<?xml version="1.0"?>
<News hasArchived="false" page="4" pageCount="29" pageSize="10" timestamp="Sun, 26 Apr 2026 16:22:59 -0400" url="https://beta.my.umbc.edu/groups/itsecurity/posts.xml?mode=activity&amp;page=4">
<NewsItem contentIssues="true" id="128974" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/128974">
<Title>Account Data Breach: START</Title>
<Tagline>Russian streaming service impacts over 7 million accounts</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><div>In August 2022, news broke of an attack against the Russian streaming service "START". The incident led to the exposure of 44 million records containing 7.4 million unique email addresses. The impacted data also included the subscriber's country and password hash. START subsequently acknowledged the incident in a Telegram post and stated that the data dated back to 2021.</div><div><br></div><div>One UMBC account was a victim of this breach. The victim is being notified via their UMBC email and/or their alternate email. If you have an account with START, please contact them to see if you have been affected by this breach. To see if you were involved in any other breach visit: <a href="https://haveibeenpwned.com/">https://haveibeenpwned.com/</a>.</div><div><br></div><div>More about the START data breach:</div><div><a href="https://www.bleepingcomputer.com/news/security/russian-streaming-platform-confirms-data-breach-affecting-75m-users/">https://www.bleepingcomputer.com/news/security/russian-streaming-platform-confirms-data-breach-affecting-75m-users/</a></div></div><div><br></div><div>If you have any questions or concerns, email us at <a href="mailto:security@umbc.edu">security@umbc.edu</a>.</div><div><br></div><div>Information about this breach was provided to us by Have I Been Pwned (HIBP). </div><div> </div><div>______________________________________________________________________________________________________________________________________</div><div>Receive any suspicious emails?</div><div>Forward them to <a href="mailto:security@umbc.edu">security@umbc.edu</a> along with the email headers. For instructions, visit: <a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970">https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</a>.</div><div><br></div><div>Follow us on myUMBC: <a href="https://my3.my.umbc.edu/groups/itsecurity">https://my3.my.umbc.edu/groups/itsecurity</a>.</div></div>
]]>
</Body>
<Summary>In August 2022, news broke of an attack against the Russian streaming service "START". The incident led to the exposure of 44 million records containing 7.4 million unique email addresses. The...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/128974/guest@my.umbc.edu/967983b89900a274c9e058a36c6afce8/api/pixel</TrackingUrl>
<Tag>edb</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/974/45ca75a5b04745b3f08b746b39c5afa3/xxlarge.jpg?1667588368</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/974/45ca75a5b04745b3f08b746b39c5afa3/xlarge.jpg?1667588368</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/974/45ca75a5b04745b3f08b746b39c5afa3/large.jpg?1667588368</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/974/45ca75a5b04745b3f08b746b39c5afa3/medium.jpg?1667588368</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/974/45ca75a5b04745b3f08b746b39c5afa3/small.jpg?1667588368</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/974/45ca75a5b04745b3f08b746b39c5afa3/xsmall.jpg?1667588368</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/974/45ca75a5b04745b3f08b746b39c5afa3/xxsmall.jpg?1667588368</ThumbnailUrl>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Fri, 04 Nov 2022 15:08:12 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="128816" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/128816">
<Title>Account Data Breach: TAP Air Portugal</Title>
<Tagline>Portugal's national airline victim of ransomware attack</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div>In August 2022, the Portuguese airline TAP Air Portugal was the target of a ransomware attack perpetrated by the Ragnar Locker gang who later leaked the compromised data via a public dark web site. Over five million unique email addresses were exposed alongside other personal data including names, genders, dates of birth, phone numbers, and physical addresses.</div><div><br></div><div>Fifteen UMBC accounts were potential victims of this breach. The victims are being notified via their UMBC emails and/or their alternate emails. If you have an account with TAP Air Portugal, please contact them to see if you have been affected by this breach. To see if you were involved in any other breach visit <a href="https://haveibeenpwned.com/">https://haveibeenpwned.com/</a>.</div><div><br></div><div>More about the TAP Air Portugal data breach:</div><div><a href="https://www.bleepingcomputer.com/news/security/ragnar-locker-ransomware-claims-attack-on-portugals-flag-airline/">https://www.bleepingcomputer.com/news/security/ragnar-locker-ransomware-claims-attack-on-portugals-flag-airline/</a></div><div><br></div><div>If you have any questions or concerns, email us at <a href="mailto:security@umbc.edu">security@umbc.edu</a>.</div><div><br></div><div>Information about this breach was provided to us by Have I Been Pwned (HIBP). </div><div> </div><div>______________________________________________________________________________________________________________________________________</div><div>Receive any suspicious emails?</div><div>Forward them to <a href="mailto:security@umbc.edu">security@umbc.edu</a> along with the email headers. For instructions, visit: <a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970">https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</a>.</div><div><br></div><div>Follow us on myUMBC: <a href="https://my3.my.umbc.edu/groups/itsecurity">https://my3.my.umbc.edu/groups/itsecurity</a>.</div></div>
]]>
</Body>
<Summary>In August 2022, the Portuguese airline TAP Air Portugal was the target of a ransomware attack perpetrated by the Ragnar Locker gang who later leaked the compromised data via a public dark web...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/128816/guest@my.umbc.edu/00d4106f0cec7ba1e21de54bf420b7b3/api/pixel</TrackingUrl>
<Tag>edb</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/816/f81234f0ac157e55a7e01005e4392a8a/xxlarge.jpg?1666983644</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/816/f81234f0ac157e55a7e01005e4392a8a/xlarge.jpg?1666983644</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/816/f81234f0ac157e55a7e01005e4392a8a/large.jpg?1666983644</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/816/f81234f0ac157e55a7e01005e4392a8a/medium.jpg?1666983644</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/816/f81234f0ac157e55a7e01005e4392a8a/small.jpg?1666983644</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/816/f81234f0ac157e55a7e01005e4392a8a/xsmall.jpg?1666983644</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/816/f81234f0ac157e55a7e01005e4392a8a/xxsmall.jpg?1666983644</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Fri, 28 Oct 2022 15:07:34 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="128602" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/128602">
<Title>Account Data Breach: Twitter</Title>
<Tagline>Hackers list database of 5.4 million records for sale</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><span>In January 2022, a vulnerability in Twitter's platform allowed an attacker to build a database of email addresses and phone numbers of millions of users of the social platform. In a disclosure notice later shared in August 2022, Twitter advised that the vulnerability was related to a bug introduced in June 2021 and that they are directly notifying impacted customers. The impacted data included either email address or phone number alongside other public information including username, display name, bio, location, and profile photo. The data, which included the information on 5.4 million accounts, was posted for sale with an asking price of more than $30,000.</span></div><div><span><br></span></div><div><span>Of the accounts listed, approximately 56 UMBC accounts were indicated in this potential breach. The victims are being notified via their UMBC emails. If you have an account with Twitter, please contact them to see if you have been affected by this breach.</span></div><div><span><br></span></div><div><span>More information on the Twitter potential breach (and subsequent extortion attempts) can be seen at an article from Bleeping Computer: <a href="https://www.bleepingcomputer.com/news/security/twitter-confirms-zero-day-used-to-expose-data-of-54-million-accounts/">https://www.bleepingcomputer.com/news/security/twitter-confirms-zero-day-used-to-expose-data-of-54-million-accounts/</a></span></div><div><span><br></span></div><div><span>If you have any questions or concerns, please email us at <a href="mailto:security@umbc.edu">security@umbc.edu</a>. Information about this potential breach was provided to us by Have I Been Pwned (HIBP): <a href="https://haveibeenpwned.com">https://haveibeenpwned.com</a>.</span></div><hr><div><span>Receive any suspicious emails?</span></div><div><span><br></span></div><div><span>Forward it to <a href="mailto:security@umbc.edu">security@umbc.edu</a> along with the email headers. For instructions, visit: <a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970">https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</a>.</span></div><div><span><br></span></div><div><span>Follow us on <a href="myUMBC:https://my3.my.umbc.edu/groups/itsecurity">myUMBC:https://my3.my.umbc.edu/groups/itsecurity</a>.</span></div></div>
]]>
</Body>
<Summary>In January 2022, a vulnerability in Twitter's platform allowed an attacker to build a database of email addresses and phone numbers of millions of users of the social platform. In a disclosure...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/128602/guest@my.umbc.edu/8677200beb2ca3005a4d2000ae48c886/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/602/1580743208a1d7a22b65875c78ca84ba/xxlarge.jpg?1666206795</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/602/1580743208a1d7a22b65875c78ca84ba/xlarge.jpg?1666206795</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/602/1580743208a1d7a22b65875c78ca84ba/large.jpg?1666206795</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/602/1580743208a1d7a22b65875c78ca84ba/medium.jpg?1666206795</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/602/1580743208a1d7a22b65875c78ca84ba/small.jpg?1666206795</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/602/1580743208a1d7a22b65875c78ca84ba/xsmall.jpg?1666206795</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/602/1580743208a1d7a22b65875c78ca84ba/xxsmall.jpg?1666206795</ThumbnailUrl>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Wed, 19 Oct 2022 15:23:27 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="128572" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/128572">
<Title>Account Data Breach: StripChat</Title>
<Tagline>Millions of records exposed from an adult cam site</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><span>In November 2021, the live sex cams and adult chat website StripChat left several databases exposed and unsecured. In June the following year, over 65 million StripChat records appeared on a popular hacking forum. The exposed data included usernames, email addresses and IP addresses, biographical data, transaction data, and chat messages.</span></div><div><span><br></span></div><div><span>Of the accounts listed, approximately four UMBC accounts were indicated in this potential breach. The victims have been notified via their UMBC email. If you have an account with Stripchat, please contact them to see if you have been affected by this breach.</span></div><div><span><br></span></div><div><span>More information on the StripChat breach (and subsequent extortion attempts) can be seen at an article from The Record: <a href="https://therecord.media/adult-cam-site-stripchat-exposes-the-data-of-millions-of-users-and-cam-models/">https://therecord.media/adult-cam-site-stripchat-exposes-the-data-of-millions-of-users-and-cam-models/</a></span></div><div><span><br></span></div><div><span>If you have any questions or concerns, please email us at <a href="mailto:security@umbc.edu">security@umbc.edu</a>. Information about this potential breach was provided to us by Have I Been Pwned (HIBP): <a href="https://haveibeenpwned.com">https://haveibeenpwned.com</a>.</span></div><hr><div><span>Receive any suspicious emails?</span></div><div><span><br></span></div><div><span>Forward it to <a href="mailto:security@umbc.edu">security@umbc.edu</a> along with the email headers. For instructions, visit: <a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970">https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</a>.</span></div><div><span><br></span></div><div><span>Follow us on <a href="myUMBC:https://my3.my.umbc.edu/groups/itsecurity">myUMBC:https://my3.my.umbc.edu/groups/itsecurity</a>.</span></div></div>
]]>
</Body>
<Summary>In November 2021, the live sex cams and adult chat website StripChat left several databases exposed and unsecured. In June the following year, over 65 million StripChat records appeared on a...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/128572/guest@my.umbc.edu/2c8176cd85861b131b7c89fc52a2808c/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/572/69c8124eec2f7e45217a63461dcbfa5b/xxlarge.jpg?1666205828</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/572/69c8124eec2f7e45217a63461dcbfa5b/xlarge.jpg?1666205828</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/572/69c8124eec2f7e45217a63461dcbfa5b/large.jpg?1666205828</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/572/69c8124eec2f7e45217a63461dcbfa5b/medium.jpg?1666205828</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/572/69c8124eec2f7e45217a63461dcbfa5b/small.jpg?1666205828</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/572/69c8124eec2f7e45217a63461dcbfa5b/xsmall.jpg?1666205828</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/572/69c8124eec2f7e45217a63461dcbfa5b/xxsmall.jpg?1666205828</ThumbnailUrl>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Wed, 19 Oct 2022 15:03:55 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="128571" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/128571">
<Title>Account Data Breach: SitePoint</Title>
<Tagline>Shared data has already been used in attacks</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><span>In June 2020, the web development site SitePoint suffered a data breach that exposed over one million customer records. Impacted data included email and IP addresses, names, usernames, bios and passwords stored as bcrypt hashes.</span></div><div><span><br></span></div><div><span>Of the accounts listed, approximately 17 UMBC accounts were indicated in this potential breach. The victims are being notified via their UMBC emails. If you have an account with SitePoint, please contact them to see if you have been affected by this breach.</span></div><div><span><br></span></div><div><span>More information on the SitePoint breach (and subsequent extortion attempts) can be seen at an article from Bleeping Computer: <a href="https://www.bleepingcomputer.com/news/security/sitepoint-discloses-data-breach-after-stolen-info-used-in-attacks/">https://www.bleepingcomputer.com/news/security/sitepoint-discloses-data-breach-after-stolen-info-used-in-attacks/</a></span></div><div><span><br></span></div><div><span>If you have any questions or concerns, please email us at <a href="mailto:security@umbc.edu">security@umbc.edu</a>. Information about this potential breach was provided to us by Have I Been Pwned (HIBP): <a href="https://haveibeenpwned.com">https://haveibeenpwned.com</a>.</span></div><hr><div><span>Receive any suspicious emails?</span></div><div><span><br></span></div><div><span>Forward it to <a href="mailto:security@umbc.edu">security@umbc.edu</a> along with the email headers. For instructions, visit: <a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970">https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</a>.</span></div><div><span><br></span></div><div><span>Follow us on <a href="myUMBC:https://my3.my.umbc.edu/groups/itsecurity">myUMBC:https://my3.my.umbc.edu/groups/itsecurity</a>.</span></div></div>
]]>
</Body>
<Summary>In June 2020, the web development site SitePoint suffered a data breach that exposed over one million customer records. Impacted data included email and IP addresses, names, usernames, bios and...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/128571/guest@my.umbc.edu/795f9cd5dc641de3a61d52cc85b0b462/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/571/a3d41bd8ce327f90ec607b0e48c625c7/xxlarge.jpg?1666123306</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/571/a3d41bd8ce327f90ec607b0e48c625c7/xlarge.jpg?1666123306</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/571/a3d41bd8ce327f90ec607b0e48c625c7/large.jpg?1666123306</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/571/a3d41bd8ce327f90ec607b0e48c625c7/medium.jpg?1666123306</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/571/a3d41bd8ce327f90ec607b0e48c625c7/small.jpg?1666123306</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/571/a3d41bd8ce327f90ec607b0e48c625c7/xsmall.jpg?1666123306</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/571/a3d41bd8ce327f90ec607b0e48c625c7/xxsmall.jpg?1666123306</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 18 Oct 2022 16:05:01 -0400</PostedAt>
<EditAt>Tue, 18 Oct 2022 16:06:35 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="128570" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/128570">
<Title>Account Data Breach: ShitExpress</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><span>In August 2022, the online feces delivery service ShitExpress suffered a data breach that exposed 24,000 unique email addresses. The addresses spanned invoices, gift cards, promotions and PayPal records. The breach also exposed the IP and email addresses of senders, physical addresses of recipients and messages accompanying the delivery.</span></div><div><span><br></span></div><div><span>Of the accounts listed, approximately 1 UMBC account was indicated in this potential breach. The victim has been notified via their UMBC email. If you have an account with ShitExpress, please contact them to see if you have been affected by this breach.</span></div><div><br></div><div><span>More information on the ShitExpress breach (and subsequent extortion attempts) can be seen at an article from Bleeping Computer: <a href="https://www.bleepingcomputer.com/news/security/anonymous-poop-gifting-site-hacked-customers-exposed/">https://www.bleepingcomputer.com/news/security/anonymous-poop-gifting-site-hacked-customers-exposed/</a></span></div><div><span><br></span></div><div><span>If you have any questions or concerns, please email us at <a href="mailto:security@umbc.edu">security@umbc.edu</a>. Information about this potential breach was provided to us by Have I Been Pwned (HIBP): <a href="https://haveibeenpwned.com">https://haveibeenpwned.com</a>.</span></div><hr><div><span>Receive any suspicious emails?</span></div><div><span><br></span></div><div><span>Forward it to <a href="mailto:security@umbc.edu">security@umbc.edu</a> along with the email headers. For instructions, visit: <a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970">https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</a>.</span></div><div><span><br></span></div><div><span>Follow us on <a href="myUMBC:https://my3.my.umbc.edu/groups/itsecurity">myUMBC:https://my3.my.umbc.edu/groups/itsecurity</a>.</span></div></div>
]]>
</Body>
<Summary>In August 2022, the online feces delivery service ShitExpress suffered a data breach that exposed 24,000 unique email addresses. The addresses spanned invoices, gift cards, promotions and PayPal...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/128570/guest@my.umbc.edu/09c712d944d2120df4286fdcca0cbe26/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/570/819f6c8c98a519c3f3d7377a5bc548d9/xxlarge.jpg?1666122450</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/570/819f6c8c98a519c3f3d7377a5bc548d9/xlarge.jpg?1666122450</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/570/819f6c8c98a519c3f3d7377a5bc548d9/large.jpg?1666122450</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/570/819f6c8c98a519c3f3d7377a5bc548d9/medium.jpg?1666122450</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/570/819f6c8c98a519c3f3d7377a5bc548d9/small.jpg?1666122450</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/570/819f6c8c98a519c3f3d7377a5bc548d9/xsmall.jpg?1666122450</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/570/819f6c8c98a519c3f3d7377a5bc548d9/xxsmall.jpg?1666122450</ThumbnailUrl>
<PawCount>36</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 18 Oct 2022 15:57:00 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="128454" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/128454">
<Title>Fraud Alert: "TASK: Thursday, Oct. 13TH"</Title>
<Tagline>Fraudster Impersonating UMBC Officials</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>This morning, the Division of Information Technology(DoIT) received a report of fraudulent emails sent to the University System of Maryland office.. The fraudster is forging the name of UMBC President Sheares Ashby, probably in an attempt to get the recipient to purchase gift cards on the fraudster’s behalf.  Below is an example of the email. For privacy, we removed the To field.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From:</span><span> Valerie Sheares Ashby &lt;<a href="mailto:executivedir808@gmail.com">executivedir808@gmail.com</a>&gt;</span></p><p><span>Sent:</span><span> Thursday, October 13, 2022 6:35 AM</span></p><p><span>To:</span><span> </span></p><p><span>Subject:</span><span> TASK: Thursday, Oct. 13TH</span></p><p><span> </span></p><p> </p><p><span>Good Morning,</span></p><p> </p><p><span>Is your schedule open? I'll need you to run an errand for me. I'm heading into a meeting with limited communication access soon, so just reply to me via email.</span></p><p> </p><p> </p><p><span>Sincerely,</span></p><p> </p><p><span>Valerie Sheares Ashby</span></p><p> </p><br></td></tr></tbody></table></div><br><br><p><span>A slightly different version appeared in some UMBC inboxes, this one pretending to be from Vice Provost and Dean Rutedge.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From:</span><span> Janet Rutledge &lt;<a href="mailto:executivedir808@gmail.com">executivedir808@gmail.com</a>&gt;</span></p><p><span>Sent:</span><span> Thursday, October 13, 2022 6:35 AM</span></p><p><span>To:</span><span> </span></p><p><span>Subject:</span><span> TASK: Thursday, Oct. 13TH</span></p><p><span> </span></p><p> </p><p><span>Good Morning,</span></p><p> </p><p><span>Is your schedule open? I'll need you to run an errand for me. I'm heading into a meeting with limited communication access soon, so just reply to me via email.</span></p><p> </p><p> </p><p><span>Sincerely,</span></p><p> </p><p><span>Janet Rutledge</span></p><p> </p><br></td></tr></tbody></table></div><br><br><br><p><span>THIS REQUEST IS NOT REAL!</span><span> </span></p><ul><li><p><span>This is a common scam to get the recipient to purchase gift cards or something else of value that can be sent through email.</span></p></li><li><p><span>Whatever you spend, you will not get back.</span></p></li></ul><br><br><p><span>If you have responded to the message and performed any errands such as purchasing gift cards, please do not send the codes to </span><a href="mailto:executivedir808@gmail.com" rel="nofollow external" class="bo"><span>executivedir808@gmail.com</span></a><span>.  </span></p><br><p><span>If you have received any message similar to the one listed above, please forward it with its headers to</span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. For instructions, visit </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>If you need further assistance, please contact us at </span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><p><span>__________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity.</span></a></p><br><br></div>
]]>
</Body>
<Summary>This morning, the Division of Information Technology(DoIT) received a report of fraudulent emails sent to the University System of Maryland office.. The fraudster is forging the name of UMBC...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/128454/guest@my.umbc.edu/0024f186aafc0459f398cecaaa363518/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 13 Oct 2022 11:49:42 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="128276" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/128276">
<Title>Job Scam Posting</Title>
<Tagline>Another Scam</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><br><div>On October 4, 2022, a job offer was posted in at least one group on the MyUMBC site.  The job offer was supposedly from Prof. Erika Fountain for "Administrative Assistants".  This posting was an error and has been taken down.  The job does not exist.  Prof. Fountain did not post it. In the posting below, note that the phone number is not a UMBC office phone number. The number referenced has a 612 area code (<span>Minneapolis, Minnesota</span>).</div><div><br></div><span><span><img src="https://lh5.googleusercontent.com/cMtmF9MPiEdXCsCE_MRiQDU4icq1klC2tE1A__BLo9IB5JJhZ8-DvgX0NBBcXmlPtCFMrJvl9n0FsNmH5ngWqo3aAbP0ovjkIJRA0JchngP7hX71t8ux8F31flmodlBY59Kmj2G_4sMOJUhhyW8OaqxVyc0PJt0cZ9kVKNZPfc_-E8BJOlT6Og3oug" width="624" height="429" style="max-width: 100%; height: auto;"></span></span><div>Again, <strong>THIS IS A SCAM.</strong></div><div><strong><br></strong></div><div><strong>__________________________________________________________<br><br></strong>Receive any suspicious emails?<br><br>Forward it to <a href="mailto:security@umbc.edu">security@umbc.edu</a> along with the email headers. For instructions, visit <a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970">https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</a>.<br><br>Follow us on myUMBC. <a href="https://my3.my.umbc.edu/groups/itsecurity">https://my3.my.umbc.edu/groups/itsecurity</a>.<strong><br></strong></div></div>
]]>
</Body>
<Summary>On October 4, 2022, a job offer was posted in at least one group on the MyUMBC site.  The job offer was supposedly from Prof. Erika Fountain for "Administrative Assistants".  This posting was an...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/128276/guest@my.umbc.edu/e31193d09d1bbf7085f5f9ba8551a95b/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 06 Oct 2022 19:21:26 -0400</PostedAt>
<EditAt>Thu, 06 Oct 2022 19:30:59 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="128248" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/128248">
<Title>Phishing Alert: Final Update Warning!</Title>
<Tagline>They Want Your Password</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><br><p><span>Recently, the Division of Information Technology (DoIT) received a report of a phishing email that appeared to be crafted to attack users in the Computer Science department. The phishers are trying to capture, at least, your UMBC password.. The  Below is an example of the email. For privacy purposes, we removed the To field.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span><span><img src="https://lh4.googleusercontent.com/EUWuWTYfLle3k7hmaGtxPerCTkoVMqT9cwOUpbmmuyH3cBhlVc9bgtf51pjdre_aoAsa7ispn2P6jQ6PJcv8H8dd-706m1J7aE4jFceuYC777Ex_MAGvpvsVfHzBtPABFz6ylua8yMTHFIZ5y8IwTUTWmlEzoftEK0NwS2qiDqQsmoL-ha_Km9YuAA" width="610" height="265" style="max-width: 100%; height: auto;"></span></span></p><p> </p><br></td></tr></tbody></table></div><br><p><span>THIS WARNING IS NOT REAL!</span><span> </span></p><ul><li><p><span>DoIT will not ask you to “confirm your ownership” of your email account.  If we ask you to change your password, we will direct you to my.umbc.edu or to webauth.umbc.edu, not to a non-UMBC site.</span></p></li><li><p><span>Saying that “This message is from a trusted sen der” should make you suspicious from the start.  If someone walked up to you in the street and, instead of introducing themselves by name, simply told you that they were trusted, would you be comfortable?</span></p></li><li><p><span>Whoever wrote this seems to think that “sender” is two words.</span></p></li></ul><p><span> </span></p><br><br><p><span>PLEASE DO </span><span>NOT</span><span> CLICK THE LINK!</span></p><br><p><span>If you have already clicked the link and entered your password:</span></p><ul><li><p><span>If you entered your UMBC password on the form, please change your password </span><span>immediately</span><span>.</span></p></li><li><p><span>If you entered your UMBC password and you used that same password for any other account(s) (e.g. Social Media, Online Banking, etc.), change the passwords on the account(s) </span><span>immediately.</span></p></li><li><p><span>If you entered banking, credit card, or other information, please contact your bank or other financial institution </span><span>immediately</span><span> and report what happened.</span></p></li><li><p><span>If you entered personal information such as your address, phone number, etc., monitor your finances and be very careful about responding to suspicious phone calls, mail, text messages, etc.</span></p></li></ul><br><p><span>If you have received any message similar to the one listed above, please forward it with its headers to</span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. For instructions, visit </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>If you need further assistance, please contact us at </span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><p><span>__________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity.</span></a></p></div>
]]>
</Body>
<Summary>Recently, the Division of Information Technology (DoIT) received a report of a phishing email that appeared to be crafted to attack users in the Computer Science department. The phishers are...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/128248/guest@my.umbc.edu/9e2c28a610ce68b50692936d454c0c14/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 06 Oct 2022 12:02:15 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="128066" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/128066">
<Title>Hurricane-Related Scams</Title>
<Tagline>An Advisory From CISA</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div>The <span>Cybersecurity and Infrastructure Security Agency (CISA) has posted a warning about scammers pretending to be charitable agencies either soliciting contributions for hurricane victims or trying to scam the victims directly.</span></div><div><span><br></span></div><div><span>You can find the CISA post at:<br></span></div><div><span><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/09/30/hurricane-related-scams">https://www.cisa.gov/uscert/ncas/current-activity/2022/09/30/hurricane-related-scams</a><br></span></div><div><span><br></span></div><div><span><br></span></div><div><span>It is unfortunately common for unscrupulous actors to take advantage of disasters and emergency conditions in order to prey upon both those who honestly wish to help and those who truly need help.  The CISA post includes references to various resources that can help identify and avoid these scams.  Some of these resources are useful for detecting scams in general, particularly fake charities.  Be mindful when you see unsolicited email, text messages, or phone calls related to hurricane relief.  Make sure that your assistance is going where you want it to go.</span></div><div><span><br></span></div><div><br><p><span>If you have received a suspicious message, please forward it with its headers to</span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span> security@umbc.edu</span></a><span>. For instructions, visit </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>If you need further assistance, please contact us at </span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><p><span>__________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC.</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span> https://my3.my.umbc.edu/groups/itsecurity.</span></a></p></div><div><span><br></span></div><div><span><br></span></div><div></div></div>
]]>
</Body>
<Summary>The Cybersecurity and Infrastructure Security Agency (CISA) has posted a warning about scammers pretending to be charitable agencies either soliciting contributions for hurricane victims or trying...</Summary>
<Website>https://www.cisa.gov/uscert/ncas/current-activity/2022/09/30/hurricane-related-scams</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/128066/guest@my.umbc.edu/63065da20db05e1beb905dd31c1a2c3a/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 30 Sep 2022 14:18:21 -0400</PostedAt>
</NewsItem>

</News>
