<?xml version="1.0"?>
<News hasArchived="false" page="6" pageCount="29" pageSize="10" timestamp="Sun, 26 Apr 2026 16:23:46 -0400" url="https://beta.my.umbc.edu/groups/itsecurity/posts.xml?mode=activity&amp;page=6">
<NewsItem contentIssues="false" id="126311" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/126311">
<Title>Job Phishing Alert: Department of Computer Science</Title>
<Tagline>It's Still Happening  -  Please Share This Article!</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Recently, the Division of Information Technology(DoIT) received multiple reports of job phishing emails. The scammers sending these emails are impersonating Professor Alan Sherman in the Computer Science Department. Below is an example of the email. For privacy purposes, we removed the To field.</span></p><br><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: Professor Alan Sherman &lt;<a href="mailto:dmoor105@gmail.com">dmoor105@gmail.com</a>&gt;</span></p><p><span>Date: Sun, Jul 10, 2022 at 06:16</span></p><p><span>Subject: Student Employment</span></p><p><span>To:</span></p><p> </p><p> </p><p><span>University of Maryland, Baltimore County, Office of the Department of</span></p><p><span>Computer Science urgently needs the services of students to work</span></p><p><span>remotely as research assistants and get paid $300 weekly. The position</span></p><p><span>is served remotely and assignments can be carried out in your leisure</span></p><p><span>time. The position is open to students from any department of the</span></p><p><span>institution UMBC. To proceed with the application process, contact</span></p><p><span>Professor Alan Sherman now at (346) 306-3787  via text message</span></p><p><span>stating your full name, email address, year of study, and department</span></p><p><span>to receive the job description and further application requirements.</span></p><p> </p><p><span>Best Regards,</span></p><p> </p><p><span>Professor Alan Sherman</span></p><p><span>Department: Computer Science</span></p><p><span>Information Technology &amp; Engineering,</span></p><p><span>Room 224</span></p><p><span>(346) 306-3787</span></p><p><span>University of Maryland, Baltimore County</span></p></td></tr></tbody></table></div><br><p><span>Please note that Professor Sherman did not send these messages. Two visible red flags in these emails are:</span></p><ol><li><p><span>The From address is not a UMBC email. In the example above, if the Computer Science Department or Prof. Sherman were sending this email, the From address would have been a UMBC email address. However, it was sent from &lt;</span><span><a href="mailto:dmoor105@gmail.com">dmoor105@gmail.com</a></span><span>&gt;, which is not a UMBC affiliate. However, please note that the email could have been spoofed, even if it appears to originate from a UMBC email. Therefore, always check with DoIT(</span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>) or email/contact the impersonated person on a completely different email when you see a conflict in the address.</span></p></li></ol><br><ol><li><p><span>Phone number.  A lot of scammers will ask for your number. If their number gets reported, they could easily get a new one. The same can be said for an email address; however, they will lose responses from other phishing email recipients if their email is blocked. If you ever receive a job offer asking for a phone number in general,  </span><span>BE SUSPICIOUS</span><span>!</span></p></li><li><p><span>The email template. This template is very common. After a quick Google search, we found three Job scams articles with the same template. So if you are ever in doubt, </span><span>GOOGLE IT!</span><span> UMBC will not use a known phishing template to offer you a job opportunity.</span></p></li></ol><br><p><span>If you have received any message similar to the one listed above, please forward it with its headers to</span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>For more information about phishing, visit:</span><span><a href="https://itsecurity.umbc.edu/critical/?id=98136">https://itsecurity.umbc.edu/critical/?id=98136</a>.</span></p><p><span>______________________________________________________________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></p><br><br></div>
]]>
</Body>
<Summary>Recently, the Division of Information Technology(DoIT) received multiple reports of job phishing emails. The scammers sending these emails are impersonating Professor Alan Sherman in the Computer...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/126311/guest@my.umbc.edu/41c331fa59de972ea5db1084d100c859/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 18 Jul 2022 14:30:17 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="126240" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/126240">
<Title>Job Phishing Alert: Administrative Assistant</Title>
<Tagline>Fake Email AND A Fake Website</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><br><p><span>Recently, the UMBC Division of Information Technology(DoIT) received multiple reports of job phishing emails from a compromised UMBC account. The phishers are pretending to offer an Administrative Assistant job. Below is an example of the email. For privacy purposes, we removed the To field.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: UMBC Career Center </span></p><p><span>Subject: Administrative Assistant Needed - Part Time</span></p><p><span>To:</span></p><br><br><p><span>An administrative assistant to perform various administrative tasks like making or receiving payment, keeping record and processing paperwork when necessary with a good weekly pay is needed,  Please find the position and some basic information below.</span></p><p> </p><p><span>Position: Administrative Assistant </span></p><p><span>Type: Part-Time Job</span></p><p><span>Pay:$400 weekly</span></p><p><span>Hours: Average of 10hrs weekly</span></p><p> </p><p><span>This position will be a home-based and flexible part time job, You can be working from home, School or any location</span></p><p> </p><p><span>Click </span><a href="https://project5810121.tilda.ws/admin" rel="nofollow external" class="bo"><span>HERE</span></a><span> if Interested in this position or Indicate your interest by sending your resume to <a href="mailto:drstacydean@gmail.com">drstacydean@gmail.com</a> using your personal email, Then send  a text to  (931) 683-2971 as a  reminder</span></p><p> </p><p> </p><p><span>Best Regards,</span></p><br></td></tr></tbody></table></div><br><p><span>As mentioned above, the account was compromised. DoIT has secured the account linked with this phishing campaign. </span><span>THIS JOB OFFER IS NOT REAL!</span><span> The Career Center did not send this message. Messages from the Career Center do not look like this.</span></p><br><p><span>The link in the message takes you to the website below. Once you are on the website, it asks for your name, phone number, email address, and resume. Please do not enter this information on the website.</span></p><p><span><span><img src="https://lh3.googleusercontent.com/iKBX-q07Ebmmq-W1fpyriSI15Se2PowrPe0HYn5ocPoEpX-bodEos5TQqEkM-S7EYnI3Tk_udwBoEJdaEJudEWe32uH5n_5pPhskdJlR8e8l9lNBBHqf7AXj7xRw0fihoTFum_eGpUIZwaPKy-Q" width="624" height="277" style="max-width: 100%; height: auto;"></span></span><span><span><img src="https://lh3.googleusercontent.com/Q3WgxX6HdgxKIb7WDlDCOGCb9P2Et5oBXmknxnCoqhXBLmht-u_yvfVhWXxmwRR7MxsMgmJUR0PG0KDyypUiR7sxcTBMoV8RpSVqGVfh3Mgq3MtLS16tqB4VeK69WAs9iietAWBmgWWD13Wioz0" width="624" height="251" style="max-width: 100%; height: auto;"></span></span></p><br><p><span>If you have entered any information on this website, they will likely message you and send you a check.</span><span> DO NOT DEPOSIT THE CHECK!</span><span> If you have shared any banking information, </span><span>CONTACT YOUR BACK IMMEDIATELY!</span></p><br><p><span>If you have received any message similar to the one listed above, please forward it with its headers to</span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. For instructions, visit </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>If you need further assistance, please contact us at </span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><p><span>__________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity.</span></a></p><br><br></div>
]]>
</Body>
<Summary>Recently, the UMBC Division of Information Technology(DoIT) received multiple reports of job phishing emails from a compromised UMBC account. The phishers are pretending to offer an Administrative...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/126240/guest@my.umbc.edu/6ea05152115512146948f626de0c7585/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 13 Jul 2022 11:36:35 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="126148" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/126148">
<Title>Job Scam of the Day: Department of Computer Science</Title>
<Tagline>Prof. Sherman Is NOT Offering You A Job!  Really!</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><br><p><span>Recently, the Division of Information Technology(DoIT) received multiple reports of job phishing emails. The scammers sending these emails are impersonating Professor Alan Sherman in the Computer Science Department. Below is an example of the email. For privacy purposes, we removed the To field.</span></p><br><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: Brandy Nicole &lt;<a href="mailto:nbrandy609@gmail.com">nbrandy609@gmail.com</a>&gt;</span></p><p><span>Date: Wed, Jul 6, 2022 at 3:37 PM</span></p><p><span>Subject: UMBC PART TIME JOB OPPORTUNITY</span></p><p><span>To:</span></p><p> </p><p> </p><p><span>University of Maryland, Baltimore County,  Office of the Department of Computer Science urgently needs the services of students to work remotely as research assistants and get paid $300 weekly. The position is served remotely and assignments can be carried out in your leisure time. The position is open to students from any department of the institution UMBC. To proceed with the application process, contact Professor Alan Sherman now at  (408) 212-0240  via text message stating your full name, email address, year of study, and department to receive the job description and further application requirements.</span></p><p> </p><p><span>Best Regards,</span></p><p> </p><p><span>Professor Alan Sherman</span></p><p><span>Department: Computer Science</span></p><p><span>Information Technology &amp; Engineering,</span></p><p><span>Room 224</span></p><p><span>(408) 212-0240</span></p><p><span>University of Maryland, Baltimore County</span></p></td></tr></tbody></table></div><br><p><span>Please note that Professor Sherman did not send these messages. Three visible red flags in these emails are:</span></p><br><ol><li><p><span>The From address is not a UMBC email. In the example above, if the Computer Science Department or Prof. Sherman were sending this email, the From address would have been a UMBC email address. However, it was sent from &lt;<a href="mailto:nbrandy609@gmail.com">nbrandy609@gmail.com</a>&gt;, which is not a UMBC affiliate. </span></p></li><li><p><span>The sender’s name is Prof.Sherman’s name but Brandy Nicole. This is another giveaway that the professor did not send this email. Please note that the From address can be spoofed easily.  It can even appear to originate from a UMBC email, though in this case the sender did not bother. </span><span>Always</span><span> check with DoIT(</span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span>) or email/contact the impersonated person on a verifiable email address when you see a conflict in the email headers. </span><span>You can look up UMBC faculty and staff email at </span><a href="https://www2.umbc.edu/search/directory" rel="nofollow external" class="bo"><span>https://www2.umbc.edu/search/directory</span></a><span>.</span></p></li><li><p><span>Phone number.  A lot of scammers will ask for your number. If their number gets reported, they could easily get a new one. In general, if you ever receive a job offer asking for your phone number or personal email address,  </span><span>BE SUSPICIOUS</span><span>! </span></p></li><li><p><span>Request for response by phone text message.  Why would someone send you a job offer in email and then want a text message in response?  First, because your response gives them your phone number, name, standing (freshman, sophomore, etc.), and department.  This provides a good basis for future identity theft.  Second, because it takes the conversation out of the UMBC mail services, which makes it much more difficult to investigate if/when you report the scam.</span></p></li><li><p><span>The email template. This template is very common. After a quick Google search, we found three Job scam articles with the same template. So if you are ever in doubt, </span><span>GOOGLE IT! </span><span> UMBC will not use a known phishing template to offer you a job opportunity.</span></p></li></ol><br><br><p><span>Think about it.  If someone walked up to you on the street, showed you identification under two or three different names, and then made you this offer, would you take it?</span></p><br><p><span>If you have received any message similar to the one listed above, please forward it with its headers to </span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span><span> For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>For more information about phishing,</span><span> visit:</span><span><a href="https://itsecurity.umbc.edu/critical/?id=98136">https://itsecurity.umbc.edu/critical/?id=98136</a>.</span></p><p><span>____________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a> </span><span>along with the email headers. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC</span><span>:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></p><br><br><br></div>
]]>
</Body>
<Summary>Recently, the Division of Information Technology(DoIT) received multiple reports of job phishing emails. The scammers sending these emails are impersonating Professor Alan Sherman in the Computer...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/126148/guest@my.umbc.edu/75ca66c2540194e1260b0d17b6b38dd7/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 06 Jul 2022 16:20:34 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="126112" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/126112">
<Title>Job Phishing Alert: Department of Computer Science</Title>
<Body>
<![CDATA[
    <div class="html-content"><span>Recently, the Division of Information Technology(DoIT) received multiple reports of job phishing emails. The scammers sending these emails are impersonating Professor Alan Sherman in the Computer Science Department. Below is an example of the email. For privacy purposes, we removed the To field.</span><br><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: jok hhg &lt;<a href="mailto:admin@umbc.live">admin@umbc.live</a>&gt;</span></p><p><span>Date: Mon, Jun 27, 2022 at 6:16 AM</span></p><p><span>Subject: JOB FOR YOU</span></p><p><span>To:</span></p><p> </p><p> </p><p><span>University of Maryland, Baltimore County, Office of the Department of</span></p><p><span>Computer Science urgently needs the services of students to work</span></p><p><span>remotely as research assistants and get paid $350 weekly. The position</span></p><p><span>is served remotely and assignments can be carried out in your leisure</span></p><p><span>time. The position is open to students from any department of the</span></p><p><span>institution UMBC. To proceed with the application process, contact</span></p><p><span>Professor Alan Sherman now at (410) 701-0769 via text message</span></p><p><span>stating your full name, email address, year of study, and department</span></p><p><span>to receive the job description and further application requirements.</span></p><p><span>Best Regards,</span></p><p><span>Professor Alan Sherman</span></p><p><span>Department: Computer Science</span></p><p><span>Information Technology &amp; Engineering,</span></p><p><span>Room 224</span></p><p><span>(410) 701-0769</span></p><p><span>University of Maryland, Baltimore County</span></p></td></tr></tbody></table></div><br><p><span>Please note that Professor Sherman did not send these messages. Three visible red flags in these emails are:</span></p><br><ol><li><p><span>The From address is not a UMBC email. In the example above, if the Computer Science Department or Prof. Sherman were sending this email, the From address would have been a UMBC email address. However, it was sent from &lt;</span><span><a href="mailto:admin@umbc.live">admin@umbc.live</a></span><span>&gt;, which is not a UMBC affiliate. Notice that the email's name is not registered under  Prof.Sherman’s name but jok hhg. This is another giveaway that the professor did not send this email. Also, please note that the email From address could have been spoofed, even if it appears to originate from a UMBC email. </span><span>Always</span><span> check with DoIT(</span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span>) or email/contact the impersonated person on a verifiable email address when you see a conflict in the email headers. </span><span>You can look up UMBC faculty and staff email at <a href="https://www2.umbc.edu/search/directory">https://www2.umbc.edu/search/directory</a>.</span></p></li></ol><br><ol><li><p><span>Phone number.  A lot of scammers will ask for your number. If their number gets reported, they could easily get a new one. The same can be said for an email address; however, they will lose responses from other phishing email recipients if their email is blocked. In general, if you receive a job offer asking for your phone number or personal email address,  </span><span>BE SUSPICIOUS</span><span>!</span></p></li></ol><br><ol><li><p><span>The email template. This template is very common. After a quick Google search, we found three Job scam articles with the same template. So if you are ever in doubt, </span><span>GOOGLE IT!</span><span> UMBC will not use a known phishing template to offer you a job opportunity.</span></p></li></ol><br><ol><li><p><span>Request for response by phone text message.  Why would someone send you a job offer in email and then want a text message in response?  First, because your response gives them your phone number, name, standing (freshman, sophomore, etc.), and department.  This provides a good basis for future identity theft.  Second, because it takes the conversation out of the UMBC mail services, which makes it much more difficult to investigate if/when you report the scam.</span></p></li></ol><br><br><div>Think about it.  If someone walked up to you on the street, showed you identification under two or three different names, and then made you this offer, would you take it?</div><div><br></div><p><span>If you have received any message similar to the one listed above, please forward it with its headers to </span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span><span> For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>For more information about phishing,</span><span> visit:</span><span><a href="https://itsecurity.umbc.edu/critical/?id=98136">https://itsecurity.umbc.edu/critical/?id=98136</a>.</span></p><p><span>______________________________________________________________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a> </span><span>along with the email headers. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC</span><span>:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></p><br><br><br></div>
]]>
</Body>
<Summary>Recently, the Division of Information Technology(DoIT) received multiple reports of job phishing emails. The scammers sending these emails are impersonating Professor Alan Sherman in the Computer...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/126112/guest@my.umbc.edu/529546229bf565016a1735afb6f13712/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 01 Jul 2022 16:49:11 -0400</PostedAt>
<EditAt>Fri, 01 Jul 2022 16:52:39 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="125990" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/125990">
<Title>What to do if your account has been hacked?</Title>
<Tagline>Don't Panic!</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><br></p><span>Imagine this scenario: recently, your UMBC account was breached. You are unsure how your account was used during the breach or how to secure your account. Below are steps to help you regain access.</span><br><ol><li><p><span>Change your password immediately.</span><span> Changing your password is necessary and should be the first step you take to secure your account. This will essentially kick the hackers off of your account.</span></p></li><li><p><span>Change your security questions. </span><span>Even if you changed your password, they could regain access to your account if your security questions are the same.</span></p></li><li><p><span>Check your account activity.</span><span> Often you will see the IP address of the perpetrator. This is very helpful to security; we can use this to identify other compromised accounts. </span></p></li><li><p><span>Notify Security of the breach.</span><span> By notifying security (<a href="mailto:security@umbc.edu">security@umbc.edu</a>), we can inform the campus of the breach. In addition, we can make sure the bad guys got kicked off and identify any other changes made to your account during the compromise.</span></p></li><li><p><span>Check your reply-to email.</span><span> Sometimes, after an account was compromised, the Reply-To email is changed, especially if your email was used for spamming. If this change occurs, you will not receive email from your professors or other staff. Instruction for changing your reply to email can be found here: </span><span><a href="https://www.gmass.co/blog/reply-to-address/#:~:text=Setting%20the%20Reply%2DTo%20in,address%2C%20and%20hit%20Save%20Changes">https://www.gmass.co/blog/reply-to-address/#:~:text=Setting%20the%20Reply%2DTo%20in,address%2C%20and%20hit%20Save%20Changes</a>.</span></p></li><li><p><span>Install Duo.</span><span> Duo is UMBC’s second-factor authentication service. With this, no one can access your account unless they have </span><span>both</span><span>your password </span><span>and your phone</span><span>. For more information, visit: </span><a href="https://wiki.umbc.edu/display/faq/Two-Factor+Authentication+with.+DUO" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/display/faq/Two-Factor+Authentication+with.+DUO</span></a></p></li><li><p><span>Check your other accounts.  </span><span>If you used the same password on your UMBC account that you have on any other account (online banking, Instagram, Paypal, etc.), you should assume that </span><span>all</span><span> accounts using that password are compromised.  This is a good reason to use different passwords in all important accounts..</span></p></li></ol><br><p><span>Hopefully, these tips will help you feel more confident about your account’s security. If you have any questions or concerns, please feel free to reach out to us at</span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a>.</span></p><p><span>______________________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></p></div>
]]>
</Body>
<Summary>Imagine this scenario: recently, your UMBC account was breached. You are unsure how your account was used during the breach or how to secure your account. Below are steps to help you regain...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/125990/guest@my.umbc.edu/3faaf284229ada38550d65bfcd8a7065/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 22 Jun 2022 17:55:11 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="125989" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/125989">
<Title>Phishing Alert: AUTHENTICATION NOTICE!!!</Title>
<Tagline>Another Message We DIDN't Send You!+</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span><br></span></p><br><p><span>Recently the Division of Information Technology (DoIT), detected a new phishing campaign targeting the UMBC community. The perpetrators are alerting recipients that their accounts have been disconnected from the umbc.edu server. Below is an example of the message.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: SUPPORT &lt;<a href="mailto:matsmoto@msf.biglobe.ne.jp">matsmoto@msf.biglobe.ne.jp</a>&gt;</span></p><p><span>Date: Wed, Jun 15, 2022 at 2:43 PM</span></p><p><span>Subject: AUTHENTICATION NOTICE!!!</span></p><p><span>To: &lt;<a href="mailto:campus@umbc.edu">campus@umbc.edu</a>&gt;</span></p><br><br><p><span> </span></p><p> </p><div><table><colgroup></colgroup><tbody><tr><td><br></td><td><p><span>We noticed that your email </span><span><a href="mailto:campus@umbc.edu">campus@umbc.edu</a></span><span> have been disconnected from sending and receiving mails</span></p><br><p><span>We urge you to re-confirm if your account is still active on </span><a href="http://umbc.edu/" rel="nofollow external" class="bo"><span>umbc.edu</span></a><span> to officially unlock it to your default settings.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><a href="https://gggaya.com/domain?email=%5B%5B-Email-%5D%5D" rel="nofollow external" class="bo"><span>Re-confirm account</span></a></p></td></tr></tbody></table></div><br><br><p><span>Once confirmation is complete, your mailbox will work effectively.</span></p><br><p><span>Copyright 2022 </span><a href="http://umbc.edu/" rel="nofollow external" class="bo"><span>umbc.edu</span></a><span> All rights reserved.</span></p></td></tr></tbody></table></div><br></td></tr></tbody></table></div><br><p><span>Please note that this email is not legitimate. If we realized something was wrong with your account, we would have sent a notification via RT. Also note that the From address is not affiliated with UMBC </span><span>&lt;</span><a href="mailto:matsmoto@msf.biglobe.ne.jp" rel="nofollow external" class="bo"><span>matsmoto@msf.biglobe.ne.jp</span></a><span>&gt;.  The ".jp" at the end means the sender's email provider is in Japan.</span></p><br><p><span>If you have received any message similar to the one listed above, please forward it with its headers to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span>. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>______________________________________________________________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></p></div>
]]>
</Body>
<Summary>Recently the Division of Information Technology (DoIT), detected a new phishing campaign targeting the UMBC community. The perpetrators are alerting recipients that their accounts have been...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/125989/guest@my.umbc.edu/29539ad9f7ae7dfacde5c1be3ecec40f/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 22 Jun 2022 17:43:55 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="125963" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/125963">
<Title>Job Phishing Alert: Department of Computer Science</Title>
<Tagline>More Fake Jobs</Tagline>
<Body>
<![CDATA[
    <div class="html-content"> <p><span>Recently, the Division of Information Technology(DoIT) received multiple reports of job phishing emails. The scammers sending these emails are impersonating Professor Alan Sherman in the Computer Science Department. Below is an example of the email. For privacy purposes, we removed the To field.</span></p><br><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: Barry Melvin &lt;<a href="mailto:barry01d1@gmail.com">barry01d1@gmail.com</a>&gt;</span></p><p><span>Date: Fri, Jun 3, 2022, 5:48 AM</span></p><p><span>Subject: JOB FOR YOU</span></p><p><span>To:</span></p><p><span>University of Maryland, Baltimore County, Office of the Department of Computer Science urgently needs the services of students to work remotely as research assistants and get paid $300 weekly. The position is served remotely and assignments can be carried out in your leisure time. The position is open to students from any department of the institution UMBC. To proceed with the application process, contact Professor Alan Sherman now at (336) 949-8259 via text message stating your full name, email address, year of study, and department to receive the job description and further application requirements.</span></p><p> </p><p><span>Best Regards,</span></p><p> </p><p><span>Professor Alan Sherman</span></p><p><span>Department: Computer Science</span></p><p><span>Information Technology &amp; Engineering,</span></p><p><span>Room 224</span></p><p><span>(336) 949-8259</span></p><p><span>University of Maryland, Baltimore County</span></p></td></tr></tbody></table></div><br><p><span>Please note that Professor Sherman did not send these messages. Two visible red flags in these emails are:</span></p><ol><li><p><span>The From address is not a UMBC email. In the example above, if the Computer Science Department or Prof. Sherman were sending this email, the From address would have been a UMBC email address. However, it was sent from &lt;</span><span><a href="mailto:barry01d1@gmail.com">barry01d1@gmail.com</a></span><span>&gt;, which is not a UMBC affiliate. Notice that the email's name is not registered under  Prof.Sherman’s name but Barry Melvin's. This is another giveaway that the professor did not send this email. However, please note that the email could have been spoofed, even if it appears to originate from a UMBC email. Therefore, always check with DoIT(</span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>) or email/contact the impersonated person on a completely different email when you see a conflict in the address.</span></p></li></ol><br><ol><li><p><span>Phone number.  A lot of scammers will ask for your number. If their number gets reported, they could easily get a new one. The same can be said for an email address; however, they will lose responses from other phishing email recipients if their email is blocked. If you ever receive a job offer asking for a phone number in general,  </span><span>BE SUSPICIOUS</span><span>!</span></p></li><li><p><span>The email template. This template is very common. After a quick Google search, we found three Job scams articles with the same template. So if you are ever in doubt, </span><span>GOOGLE IT!</span><span> UMBC will not use a known phishing template to offer you a job opportunity.</span></p></li></ol><br><p><span>Other emails that are sending the same templates:</span></p><ul><li><p><a href="https://rt.umbc.edu/Ticket/Display.html?id=2581308" rel="nofollow external" class="bo"><span>talktojameselliot15@gmail.com</span></a></p></li><li><p><a href="https://rt.umbc.edu/Ticket/Display.html?id=2579782" rel="nofollow external" class="bo"><span>admin@vpn-work.com</span></a></p></li><li><p><a href="https://rt.umbc.edu/Ticket/Display.html?id=2579783" rel="nofollow external" class="bo"><span>admin@vpn-work.com</span></a></p></li><li><p><a href="https://rt.umbc.edu/Ticket/Display.html?id=2579938" rel="nofollow external" class="bo"><span>admin@umbc.live</span></a></p></li><li><p><a href="mailto:pamilar001@gmail.com" rel="nofollow external" class="bo"><span>pamilar001@gmail.com</span></a></p></li><li><p><a href="https://rt.umbc.edu/Ticket/Display.html?id=2575910" rel="nofollow external" class="bo"><span>jasonharvey001@gmail.com</span></a></p></li><li><p><a href="https://rt.umbc.edu/Ticket/Display.html?id=2575911" rel="nofollow external" class="bo"><span>mcgerald.collins@gmail.com</span></a></p></li></ul><br><p><span>If you have received any message similar to the one listed above, please forward it with its headers to</span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>For more information about phishing, visit:</span><span><a href="https://itsecurity.umbc.edu/critical/?id=98136">https://itsecurity.umbc.edu/critical/?id=98136</a>.</span></p><p><span>______________________________________________________________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></p><br><br></div>
]]>
</Body>
<Summary>  Recently, the Division of Information Technology(DoIT) received multiple reports of job phishing emails. The scammers sending these emails are impersonating Professor Alan Sherman in the...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/125963/guest@my.umbc.edu/0086b3d71611fb172bb04e54fe26e301/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 21 Jun 2022 12:09:32 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="125432" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/125432">
<Title>Account data breach: Avvo</Title>
<Tagline>Heads-up For Avvo Account Holders</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>In approximately December 2019, an alleged data breach of the lawyer directory service Avvo was published to an online hacking forum and used in an extortion scam (it's possible the exposure dates back earlier than that). The data contained 4.1M unique email addresses alongside SHA-1 hashes, most likely representing user passwords.</span></p><br><p><span>The compromised data was shared in an online hacking forum. Four UMBC accounts were victims of this breach. The victims are being notified via their UMBC emails and/or their alternate emails. If you have an Avvo account, please contact them to see if you have been affected by this breach.</span></p><br><p><span>To see if you were involved in any other breach, visit: </span><a href="https://haveibeenpwned.com/" rel="nofollow external" class="bo"><span>https://haveibeenpwned.com/</span></a><span>.</span></p><br><br><p><span>More about Avvo data breach:</span></p><p><span><a href="https://www.goincognito.co/alert-4101101-breached-accounts-at-avvo-check-your-email-now/">https://www.goincognito.co/alert-4101101-breached-accounts-at-avvo-check-your-email-now/</a></span></p><br><br><p><span>If you have any questions or concerns, email us at: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>Information about this breach was provided to us by Have I Been Pwned(HIBP). </span></p><p> </p><p><span>______________________________________________________________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></p><br><br><br></div>
]]>
</Body>
<Summary>In approximately December 2019, an alleged data breach of the lawyer directory service Avvo was published to an online hacking forum and used in an extortion scam (it's possible the exposure dates...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/125432/guest@my.umbc.edu/9e6db95a7e5773cccbaae12b04972d76/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 18 May 2022 12:44:22 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="125390" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/125390">
<Title>Phishing Alert: 2022 Employee Benefits Program</Title>
<Tagline>Phishing Targeted At CNMS</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Today, UMBC’s Division of Information Technology, DoIT, received a notification of a phishing campaign targeting the </span><a href="https://cnms.umbc.edu/" rel="nofollow external" class="bo"><span>College of Natural and Mathematical Sciences</span></a><span> (CNMS). The actors claim to provide a Summer Employee Benefit plan. Below is an example of the message.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p> </p><p><span>From: Greta Motter &lt;<a href="mailto:gmotter@moore.edu">gmotter@moore.edu</a>&gt;</span></p><p><span>Date: Tue, May 17, 2022 at 10:10 AM</span></p><p><span>Subject: 2022 Employee Benefits Program</span></p><p><span>To: <a href="mailto:Employee@benefits.com">Employee@benefits.com</a> &lt;<a href="mailto:Employee@benefits.com">Employee@benefits.com</a>&gt;</span></p><br><br><p><span>I would like to inform you about the Summer 2022 Employee Benefits plan, which will be available to provide financial assistance to employees and their families during the summer break.</span></p><p><span> </span></p><p><span>Because of the COVID-19 pandemic, the last few years have been difficult for every family. The purpose of the Employee Benefits Plan will be to provide cash assistance to employees and their families up to the amount of $4,400.</span></p><p><span> </span></p><p><span>The Employee Benefits plan is accepting new applications until the end of the month. Applications can be submitted via the </span><a href="https://stats.sender.net/forms/en8L5b/view" rel="nofollow external" class="bo"><span>Summer 2022 Benefits Plan page.</span></a></p><p><span> </span></p><p><span>Sincerely,</span></p><p><span> </span></p><p><span>Greta Motter</span></p><p><span>Employee Assistance Personnel</span></p><br></td></tr></tbody></table></div><br><p><span>The recipients of the message appear to have been taken from the CNMS staff directory (<a href="https://cnms.umbc.edu/directory/">https://cnms.umbc.edu/directory/</a>).</span></p><br><p><span>Please note that this message appears to have been sent from a compromised account at the Moore College of Art. It is unlikely that anyone at that institution is involved with employee benefits at UMBC.  Alwars examine unexpected or unusual messages carefully for inconsistencies that may indicate fraud.  If you find something questionable, please message with full headers to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>______________________________________________________________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></p></div>
]]>
</Body>
<Summary>Today, UMBC’s Division of Information Technology, DoIT, received a notification of a phishing campaign targeting the College of Natural and Mathematical Sciences (CNMS). The actors claim to...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/125390/guest@my.umbc.edu/f34936941d6193e33629b1760ee32621/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 17 May 2022 14:44:13 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="119288" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/119288">
<Title>Job Phishing Alert: Department-wide phishing Campaign</Title>
<Tagline>Job Phishing Alert: Multiple Departments</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Recently, the Division of Information Technology(DoIT) received multiple reports of job phishing emails. The scammers sending these emails are impersonating professors of the different departments at UMBC. The example below impersonates Professor Hennigan of the Department of Economics. For privacy purposes, we removed the To field.</span></p><br><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: Barry Melvin &lt;<a href="mailto:barry01d1@gmail.com">barry01d1@gmail.com</a>&gt;</span></p><p><span>Date: Thu, May 5, 2022, 15:34</span></p><p><span>Subject: Internship UMBC</span></p><p><span>To:</span></p><p> <span>University of Maryland, Baltimore County, The Office of the Department of Economics urgently needs the services of students to work remotely as research assistants and get paid $300 weekly. The position is served remotely and assignments can be carried out in your leisure time. The position is open to students from any department of the institution UMBC. To proceed with the application process, contact </span><span>Professor </span><span>Christopher Hennigan now at  (310) 818-3769 via text message stating your full name, email address, year of study, and department to receive the job description and further application requirements.</span></p><p> </p><p><span>Best Regards,</span></p><p> </p><p><span>Professor Christopher Hennigan</span></p><p><span>Department: Chemical Engineering</span></p><p><span>Technology Research Center, </span></p><p><span>Room 253</span></p><p><span>(310) 818-3769</span></p><p><span>University of Maryland, Baltimore County.</span></p></td></tr></tbody></table></div><p><span>Please note that the Departments or professors did not send these messages. Two visible red flags in these emails are:</span></p><ol><li><p><span>The From address is not a UMBC email. In the example above, if the Economics  Department or Prof. Hennigan were sending this email, the From address would have been a UMBC email address. However, it was sent from &lt;</span><span><a href="mailto:barry01d1@gmail.com">barry01d1@gmail.com</a></span><span>&gt;, which is not a UMBC affiliate. Notice that the email's name is not registered under  Prof.Hennigan’s name but Barry Melvin's. This is another giveaway that the professor did not send this email. However, please note that the email could have been spoofed, even if it appears to originate from a UMBC email. Therefore, always check with DoIT(</span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>) or email/contact the impersonated person on a completely different email when you see a conflict in the address.</span></p></li></ol><br><ol><li><p><span>WhatsApp/Phone number.  A lot of scammers will ask for your number. If their number gets reported, they could easily get a new one. The same can be said for an email address; however, they will lose responses from other phishing email recipients if their email is blocked. If you ever receive a job offer asking for a WhatsApp number or a phone number in general,  </span><span>BE SUSPICIOUS</span><span>!</span></p></li><li><p><span>The email template. This template is very common. After a quick Google search, we found three Job scams articles with the same template. So if you are ever in doubt, </span><span>GOOGLE IT!</span><span> UMBC will not use a known phishing template to offer you a job opportunity.</span></p></li></ol><br><p><span>The other professors and departments impersonated using a similar template are:</span></p><ul><li><p><span>Professor Brandy Wallace in the Department of Sociology &lt;</span><a href="mailto:menitreksksjjekisodrekssj66@gmail.com" rel="nofollow external" class="bo"><span>menitreksksjjekisodrekssj66@gmail.com</span></a><span>&gt;</span></p></li><li><p><span>Professor Anne E. Brodsky in the Department of Psychology </span><span>&lt;</span><a href="mailto:hollywoodardshop@gmail.com" rel="nofollow external" class="bo"><span>hollywoodardshop@gmail.com</span></a><span>&gt;</span></p></li><li><p><span>Professor Alan Sherman in the Department of Computer Science </span><span>&lt;</span><a href="mailto:mullerjame65@gmail.com" rel="nofollow external" class="bo"><span>mullerjame65@gmail.com</span></a><span>&gt;/&lt;</span><span><a href="mailto:menitreksksjjekisodrekssj66@gmail.com">menitreksksjjekisodrekssj66@gmail.com</a></span><span>&gt;</span></p></li><li><p><span>Professor Lisa  Dickson in the Department of Economics </span><span>&lt;</span><a href="mailto:joseplhevans@gmail.com" rel="nofollow external" class="bo"><span>joseplhevans@gmail.com</span></a><span>&gt;</span></p></li><li><p><span>Professor Park Do Hwan the Department: Mathematics and Statistics</span><span> &lt;<a href="mailto:joseplhevans@gmail.com">joseplhevans@gmail.com</a>&gt;</span></p></li></ul><br><p><span>If you have received any message similar to the one listed above, please forward it with its headers to</span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>For more information about phishing, visit:</span><span><a href="https://itsecurity.umbc.edu/critical/?id=98136">https://itsecurity.umbc.edu/critical/?id=98136</a>.</span></p><p><span>______________________________________________________________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></div>
]]>
</Body>
<Summary>Recently, the Division of Information Technology(DoIT) received multiple reports of job phishing emails. The scammers sending these emails are impersonating professors of the different departments...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/119288/guest@my.umbc.edu/12a6da78cd7a5a79c5fe119204089567/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 09 May 2022 11:02:15 -0400</PostedAt>
<EditAt>Tue, 12 Jul 2022 10:30:06 -0400</EditAt>
</NewsItem>

</News>
