiVMxRzDGtNJfKNxBCc65EQ5e9D" width="337" height="344" style="max-width: 100%; height: auto;"></span></span></p><br><br><p><span>Once the malicious Office 365 app is linked to your Office 365 account, the hackers can access your private information and any other sensitive data stored on your Office365 account. This malicious Office 365 app asks for permissions which include but are not limited to:</span></p><ul><li><p><span>Reading your contacts.</span></p></li><li><p><span>Reading your mail.</span></p></li><li><p><span>Reading all OneNote notebooks that you can access. </span></p></li><li><p><span>Reading and writing to your mailbox settings.</span></p></li><li><p><span>Having full access to all files you have access to.</span></p></li></ul><br><p><span>Microsoft has taken legal actions against 6 domains that store the malicious Office 365 applications.</span></p><p><span>However, you can check the apps and services that you have given consent to access your Office 365</span></p><p><span>information.</span></p><br><p><span>To disable these permissions:</span></p><ol><li><p><span>Visit: </span><a href="https://account.live.com/consent/Manage?uaid=a11edb2059b64ae499fce9f494c2f53f" rel="nofollow external" class="bo"><span>https://account.live.com/consent/Manage?uaid=a11edb2059b64ae499fce9f494c2f53f</span></a></p></li><li><p><span>Click </span><span>Edit</span></p></li><li><p><span>Click </span><span>Remove these permissions</span></p></li></ol><br><br><br><p><span>Source: </span><a href="https://www.bleepingcomputer.com/news/security/microsoft-warns-of-office-365-phishing-via-malicious-oauth-apps/" rel="nofollow external" class="bo"><span>https://www.bleepingcomputer.com/news/security/microsoft-warns-of-office-365-phishing-via-malicious-oauth-apps/</span></a></p><br><p><a href="https://www.bleepingcomputer.com/news/security/phishing-attack-hijacks-office-365-accounts-using-oauth-apps/" rel="nofollow external" class="bo"><span>https://www.bleepingcomputer.com/news/security/phishing-attack-hijacks-office-365-accounts-using-oauth-apps/</span></a></p><br><p><span>_________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><p><span>Forward it to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></p></div>
]]>
</Body>
<Summary>During the pandemic, Microsoft has seen a rise in phishing campaigns. One such campaign uses the Office 365 phishing via malicious OAuth apps. The phishing attack attempts to trick individuals...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94949/guest@my.umbc.edu/96be352428497fca5b322b002ebca635/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 18 Aug 2020 17:53:04 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94913" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94913">
<Title>Phishing Email Used To Deploy Malware - CISA Report</Title>
<Tagline>The Latest Attack On Your Computer</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>According to an article by the Cybersecurity and Infrastructure Security Agency (CISA), there has been a recent phishing email campaign trying to deploy malware onto victims' devices. This malware will allow the malicious actor to steal files, capture keystrokes, take screenshots, and execute arbitrary code on infected devices.</span></p><br><p><span>This campaign works by sending out emails containing a Microsoft Word document. This document will have an application macro hidden within it to deploy the malware onto the victim's device. This malicious macro code can change font color from light gray to black (to trick victims into enabling content), check whether the Windows operating system is 32 or 64-bit, and construct and execute a command line to download additional files.</span></p><br><p><span>Once the malware is installed onto the victim's device, the malicious actor has many different techniques available to exploit the targeted system. Among these are:</span></p><ul><li><p><span>Collect user information from the infected device, for example their IP addresses, username and file data.</span></p></li><li><p><span>Create shortcuts named Anti virus service.lnk in an attempt to hide as a legitimate file.</span></p></li><li><p><span>Capture keystrokes.</span></p></li><li><p><span>Take a snapshot of the current processes state of the user's machine.</span></p></li><li><p><span>Use PowerShell to download and execute different versions of the malware.</span></p></li><li><p><span>Execute arbitrary code on the infected device.</span></p></li><li><p><span>Delete files.</span></p></li><li><p><span>Gather the operating system version, architecture information, connected drives, hostname, and the computer name. Also has been able to get a snapshot of the current system state of the targets machine.</span></p></li><li><p><span>Download and execute files on the victim's machine.</span></p></li><li><p><span>Take screenshots of the victim's machine.</span></p></li><li><p><span>Steal data from the victim's clipboard.</span></p></li><li><p><span>Drop a Windows shortcut into the victim's startup folder and/or just onto the machine.</span></p></li><li><p><span>Steal profile credential information from Firefox, Chrome, and Opera.</span></p></li></ul><br><p><span>For more information on what the malware can do, a link to the article can be found below. The article also lists some tips for victims and administrators to strengthen their security.</span></p><br><ul><li><p><span>Maintain up-to-date antivirus software.</span></p></li><li><p><span>Keep your operating system up to date.</span></p></li><li><p><span>If possible either disable file and printer sharing services. If you have to have this enabled, use strong passwords or Active Directory authentication.</span></p></li><li><p><span>Do not add victims to the local administrator group unless required.</span></p></li><li><p><span>Keep and enforce strong passwords.</span></p></li><li><p><span>Exercise caution when opening email attachments, even if the attachment is expected and the sender appears to be known.</span></p></li><li><p><span>Make sure you have your firewall up to date and enabled.</span></p></li><li><p><span>Disable unnecessary services on workstations and servers.</span></p></li><li><p><span>Scan for and remove suspicious email attachments.</span></p></li><li><p><span>Exercise caution when using removable media, for example USBs and CDs.</span></p></li><li><p><span>Scan any file that you download before using it.</span></p></li></ul><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please do not download any attachments from a suspicious email as that could put your device at risk. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>For more information on this topic, please check out: </span></p><p><a href="https://us-cert.cisa.gov/ncas/alerts/aa20-227a" rel="nofollow external" class="bo"><span>https://us-cert.cisa.gov/ncas/alerts/aa20-227a</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>According to an article by the Cybersecurity and Infrastructure Security Agency (CISA), there has been a recent phishing email campaign trying to deploy malware onto victims' devices. This malware...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94913/guest@my.umbc.edu/7e2c7f513f67fae4045cd2a636be62f5/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 17 Aug 2020 16:54:59 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94854" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94854">
<Title>Fake "Corestaff Job-Offer" Phishing Attempt</Title>
<Tagline>Yet Another Job Scam, (Pretending To Be From Corestaff)</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Below is another example of a phishing email campaign in which the malicious actor is claiming to be from Corestaff Services. The email below is the initial message sent out to victims to try and get to to respond with an alternate (non-UMBC) email address.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: </span><span>charlie putt</span><span> &lt;</span><span><a href="mailto:puttc10@gmail.com">puttc10@gmail.com</a></span><span>&gt;</span></p><p><span>Date: Mon, Aug 3, 2020 at 2:03 PM</span></p><p><span>Subject: UMBC COVID-19 PART TIME JOB OFFER</span></p><p><span>To: &lt;@umbc.edu&gt;</span></p><br><p><span>Dear students,</span></p><p><span> </span></p><p><span>University of Maryland health professionals have been closely monitoring the spread of COVID 19 over the past few months. Therefore the university is organizing an online part time job to sustain the students during the period of this pandemic. I'm happy to inform you that our reputable company CORESTAFF SERVICES Inc® is currently running a student empowerment program.</span></p><p><span>    KINDLY EMAIL BACK WITH YOUR  PERSONAL EMAIL ADDRESS IF INTERESTED IN THIS JOB POSITION.</span></p><p> </p><p><span>Kind Regards</span></p><p><span>Charlie Putt</span></p><p><span>HR Manager/Consultant</span></p><p><span>CORESTAFF SERVICES Inc®</span><span>    </span></p><br></td></tr></tbody></table></div><br><p><span>Once the victim responds with their alternate email address, the scammer will then email that address claiming that the victim got the job and asking for more information. An example of what type of information and how it is formatted in the email is shown below.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>NAME:</span></p><p><span>PHYSICAL CONTACT ADDRESS (NOT PO BOX)</span></p><p><span>CITY:</span></p><p><span>STATE:</span></p><p><span>ZIP CODE:</span></p><p><span>BANK NAME:</span></p><p><span>D.O.B:</span></p><p><span>GENDER:</span></p><p><span>MOBILE (Must be able to receive text) :</span></p><p><span>PERSONAL EMAIL:</span></p><p><span>CURRENT JOB:</span></p></td></tr></tbody></table></div><br><p><span>If the victim responds with their personal information, the scammer could start messaging the victim over text message and may send a fraudulent check to the victim’s postal address. If this happens to you, please do </span><span>not </span><span>try to deposit the check. A very similar scam is described here: </span><a href="https://itsecurity.umbc.edu/critical/?id=94549" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?id=94549</span></a><span>.</span></p><br><p><span>If you do receive this or a similar scam, please DO NOT respond any further or click on any URLs. If you have provided any banking or financial information, please notify your bank or financial institution immediately. If you have been sent a check, you should not attempt to cash or deposit it. If you have deposited a check already, please contact your bank and tell them that it may be part of a scam.</span></p><br><p><span>Whether or not you responded to the scam or not, please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.  We will also keep track of any other information you submit about the scammers, such as their phone numbers if you receive a text message from the scammer.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>Below is another example of a phishing email campaign in which the malicious actor is claiming to be from Corestaff Services. The email below is the initial message sent out to victims to try and...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94854/guest@my.umbc.edu/ee38fb660da3d2e148ca5ba2a4fdc532/api/pixel</TrackingUrl>
<Tag>covid19</Tag>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 13 Aug 2020 17:06:44 -0400</PostedAt>
<EditAt>Thu, 13 Aug 2020 17:08:26 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="94853" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94853">
<Title>UMBC Staff Impersonation Phishing Scam</Title>
<Tagline>A Persistent Scam</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>DoIT has been notified of a phishing scam where the malicious actor was trying to impersonate a UMBC staffer. Below is an example of the email with the name, the email address of the sender, and the signature of the email removed for privacy reasons.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>Date: Wed, 12 Aug 2020</span></p><p><span>From: FORGED NAME &lt;<a href="mailto:.edu@gmail.com">.edu@gmail.com</a>&gt;</span></p><p><span>To: @umbc.edu</span></p><p><span>Subject: QUICK REQUEST</span></p><br><p><span>Are You Available??</span></p><br><p><span> --</span></p></td></tr></tbody></table></div><br><p><span>This and other similar phishing attempts seem to target certain departments of UMBC by trying to impersonate one of the staffers in that department. In previous cases of similar scams, if the user responds, the malicious actor could ask the user to send them money in the form of iTunes cards, gift cards, prepaid debit cards, money order, or even bitcoin.</span></p><br><p><span>In the case above, note that the scammer sent their email from a gmail and not a UMBC email. The email also tries to trick users by having “.edu” before the @gmail. </span></p><br><p><span>The scammer also tried to make the email look as legitimate as possible by putting an email signature that was meant to look similar to those the persons they were impersonating. The scammer also created a sense of urgency by having the email subject be in all caps and say “QUICK REQUEST.”</span></p><br><p><span>If you do receive this or a similar email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>DoIT has been notified of a phishing scam where the malicious actor was trying to impersonate a UMBC staffer. Below is an example of the email with the name, the email address of the sender, and...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94853/guest@my.umbc.edu/47af87135d2cc9f7ba8a0b7a101fbc00/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 13 Aug 2020 16:44:56 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="94833" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94833">
<Title>New "Economic Relief" Phishing Email</Title>
<Tagline>Fake Small Business Administration (SBA) Loan Offer</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>The Cybersecurity and Infrastructure Security Agency (CISA)</span><span> announced a new phishing email campaign spoofing the Small Business Administration (SBA). This email has the subject “SBA Application – Review and Proceed”</span><span> and contains a link to a fake SBA website login page, allowing scammers to harvest credentials from unsuspecting victims. Here is an image of the malicious site, provided in CISA’s alert.</span></p><p><span><span><img src="https://lh5.googleusercontent.com/fjNX2V0c4NEzzoOfZuahWZRy9h-zftQKmvoXPU0mNbrJrTe3HarTbxeIWkLyuSvgqqxAJAKg5NAKKhmjxurBuSW0Mk5wjnvQWS5D7Z74Aj4sLSOaJ_909-UCzDbZpZCUsVXwEt8L" width="624" height="362" style="max-width: 100%; height: auto;"></span></span></p><p><span>For more information, including a list of known sender addresses and URLs, please see the original alert at</span><a href="https://us-cert.cisa.gov/ncas/alerts/aa20-225a" rel="nofollow external" class="bo"><span>https://us-cert.cisa.gov/ncas/alerts/aa20-225a</span></a><span>.</span></p><p><span>If you receive any suspicious email, please do not respond or click any links. Instead, forward the message and full headers to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><p><span> </span></p><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>The Cybersecurity and Infrastructure Security Agency (CISA) announced a new phishing email campaign spoofing the Small Business Administration (SBA). This email has the subject “SBA Application –...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94833/guest@my.umbc.edu/6228f4ab21e5d55dd49980b0cd7d9757/api/pixel</TrackingUrl>
<Tag>covid19</Tag>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 13 Aug 2020 11:47:33 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94783" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94783">
<Title>Another Fake Cisco Job Scam</Title>
<Tagline>The Scam That Keeps On Taking</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Similar to other work from home phishing attempts targeting the UMBC community, this one follows the pattern. A malicious actor who claims to be from a company, in this case Cisco, offers the victim a job. This email also shows the subject line of “WORK FROM HOME” in all caps. An example of this phishing email can be seen below:</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: </span><span>steve mendez</span><span> &lt;</span><span><a href="mailto:stevemendez044@gmail.com">stevemendez044@gmail.com</a></span><span>&gt;</span></p><p><span>Date: Fri, Aug 7, 2020 at 2:18 PM</span></p><p><span>Subject: WORK FROM HOME</span></p><p><span>To: &lt;</span><span>@umbc.edu</span><span>&gt;</span></p><br><p><span>Cisco Systems Inc® is offering you a chance to secure a part time job. Kindly reply back with your alternate email address for more information.</span></p><p> </p><p><span>Kind Regards,</span></p><h3><span>steve mendez</span></h3><p><span> HR Manager/Consultant</span></p><p><span>Cisco Systems Inc®   </span></p></td></tr></tbody></table></div><p><span><br></span><span>Past phishing emails attempts like this one ask the victim to reply with their personal (non-UMBC) email. Then the malicious actor would ask for more personal information such as the phone number, address, current job, and even the birthdate of the victim.</span></p><br><p><span>After the victim responds, they would receive another email. This email would be confirming that the victim got the job and that the scammer would be sending the first paycheck. In scams similar to this one the scammer has been known to text victims too.</span></p><br><p><span>If you do receive this or a similar scam, please DO NOT respond any further or click on any URLs. If you have provided any banking or financial information, please notify your bank or financial institution immediately. If you have been sent a check, you should not attempt to cash or deposit it. If you have deposited a check already, please contact your bank and tell them that it may be part of a scam.</span></p><br><p><span>Whether or not you responded to the scam or not, please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.  We will also keep track of any other information you submit about the scammers, such as their phone numbers if you receive a text message from the malicious actor.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>Similar to other work from home phishing attempts targeting the UMBC community, this one follows the pattern. A malicious actor who claims to be from a company, in this case Cisco, offers the...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94783/guest@my.umbc.edu/633cbb8e38dfe6ee4cc86f3fcfd8eeeb/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 11 Aug 2020 22:27:51 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94781" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94781">
<Title>Account Data Breach: Chatbooks</Title>
<Tagline>A Data Breach Report</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>In March 2020, Chatbook, a photo print service, suffered a data breach. Approximately 15 million user records were put up for sale on a dark web marketplace. This information includes email address, names, phone numbers, social media profiles and password. </span></p><br><p><span>19 UMBC accounts were affected by this breach. The affected individuals have been notified via their UMBC emails and/or their alternate emails. If you have a Chatbooks account, please contact them to see if you have been affected by this breach.</span></p><br><p><span>This information was provided to Have I Been Pwned(HIBP) by </span><a href="https://dehashed.com/" rel="nofollow external" class="bo"><span>dehashed.com</span></a><span>.</span></p><br><br><p><span>For more information about the Chatbooks breach visit:</span></p><p><a href="https://www.bleepingcomputer.com/news/security/chatbooks-discloses-data-breach-after-data-sold-on-dark-web/" rel="nofollow external" class="bo"><span>https://www.bleepingcomputer.com/news/security/chatbooks-discloses-data-breach-after-data-sold-on-dark-web/</span></a></p><br><br><p><span>To setup a recovery email for your UMBC account follow the instructions here:</span></p><p><a href="https://my3.my.umbc.edu/groups/itsecurity/posts/94776" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity/posts/94776</span></a></p><br><br><p><span>If you have any questions or concerns email us: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>_________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><p><span>Forward it to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></p><br></div>
]]>
</Body>
<Summary>In March 2020, Chatbook, a photo print service, suffered a data breach. Approximately 15 million user records were put up for sale on a dark web marketplace. This information includes email...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94781/guest@my.umbc.edu/6df63f1fcda8fcd12fbbc2ddc84c7ddd/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 11 Aug 2020 22:21:52 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94779" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94779">
<Title>Powerball Scam Emails</Title>
<Tagline>A New Example Of An Old Scam</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>DoIT Security has received a new variation of a classic get-rich-quick scam, this time claiming to be from a Powerball winner who wishes to distribute millions of dollars, supposedly to lessen the impact of COVID-19. Over 5000 UMBC addresses received emails from this sender, most likely containing the same message.</span></p><p><span>From: "Bill and Helene" &lt;<a href="mailto:kkt-co@beige.plala.or.jp">kkt-co@beige.plala.or.jp</a>&gt;</span></p><p><span>Subject: We Have Private For Donation</span></p><p><span>Date: Tue, 11 Aug 2020 14:26:21 +0900</span></p><p><span> </span></p><p><span>--</span></p><p><span>The Corona Virus (COVID-19) Outbreak isn't just a major health</span></p><p><span>crisis -- It's also a large economic disruption leading to people</span></p><p><span>Losing their Jobs and making it harder to take care of their</span></p><p><span>Families.</span></p><p><span> </span></p><p><span>We know that a little financial support can go a Long Way.</span></p><p><span> </span></p><p><span>I'm Bill Lawrence from Sacramento California the Winner of 150 million</span></p><p><span>United State Dollars Jackpot from the Power ball lottery held on</span></p><p><span>December 16, 2019. My Jackpot was a gift from God to me.</span></p><p><span>Hence my entire Family has agreed to do this.</span></p><p><span>We are donating $75 million to Help individuals and Small Scale</span></p><p><span>Businesses around the world.</span></p><p><span>I write to inform you that Google in alliance with Microsoft and Yahoo has submitted your</span></p><p><span>"Email" to my request to receive a donation amount of $5,000,000</span></p><p><span>Please accept this Token as a Gift From me and My Family.</span></p><p><span>We await your urgent response Via email <a href="mailto:heleneandbill97@gmail.com">heleneandbill97@gmail.com</a></span></p><p><span> </span></p><p><span>Bill and Helene Lawrence</span></p><p><span><a href="https://www.powerball.com/winner-story/150-million-powerball-ticket-claimed">https://www.powerball.com/winner-story/150-million-powerball-ticket-claimed</a></span></p><p><span> </span></p><p><span>Messages like these, which promise large amounts of money, are most likely advance-fee scams. Also known as Nigerian Prince scams, or 419 scams, advance-fee scams promise a large amount of money that can be claimed after paying a comparatively small fee. After a victim pays the fee, the scammer may claim to need another fee, or may vanish. Either way, victims will never receive any money in return.</span></p><p><span>In addition to the irregular grammar and capitalization, note the From address with a .jp domain, and the time zone, UTC+0900. Both of these indicate that the message originated in Japan, not California. Although the URL provided appears to be legitimate, it does not indicate that the message is really from the Powerball winner. It is always best not to click links in suspicious emails, as they may contain malware, steal personal information, or, as in this case, simply provide misleading information when used in the context of a scam email.</span></p><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to <a href="mailto:security@umbc.edu">security@umbc.edu</a>.</span></p><p><span> </span></p><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><p><span> </span></p><p><span>To read more articles published by DoIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. <br></span></p></div>
]]>
</Body>
<Summary>DoIT Security has received a new variation of a classic get-rich-quick scam, this time claiming to be from a Powerball winner who wishes to distribute millions of dollars, supposedly to lessen the...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94779/guest@my.umbc.edu/fc85e5da18b9dd15ed396330d7c8776a/api/pixel</TrackingUrl>
<Tag>covid19</Tag>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 11 Aug 2020 22:18:23 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94778" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94778">
<Title>Government Imposter Scams</Title>
<Tagline>Scammers Pretend To Be From Government Agencies</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>In  the article linked below, the Better Business Bureau is warning of government imposter scams. In these scams, a malicious actor will call or even message the victim claiming to be from a government agency. Their goals are usually to steal the victim’s personal and financial information, to steal the victim’s  money or or to persuade the victim to install malware. </span></p><br><p><span>According to the article, most Americans have encountered this scam before. Research done by the Better Business Bureau found that the Social Security Administration, Service Canada, the Internal Revenue Service (IRS) and the Canada Revenue Agency are among the most impersonated. </span><span><br></span><span><br></span><span>Some examples of Social Security-related impersonation scams:</span><span><br><br></span></p><ul><li><p><span>Increase a benefit</span><span>: In this scam the malicious actor will claim that the victim is eligible for increased benefits, typically due to a cost of living increase. The malicious actor will request bank account details so that the money can be deposited into the victim’s account. Once the malicious actor has the banking information they are able to steal money from the account.</span></p></li><li><p><span>Restoring Social Security Number</span><span>: Some malicious actors will claim the victim's Social Security Number has been suspended. The malicious actor will ask the victim to pay for it to be restored. They may also ask for the victim's Social Security account information, which allows them to apply for benefits under the victims name.</span></p></li><li><p><span>Social Security Number used in a crime</span><span>, in this scam the malicious actor will threaten arrest if the victim does not respond immediately.</span><span><br><br></span></p></li></ul><p><span>When the IRS is used as a cover instead of the Social Security Agency the scams vary, though they have many similarities to the Social Security scams.  For instance,  the malicious actor may claim to be an IRS agent and threaten the victim with arrest for unpaid taxes or even fraud. </span></p><br><p><span>The only way to avoid being arrested, the victim is told,  is by paying a fine (or the unpaid taxes) immediately.  Victims are told to buy gift cards and to provide the caller with the number on the back of each card. But of course these threats are fake, and these are just scammers trying to use fear to get the victims money or information. </span></p><br><p><span>Just as with phishing scams, the malicious actors follow the headlines and change their scams with thet latest news. During the Covid-19 pandemic and after the passage of the Coronavirus Aid, Relief, and Economic Security (CARES) Act, scammers started to claim to be from the CDC or the United States Treasury Department in order to manipulate and steal personal and financial information from victims.</span></p><br><p><span>Some examples of Covid-19 related impersonation scams are: </span></p><br><ul><li><p><span>Relief benefits</span><span>: Malicious actors claiming to be from the IRS and offering to expedite benefits under the CARES Act.</span></p></li><li><p><span>Fake donations</span><span>: Malicious actors claiming to be from the CDC requesting donations. Email and text messages making these claims may arrive with malware or URLs that could cause harm to the victim's device.</span></p></li><li><p><span>Contact tracing scams</span><span>: Email, texts, or messages on social media claiming to be from contact tracers informing the victim that they have come in contact with someone who has tested positive for Covid-19. These scammers seek personal information and/or send messages that may contain malware. For official information on contact tracing efforts in Maryland please visit </span><a href="https://coronavirus.maryland.gov/pages/contact-tracing" rel="nofollow external" class="bo"><span>https://coronavirus.maryland.gov/pages/contact-tracing</span></a><span>.</span></p></li></ul><br><p><span>Scammers have also threatened arrest for missing jury duty, impersonated immigration officials threatening to deport the victim, and offered free money in the form of government grants.</span></p><br><p><span>Some red flags to watch for to see if the person claiming to be from a government agency is actually a malicious actor:</span></p><br><ul><li><p><span>The IRS generally first contacts people by the postal mail. Never provide your bank account or other personal information to anyone who calls you.</span></p></li><li><p><span>Don’t pay by gift cards. The IRS and other government agencies will not idemand or even accept payment using iTunes cards, gift cards, prepaid debit cards, money order, bitcoin or cash.</span></p></li><li><p><span>The IRS will never request personal or financial information by email, text, or any social media platform. Do not click on any links in unsolicited emails or text messages.</span></p></li><li><p><span>Social Security numbers are never “suspended”.</span></p></li><li><p><span>Caller ID cannot be trusted to confirm that the source is from a government agency. Look up the phone number for the agency and call to see if they are really trying to contact you.</span></p></li><li><p><span>The Social Security Administration will never threaten to arrest you because of an identity theft problem. </span></p></li></ul><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>For more information, please check out: </span></p><p><a href="https://www.bbb.org/article/news-releases/22775-government-impostors-study" rel="nofollow external" class="bo"><span>https://www.bbb.org/article/news-releases/22775-government-impostors-study</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>In  the article linked below, the Better Business Bureau is warning of government imposter scams. In these scams, a malicious actor will call or even message the victim claiming to be from a...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94778/guest@my.umbc.edu/0f76579417510b4e52653664556d6502/api/pixel</TrackingUrl>
<Tag>covid19</Tag>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 11 Aug 2020 21:35:32 -0400</PostedAt>
</NewsItem>

</News>
