<?xml version="1.0"?>
<News hasArchived="false" page="20" pageCount="29" pageSize="10" timestamp="Sun, 26 Apr 2026 06:52:16 -0400" url="https://beta.my.umbc.edu/groups/itsecurity/posts.xml?mode=activity&amp;page=20">
<NewsItem contentIssues="false" id="94513" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94513">
<Title>Recent Spear-phishing Emails</Title>
<Tagline>Phishers Want Your Phone Number</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>A new wave of Spear-phishing emails hit roughly 300 UMBC inboxes this weekend. An example is shown below, with the From field altered and the To field removed for privacy. There is no body in this particular email.</span></p><p><span>From: Forged Name &lt;<a href="mailto:name@gmail.com">name@gmail.com</a>&gt;</span></p><p><span>Date: Sat, Jul 25, 2020 at 9:26 AM</span></p><p><span>Subject: Send me your available text number?</span></p><p><span>To:</span></p><p><span> </span></p><p><span>This malicious email uses the name of a UMBC staffer in an attempt to appear credible. However, the Gmail address, unnatural-sounding subject line, and lack of body content are all clear red flags. More generally, be wary of emails from unverified sources with any urgent but unexplained request. Similar emails that were reported previously were precursors to gift card scams.</span></p><p><span>The best way to avoid these scams is to simply not respond. Instead, report suspicious emails by forwarding them to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. Include the full email headers by following the instructions at</span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>For more information on scams and phishing, please visit </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=36766495" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=36766495</span></a><span>.</span></p><br><span>To read more articles published by DOIT visit: </span><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>.</span></div>
]]>
</Body>
<Summary>A new wave of Spear-phishing emails hit roughly 300 UMBC inboxes this weekend. An example is shown below, with the From field altered and the To field removed for privacy. There is no body in this...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94513/guest@my.umbc.edu/0c421632f321749bc96782a50e9c9d7e/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 28 Jul 2020 16:28:40 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94486" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94486">
<Title>Zoom-Themed Phishing Campaign</Title>
<Tagline>Phishing Campaign Exploits Remote Meeting Users</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Abnormal Security recently found a Zoom-themed phishing campaign. This campaign is using fake Zoom alerts to steal Microsoft 356 credentials. With the boom in teleworking, workers at many organizations are using products like Zoom.  This has created an opportunity for malicious actors to create phishing campaigns that capitalize on this.</span><span><br></span><span><br></span><span>A malicious campaign is sending out emails claiming to be legitimate Zoom notifications and spoofing the actual Zoom email address. The email claims that the user will not be able to use the platform until they click on the embedded link to reactivate their account.</span></p><br><p><span>On clicking the link, the user is taken to a fake Office 365 login page. Entering any information into this login will not reactivate any account. It will instead give the username and password entered to the malicious actors.</span><span><br></span><span><br></span><span>The article also states that they have seen malicious actors spoof messages from not only Zoom but of WebEx as well. These campaigns are designed to steal credentials or even to</span></p><p><span>distribute malware.</span></p><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><p><span><br></span><span>For more information, please check out: </span><span><br></span><a href="https://www.bankinfosecurity.com/zoom-themed-phishing-campaign-targets-office-365-credentials-a-14600" rel="nofollow external" class="bo"><span>https://www.bankinfosecurity.com/zoom-themed-phishing-campaign-targets-office-365-credentials-a-14600</span></a></p></div>
]]>
</Body>
<Summary>Abnormal Security recently found a Zoom-themed phishing campaign. This campaign is using fake Zoom alerts to steal Microsoft 356 credentials. With the boom in teleworking, workers at many...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94486/guest@my.umbc.edu/3cf7b8862aff5064f79b0620c45c0724/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 27 Jul 2020 17:53:34 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94421" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94421">
<Title>Phishing Scam Uses Fake Docusign Messages</Title>
<Tagline>Docusign Fakes Target UMBC And Other Universities</Tagline>
<Body>
<![CDATA[
    <div class="html-content">The Division of Information Technology has received notices of a faked Docusign email sent out this week.  The subject line of the fake is:<br><br><div><pre>re:Docusign - Review File - &lt;email address&gt;</pre></div><div><strong><br></strong></div><div>The content is something like:</div><div><br></div><div><pre>Attention &lt;userid&gt;,<br><br>Please DocuSign , - CARES Act.pdf<br>Newest Regulatons for , PUA , PPP , SBA Listed.<br><br>Thank You,<br>umbc.edu<br></pre></div><div><br></div><div><br></div><div><br></div><div>If you received this message and clicked the link, you would have been taken to a malicious website intended for identity theft and/or malware installation on your computer.</div><div><br></div><div>If you went to the website and either downloaded an application or entered your password or other personal information, please let us know by sending email to:</div><div><br></div><div><em><a href="mailto:security@umbc.edu">security@umbc.edu</a></em></div><div><em><br></em></div><div><em><br></em></div><div>If you receive a Docusign message that you think is fake,  please forward it to:</div><br><div><em><a href="mailto:spam@docusign.com">spam@docusign.com</a><br></em></div><div><em><br></em></div><div>You can find out more about Docusign fraud-reporting at:</div><div><br></div><div><a href="https://www.docusign.com/trust/security/incident-reporting#:~:text=Dedicated%20threat%20reporting%20channels&amp;text=DocuSign%2Dthemed%20fraudulent%20emails%20and,com%20and%20delete%20it%20immediately." rel="nofollow external" class="bo">Recognizing and Reporting Suspicious
     Activities Support Site</a><br></div><div><em><br></em></div><div><em><br></em></div><div>Thank you,</div><div><br></div><div>- Andy Johnston<br></div></div>
]]>
</Body>
<Summary>The Division of Information Technology has received notices of a faked Docusign email sent out this week.  The subject line of the fake is:    re:Docusign - Review File - &lt;email address&gt;...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94421/guest@my.umbc.edu/601c02a7164f6ad4f79284f808b49941/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 22 Jul 2020 16:12:28 -0400</PostedAt>
<EditAt>Wed, 22 Jul 2020 17:05:27 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="94420" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94420">
<Title>Part Time Job Phishing Alert: CORNERSTONE JOB OFFER</Title>
<Tagline>Fake Job Scams Target UMBC Students</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>During the past week, DOIT has received notifications of several phishing emails. Below is a sample of a Phishing message that over 600 UMBC students have received. For privacy purposes the To field was removed.</span></p><br><p><span>From: Summer Woodforest &lt;</span><a href="mailto:summerwoodforest@gmail.com" rel="nofollow external" class="bo"><span>summerwoodforest@gmail.com</span></a><span>&gt; </span></p><p><span>Date: Tue, Jul 21, 2020 at 8:30 AM</span></p><p><span>Subject: CORNERSTONE JOB OFFER.</span></p><br><p><span>Dear student,</span></p><br><p><span>   We got your contact through your school database and I'm happy to inform you that our reputable company Cornerstone® is currently running a student empowerment program. This program is completely school oriented as it has been designed not to deter you from all school activities which is priority for you and this organisation. This program is to help loyal and hardworking students like you secure a part time job with an attractive weekly salary.</span></p><p><span>TO PROCEED WITH THIS JOB OFFER, KINDLY REPLY TO THIS MAIL WITH YOUR ALTERNATE E-MAIL ADDRESS IN ORDER TO RECEIVE THE FULL JOB DESCRIPTION.</span></p><br><p><span>Best Regards,</span></p><br><p><span>Summer Wood,</span></p><p><span>HR Recruit Manager/Consultant</span></p><p><span>Cornerstone®,</span></p><p><span>Staffing-Solutions</span></p><br><p><span>Similar phishing emails were received from the following addresses listed below: </span></p><ul><li><p><span>Gavan Ryan &lt;</span><a href="mailto:ryangavan724@gmail.com" rel="nofollow external" class="bo"><span>ryangavan724@gmail.com</span></a><span>&gt;</span></p></li><li><p><span>Clerk Trevor &lt;</span><a href="mailto:clerktrevor@gmail.com" rel="nofollow external" class="bo"><span>clerktrevor@gmail.com</span></a><span>&gt; </span></p></li></ul><br><p><span>If you have received any message similar to the one listed above, please forward the message to </span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.  Please attach the email headers, information on how to find the email headers can be found here: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>DO NOT RESPOND to this email, if you have done so already please contact us immediately at </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. </span></p><br><br><p><span>For more information on scams and phishing handling, please visit </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=36766495" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=36766495</span></a></p><br><p><span>To read more articles published by DOIT visit: </span><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a></p></div>
]]>
</Body>
<Summary>During the past week, DOIT has received notifications of several phishing emails. Below is a sample of a Phishing message that over 600 UMBC students have received. For privacy purposes the To...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94420/guest@my.umbc.edu/afe2db17898b22d485373aa9643dd137/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 22 Jul 2020 14:52:41 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94419" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94419">
<Title>Fake Covid-19 Fund Scam</Title>
<Tagline>No.  The FTC Is NOT Offering You Any Money</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Fake Covid-19 Fund Scam</span></p><br><br><p><span>The FTC posted an article warning of a phishing scam that they recently discovered. In this scam, the malicious actor is sending email claiming to be from the FTC and saying that users could get money from a Covid-19 “Global Empowerment Fund.” All that is required of the user is to respond with their bank account information.</span><span><br></span><span><br></span><span>This email is a scam.</span><span>  It is </span><span>not </span><span>from the FTC, there is </span><span>no </span><span>money and there is </span><span>no </span><span>fund. The FTC says that they will never contact you by phone, email, text message, or by social media to ask for financial information, this includes your social security number. They also state that any stimulus checks will be from the IRS , not the FTC.</span></p><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> and delete the message.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>For more information, please check out: </span></p><p><a href="https://www.consumer.ftc.gov/blog/2020/06/fake-emails-about-fake-money-fake-covid-19-fund" rel="nofollow external" class="bo"><span>https://www.consumer.ftc.gov/blog/2020/06/fake-emails-about-fake-money-fake-covid-19-fund</span></a></p></div>
]]>
</Body>
<Summary>Fake Covid-19 Fund Scam    The FTC posted an article warning of a phishing scam that they recently discovered. In this scam, the malicious actor is sending email claiming to be from the FTC and...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94419/guest@my.umbc.edu/18d39ec7d1971003e8881366aa63b703/api/pixel</TrackingUrl>
<Tag>covid19</Tag>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 22 Jul 2020 14:49:56 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94418" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94418">
<Title>Phishing Email Subject Lines</Title>
<Tagline>A Guide To Common Phishing Email Subjects</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>With COVID-19 and associated restrictions remaining prevalent, many malicious actors have used the opportunity to update their phishing email campaigns. The article linked below explains some of the ways malicious actors try and trick people into giving up their information or even into installing malware.</span></p><br><p><span>The article states that many of the emails will use subject lines like coronavirus, work reopening, rescheduled meetings, stimulus payments, and new vacation policies. Malicious actors also craft themed emails to look like popular social media sites like Facebook and LinkedIn.</span></p><br><p><span>For LinkedIn they noticed subject lines "You appeared in new searches this week," "People are looking at your LinkedIn profile," "Please add me to your LinkedIn Network," and "LinkedIn Password Reset."</span></p><br><p><span> Facebook sees phishing emails using subject lines like "Your Friend Tagged a Photo of You" and "Your friend tagged you in photos on Facebook." Phishing campaigns from Twitter were said to try and entice people with subject lines similar to "Someone has sent you a Direct Message on Twitter."</span></p><br><p><span>Other subjects included "A login alert for Chrome on Motorola Moto X," "New voice message at 1:23AM," and "55th Anniversary and Free Pizza". The article also describes some general subjects to look out for:</span></p><br><ul><li><p><span>Password Check Required Immediately</span></p></li><li><p><span>Vacation Policy Update</span></p></li><li><p><span>Branch/Corporate Reopening Schedule</span></p></li><li><p><span>COVID-19 Awareness</span></p></li><li><p><span>Coronavirus Stimulus Checks</span></p></li><li><p><span>List of Rescheduled Meetings Due to COVID-19</span></p></li><li><p><span>Confidential Information on COVID-19</span></p></li><li><p><span>COVID-19 - Now airborne, Increased community transmission</span></p></li><li><p><span>Fedex Tracking</span></p></li><li><p><span>Your meeting attendees are waiting</span><span><br><br></span></p></li></ul><p><span>According to the article, the most common subject lines within phishing emails found “in-the-wild” in the last quarter were:</span></p><br><ul><li><p><span>Microsoft: Abnormal log in activity on Microsoft account</span></p></li><li><p><span>Chase: Stimulus Funds</span></p></li><li><p><span>HR: Company Policy Notification: COVID-19 - Test &amp; Trace Guidelines</span></p></li><li><p><span>Zoom: Restriction Notice Alert</span></p></li><li><p><span>Jira: [JIRA] A task was assigned to you</span></p></li><li><p><span>HR: Vacation Policy Update</span></p></li><li><p><span>Ring: Karen has shared a Ring Video with you</span></p></li><li><p><span>Workplace: [company_name] invited you to use Workplace</span></p></li><li><p><span>IT: ATTENTION: Security Violation</span></p></li><li><p><span>Earn money working from home</span><span><br><br></span></p></li></ul><p><span>At UMBC some of the most common subject lines for phishing emails seen recently have been “UMBC JOB OPPORTUNITY”, “CORNERSTONE STUDENT JOB OFFER”, “CORNERSTONE JOB OFFER”, “UMBC COVID-19 INFORMATION”, “UMBC COVID-19 PART TIME JOB OFFER” and “WORK FROM HOME.”</span><span><br></span><span><br></span><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> and delete the message.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>For more information, please check out: </span></p><p><a href="https://www.techrepublic.com/article/watch-out-for-these-subject-lines-in-email-phishing-attacks/" rel="nofollow external" class="bo"><span>https://www.techrepublic.com/article/watch-out-for-these-subject-lines-in-email-phishing-attacks/</span></a><span> <br></span></p></div>
]]>
</Body>
<Summary>With COVID-19 and associated restrictions remaining prevalent, many malicious actors have used the opportunity to update their phishing email campaigns. The article linked below explains some of...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94418/guest@my.umbc.edu/f495c17d1f174c06aa6488841c31760d/api/pixel</TrackingUrl>
<Tag>covid19</Tag>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 22 Jul 2020 14:45:53 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94417" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94417">
<Title>Limited Part-Time Offers</Title>
<Tagline>Yet AnotherJob Scam</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>The email below is an example of a recent job scam phishing email that has been going around campus. This email, like many other job scam emails, tries to trick users into giving up their personal information like the users address, phone number, and personal email address.</span></p><br><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: </span><span>Jennifer Johnston</span><span> &lt;</span><span><a href="mailto:jenniferjohnston32@gmail.com">jenniferjohnston32@gmail.com</a></span><span>&gt;</span></p><p><span>Date: Fri, Jul 17, 2020, 4:07 PM</span></p><p><span>Subject: Limited Part-Time Offers.</span></p><p><span>To: &lt;</span><span> @umbc.edu</span><span>&gt;</span></p><br><br><p><span>Dear Student,</span></p><p><span>     I'm happy to inform you that our reputable company The Amynta Group® is currently running a part time programme suitable for students. The programme is to help interested students secure a part time job which does not deter you from doing any other. </span></p><p> </p><p><span>KINDLY EMAIL BACK IF INTERESTED IN THIS JOB POSITION.</span></p><p> </p><p><span>Best Regards,</span></p><p><span>Jennifer.</span></p><p><span>Recruiting Manager </span></p><p><span>The Amynta Group®</span></p></td></tr></tbody></table></div><br><br><p><span>If you do receive this or any other email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p></div>
]]>
</Body>
<Summary>The email below is an example of a recent job scam phishing email that has been going around campus. This email, like many other job scam emails, tries to trick users into giving up their personal...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94417/guest@my.umbc.edu/853b31f1996cec91d7eb022ccd476d48/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 22 Jul 2020 14:38:16 -0400</PostedAt>
<EditAt>Wed, 22 Jul 2020 14:46:22 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="94345" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94345">
<Title>Tips to Help Protect Against Smishing Scams</Title>
<Tagline>Scammer Don't Just Use Email</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Smishing scams are a type of phishing scam which occurs when a malicious actor sends text messages or direct messages. They follow a similar pattern of acting as if they were from a trusted source like banks, government agencies, or even friends and family, trying to trick users into clicking a malicious link or possibly giving personal and financial information.</span></p><br><p><span>In recent years smishing attacks have started to become more numerous and sophisticated. Just like with phishing attacks, smishing also spikes during a crisis like COVID-19. These attacks are designed to exploit the public’s fears and anxieties, making their victims an easier target. </span><span><br></span><span><br></span><span>According to the article below, many more adults and children will open a text message or direct message on average compared to an email. Malicious actors can also automate the sending of text and direct messages to thousands or even millions of phone numbers and, unlike emails, there is no viable way for a user to block or flag suspicious messages.</span><span><br></span><span><br></span><span>These scams are similar to other phishing scams. They will still instruct the user to perform actions that could be harmful. Some of these actions might include: </span></p><ul><li><p><span>Replying to the text or direct message with personal or financial information.</span></p></li><li><p><span>Clicking a link that downloads malicious files or directs them to a website designed to gain the users personal or financial information.</span></p></li><li><p><span>Asking the user to call a ‘customer service’ number.</span></p></li><li><p><span>Asking the user to wire money to the malicious actors.</span><span><br><br></span></p></li></ul><p><span>Tips on how to spot and avoid smishing attacks:</span></p><ul><li><p><span>Do not click on a link or call a number from an unknown number.</span></p></li><li><p><span>Do not submit personal information to an unknown number.</span></p></li><li><p><span>If possible try to verify the authenticity of the message by finding the sender’s website and official contact details online. For example if a message is claiming to be from your bank, check the bank's website to find the real contact information.</span></p></li><li><p><span>If it looks too good to be true, it probably is too good to be true.</span></p></li><li><p><span>Delete all suspicious texts.</span></p></li><li><p><span>If the sender has a ‘5000’ number, the message was sent via email and could be malicious.</span></p></li><li><p><span>If the sender is anything other than a cell phone number, the message may have been sent via email and could be malicious.</span></p></li><li><p><span>Block unknown numbers if possible.</span></p></li></ul><br><br><p><span>For more information, please check out: </span></p><p><a href="https://portswigger.net/daily-swig/what-is-smishing-how-to-protect-against-text-message-phishing-scams" rel="nofollow external" class="bo"><span>https://portswigger.net/daily-swig/what-is-smishing-how-to-protect-against-text-message-phishing-scams</span></a></p></div>
]]>
</Body>
<Summary>Smishing scams are a type of phishing scam which occurs when a malicious actor sends text messages or direct messages. They follow a similar pattern of acting as if they were from a trusted source...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94345/guest@my.umbc.edu/5551cec3c68635f6294850df8d21610f/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 17 Jul 2020 12:40:22 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94288" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94288">
<Title>SIM Swap Scams</Title>
<Tagline>Make Sure Your Phone Stays Yours</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>With so many online services associating phone numbers with a person’s identity, it is more important than ever to ensure that malicious actors cannot take control of your number. However, a growing scam called SIM swapping seeks to do just that. Using personal information found or bought online, scammers can call a cell phone service provider while posing as a customer and ask to have the victim’s number transferred to the scammer’s phone. Without the proper precautions, this can all be done without any contact with the real customer.</span></p><p><span>SIM swap scams can cause more harm than just a fraudulent phone bill. Combined with other personal information, access to a victim’s phone number can allow scammers to access a variety of online accounts, all while posing as the legitimate owner of those accounts. This could even allow access to the victim’s email and online banking accounts. It also allows scammers to bypass any SMS or phone call-based two-factor authentication.</span></p><p><span>Phone service providers have added a few security measures to help stop SIM swap scams, but they rely on you to keep them secure. First, you can set up a PIN that must be provided before a SIM swap can be completed. Your PIN should be kept private, and should not be based on other personal information, like your birthday. Additionally, you should never send a security code from your provider to the sender of an unexpected text or phone call. Scammers may pose as your service provider before or while attempting a SIM swap scam in an effort to trick you into giving up verification codes sent by your provider. If you receive a code, it is best to contact your provider directly using their official contact information, not a number sent in a text.</span></p><p><span>For more information, please see:</span></p><p><a href="https://scambusters.org/simswap.html" rel="nofollow external" class="bo"><span>https://scambusters.org/simswap.html</span></a></p><p><a href="https://www.wired.com/story/sim-swap-attack-defend-phone/" rel="nofollow external" class="bo"><span>https://www.wired.com/story/sim-swap-attack-defend-phone/</span></a></p><br><br></div>
]]>
</Body>
<Summary>With so many online services associating phone numbers with a person’s identity, it is more important than ever to ensure that malicious actors cannot take control of your number. However, a...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94288/guest@my.umbc.edu/5fb4593af090a3a49d51d3ed14d90b71/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 14 Jul 2020 20:31:22 -0400</PostedAt>
<EditAt>Tue, 14 Jul 2020 20:32:34 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="94262" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94262">
<Title>Securing Mobile Devices</Title>
<Tagline>Stay Secure Online</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Mobile devices are now an integral part of our daily lives. They make communication and access to information incredibly convenient from virtually anywhere. This convenience can make it easy to forget that mobile devices are vulnerable to many of the same threats as computers. Here are some common risks to watch out for when using your device.</span></p><br><p><span>Unsecured internet connections –</span><span> Free public Wi-Fi is often unencrypted, meaning other people on the network may be able to access any data you send or receive. Depending on your settings, your device may connect to these networks automatically in order to decrease mobile data use. Consider turning off this feature for more control over your data. However, wired connections in public places may not be secure either, and can be tampered with and monitored or used to send malware to your device. In either case, it is important to know where your connection is coming from and limit transmission of private and sensitive data accordingly.</span></p><p><span>Malicious apps –</span><span> Downloaded apps often request a number of permissions that they claim are necessary in order for the app to function. If granted, a malicious app can easily take control of your device. To avoid this risk, only download verified apps from reputable sources, like Apple’s App Store or Google Play. For an example of a malicious app and the damage it can do, check out this article about how one app spreads ransomware:</span><a href="https://itsecurity.umbc.edu/critical/?id=93247" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?id=93247</span></a><span>.</span></p><p><span>Loss or theft – </span><span>Mobile devices contain a plethora of personal data, all of which can be valuable to unscrupulous individuals. Therefore, it is just as important to use a strong password for your phone as it is for your computer. A short PIN may not be enough to stop determined thieves from stealing your data. Consider adding 2-factor authentication by enabling both the password and fingerprint recognition settings, if possible. Finally, remember that remote wiping is an option for cases where your device is permanently lost. This will allow you to delete all data remotely, preventing it from being stolen. For more information on remote wipe, see</span><a href="https://insights.samsung.com/2020/05/28/3-things-you-should-know-about-remote-wipe-2/" rel="nofollow external" class="bo"><span>https://insights.samsung.com/2020/05/28/3-things-you-should-know-about-remote-wipe-2/</span></a><span>.</span></p><p><span> </span></p><p><span>For additional information, check out: </span></p><p><a href="https://cybersecurity.osu.edu/cybersecurity-you/protect-personal-devices/mobile-devices" rel="nofollow external" class="bo"><span>https://cybersecurity.osu.edu/cybersecurity-you/protect-personal-devices/mobile-devices</span></a></p><p><a href="https://www.pandasecurity.com/mediacenter/panda-security/mobile-security-tips/" rel="nofollow external" class="bo"><span>https://www.pandasecurity.com/mediacenter/panda-security/mobile-security-tips/</span></a></p><br><br></div>
]]>
</Body>
<Summary>Mobile devices are now an integral part of our daily lives. They make communication and access to information incredibly convenient from virtually anywhere. This convenience can make it easy to...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94262/guest@my.umbc.edu/4f67c84fbf393f15b7aa61fd4beeb760/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 13 Jul 2020 16:36:00 -0400</PostedAt>
</NewsItem>

</News>
