<?xml version="1.0"?>
<News hasArchived="false" page="9" pageCount="29" pageSize="10" timestamp="Sun, 26 Apr 2026 16:23:48 -0400" url="https://beta.my.umbc.edu/groups/itsecurity/posts.xml?mode=activity&amp;page=9">
<NewsItem contentIssues="false" id="112659" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/112659">
<Title>Seventeen tips to secure your phone</Title>
<Tagline>Advice From Smartphone Insight</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Smartphone Insight has published a handy guide with step-by-step instructions to protect your IoS or Android phone data. With these 17 tips, your device will continuously be up to date. In addition, you will see the cool tricks and tips available on your phone to help encrypt your phone data, best practices to use while in public, and how to secure your data and phone while browsing the internet.</span></p><p><span> To read the guide visit: </span><a href="https://smartphoneinsight.com/how-to-keep-your-phone-secure/" rel="nofollow external" class="bo"><span>https://smartphoneinsight.com/how-to-keep-your-phone-secure/</span></a></p><br><p><span>______________________________________________________________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></p></div>
]]>
</Body>
<Summary>Smartphone Insight has published a handy guide with step-by-step instructions to protect your IoS or Android phone data. With these 17 tips, your device will continuously be up to date. In...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/112659/guest@my.umbc.edu/a034862b4e4287514f38cda29f7d5f22/api/pixel</TrackingUrl>
<Tag>learn</Tag>
<Tag>noltice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 26 Sep 2021 21:15:37 -0400</PostedAt>
<EditAt>Mon, 01 Nov 2021 16:42:37 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="112658" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/112658">
<Title>Account data breach: Epik</Title>
<Tagline>Epik Accounts Posted Online</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>On September 13, 2021, the </span><span>domain registrar and web hosting company</span><span>, Epik, suffered a data breach. This breach contained data for approximately 15 million Epik and non-Epik customers. A</span><span>llegedly, this was done in retaliation for hosting alt-right websites. </span><span>The information included </span><span>email addresses, names, phone numbers, geographical addresses, purchases,</span><span> and </span><span>WHOIS records.</span></p><br><p><span>The compromised accounts were subsequently made public.  Fifty-three UMBC accounts were victims of this breach. The victims are being notified via their UMBC emails and/or their alternate emails. If you have an Epik account, please contact them to see if you have been affected by this breach.</span></p><br><p><span>To see if you were involved in any other breach, visit: </span><a href="https://haveibeenpwned.com/" rel="nofollow external" class="bo"><span>https://haveibeenpwned.com/</span></a><span>.</span></p><br><br><p><span>More about Epik data breach:</span></p><p><a href="https://amp.cnn.com/cnn/2021/09/21/politics/anonymous-epik-hack/index.html" rel="nofollow external" class="bo"><span>https://amp.cnn.com/cnn/2021/09/21/politics/anonymous-epik-hack/index.html</span></a></p><br><br><p><span>If you have any questions or concerns, email us at: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>Information about this breach was provided to us by Have I Been Pwned(HIBP). </span></p><p> </p><p><span>______________________________________________________________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></p></div>
]]>
</Body>
<Summary>On September 13, 2021, the domain registrar and web hosting company, Epik, suffered a data breach. This breach contained data for approximately 15 million Epik and non-Epik customers. Allegedly,...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/112658/guest@my.umbc.edu/763b3c489c221ab0f1bc2d79eb004aa2/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 26 Sep 2021 21:13:40 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="112400" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/112400">
<Title>A Phishing Scam With A Malicious Attachment</Title>
<Tagline>A Well-Designed Attempt to Gather Your Account and Password</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span>DoIT received a report of a phishing scam that depends on the download and execution of an attachment.  The message, as seen below, appears to come from Joel Avila, the CEO of Edwards Label in Ventura, California.  Mr. Avila exists and really is CEO of that company, but he has nothing to do with this message.</span><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>from: Joel Avila &lt;<a href="mailto:renqingiot@163.com">renqingiot@163.com</a>&gt;</span></p><p><span>to: </span><span>removed for privacy</span></p><p><span>date: Aug 10, 2021, 12:08:50 PM</span></p><p><span>subject: PO1088EDW88</span></p><br><p><span>Hi,</span></p><br><p><span>I need your company to confirm if you can supply the attached PO.</span></p><p><span>Remember that we have encrypted your </span><span>removed for privacy</span><span>@umbc.edu product</span></p><br><p><span>Download PO1088_EDW88 and get back to us with your best price asap</span></p><br><p><span>Thanks,</span></p><br><br><p><span>Joel Avila</span></p><p><span>CEO/CFO</span></p><p><span>Edwards Label</span></p><p><span>2277 West Knoll Drive</span></p><p><span>Ventura, CA 93003</span></p><p><span>P (805) 658-2444 Ext.116</span></p><p><span>F (805) 658-0233</span></p></td></tr></tbody></table></div><br><br><p><span>Email scams generally try to create a sense of urgency, often around money.  They either threaten the recipient with imminent financial loss or offer the promise of immediate financial gain as long as the recipient acts quickly.  This scam takes a more subtle approach by suggesting that the recipient has been confused with some company that can supply a product that Mr. Avila is looking for.  A supposed purchase order is attached and the recipient might well consider looking at it for more information.</span></p><br><p><span>Once downloaded and clicked, the attachment displays a web page asking for a username and password.  Whatever is entered, the user will get a message that the entry is invalid.  In the meantime, the entered information will be stored on a remote server (in Nigeria in this particular instance).  Eventually, that server will accumulate a list of account/password pairs from people all over the world.</span></p><br><p><span>The moral is: </span><span>If you aren’t sure what’s in it, don’t click it!</span></p><p><span>For more information about phishing, visit:</span><a href="https://itsecurity.umbc.edu/critical/?id=98136" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?id=98136</span></a><span>.</span></p><br><p><span>If you have received any message similar to the one listed above, please forward it with its headers <a href="mailto:tosecurity@umbc.edu">tosecurity@umbc.edu</a>. For instructions, visit:</span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to <a href="mailto:security@umbc.edu">security@umbc.edu</a> along with the email headers. For instructions, visit:</span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></p></div>
]]>
</Body>
<Summary>DoIT received a report of a phishing scam that depends on the download and execution of an attachment.  The message, as seen below, appears to come from Joel Avila, the CEO of Edwards Label in...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/112400/guest@my.umbc.edu/3eeed98b2ef9b3658526ff16b9f51589/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 16 Sep 2021 20:34:47 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="112393" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/112393">
<Title>False Payment Scams</Title>
<Tagline>A Promise To Return A Payment You Never Made</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><span>Recently, DOIT received reports of email messages containing variations on the same financial scam.  Examples are included below.  Both the From and the To addresses are fake.  The recipient is informed of a payment made or owed to some known vendor and is provided with a phone number to be used to dispute that payment.  The goal is to get the recipient to call the number and provide credit card, PayPal, or banking information under the guise of ‘fixing’ the fake order.</span></div><div><span><br></span></div><div><span><br></span></div><p><span>Example 1</span></p><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: </span><span>rani sob</span><span> &lt;</span><span><a href="mailto:rani7654rob@gmail.com">rani7654rob@gmail.com</a></span><span>&gt;</span></p><p><span>Date: Thu, Sep 16, 2021 at 9:26 AM</span></p><p><span>Subject: MacBook Pro Bill receipt</span></p><p><span>To: &lt;</span><span><a href="mailto:koi7654ran@gmail.com">koi7654ran@gmail.com</a></span><span>&gt;</span></p><br><br><p><span>PayPal User,</span></p><p> </p><p><span>This email confirms that you made a payment . You sent a payment of $701 to Flipkart LTD. This charge will appear on your credit card statement as payment to PayPal. It may take a few moments to appear this transaction in your PayPal account.</span></p><p> </p><p><span>PAYMENT DETAILS:</span></p><p> </p><p><span>Transaction  Id:    875DDER4Q</span></p><p><span>Product Name:    MacBook Pro</span></p><p><span>Quantity:             1</span></p><p><span>Total Price:          $729</span></p><p> </p><p><span>Thank you for using PayPal as your method of payment. If you haven’t authorized this charge ,call us to dispute the transaction and get a full refund.</span></p><p><span>Contact us at: + 1(800) - (201) - (9132)</span></p><p> </p><p><span>Good day to You</span></p><p><span>PayPal.</span></p><br></td></tr></tbody></table></div><br><br><p><span>Example 2</span></p><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: </span><span>julitte bik</span><span> &lt;</span><span><a href="mailto:julitte5333bik@gmail.com">julitte5333bik@gmail.com</a></span><span>&gt;</span></p><p><span>Date: Thu, Sep 16, 2021 at 12:37 PM</span></p><p><span>Subject: thanks of paying for the subscription ..# ie 406 bk</span></p><p><span>To: &lt;</span><span><a href="mailto:consumer949@gmail.com">consumer949@gmail.com</a></span><span>&gt;</span></p><br><br><p><span>         </span></p><p><span>                          </span></p><p><span>   </span><span> </span><span> </span><span>prime sub</span><span>scrib</span><span>er of Norton . </span></p><p><span> </span></p><p><span>We wish to begin b</span><span>y expres</span><span>sing our profound gratitude for you being the loyal user of Norton life lock 360 sec</span><span>urity fo</span><span>r</span><span>pc and laptop.</span></p><p><span>We</span><span>wish to</span><span>inform you</span><span>that yo</span><span>ur subsc</span><span>ription is renewed as you have selected autopay while initi</span><span>ating </span><span>the services.</span></p><p><span>Product details are mentio</span><span>ned be</span><span>low:-</span></p><p><span>1. Inv</span><span>oice </span><span> id :   </span><span>  </span><span>                              : - ie 406 bk</span></p><p><span>2. Renewal d</span><span>ate   </span><span>                           :- 16</span><span><span>t</span></span><span><span>h</span></span><span> s</span><span>ep</span><span> 2021</span></p><p><span>3. Debi</span><span>ted </span><span> amount:                       :</span><span>-  $</span><span> 40</span><span>9</span><span>.01 us</span><span>d</span></p><p><span>4. Validity</span><span>peri</span><span>od:                        </span><span>  </span><span> :- </span><span> ( twel</span><span>ve ) </span><span>month’s</span></p><p><span>if u wish to upgr</span><span>ade t</span><span>he</span><span>plan or cancel the subscription OR the subscription was not been activated by you,then kindly contact to the number giv</span><span>en belo</span><span>w….</span><span>.</span></p><p><span>For qu</span><span>eries a</span><span>nd complain please call  =……</span><span>………</span><span>………… </span><span>+ </span><span>(1) - ( 877 </span><span>- </span><span>3</span><span>28 -</span><span> 6947 ).</span></p><br></td></tr></tbody></table></div><br><br><p><span>Example 3</span></p><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: elizabeth tho &lt;<a href="mailto:elizabeth1997tho@gmail.com">elizabeth1997tho@gmail.com</a>&gt;</span></p><p><span>To: consumer992 &lt;<a href="mailto:consumer992@gmail.com">consumer992@gmail.com</a>&gt;</span></p><p><span>Date: Sep 13, 2021, 1:50:16 PM</span></p><p><span>Subject: @ - ALL right reserved customer #EWQ321QW</span></p><br><br><p><span>dear……</span><span>PAYER</span></p><p><span>your purchase play for norton security HAS successfully </span><span>renewed </span><span>and </span><span>update </span><span>been the</span></p><p><span>charged sum WILL be reflected </span><span>inside </span><span>next</span></p><div><table><colgroup></colgroup><tbody><tr><td><p><span> </span></p></td></tr></tbody></table></div><p><span>to 48 hrs in your account statement </span><span>FOR </span><span>your order norton security just acts like a vaccine for your system preventing THE system against all </span><span>the </span><span>suspicious threats..</span></p><p><span>we wish to inform </span><span>you </span><span>the details for your order as we BELIVE IN transparency</span></p><div><table><colgroup></colgroup><tbody><tr><td><p><span>invoice     </span><span>ID</span></p></td><td><p><span>EWQ321QW</span></p></td></tr><tr><td><p><span>expair DATE</span></p></td><td><p><span>13/09/</span><span>2021</span></p></td></tr><tr><td><p><span>price</span></p></td><td><p><span>349.</span><span>61  USD</span></p></td></tr><tr><td><p><span>PAYMENT </span><span>method</span></p></td><td><p><span>auto - debited</span></p></td></tr></tbody></table></div><p><span> </span></p><p><span>please </span><span>feel free to STOP by on within next 60 days .</span></p><p><span>to learn more about our product and meet our </span><span>team </span><span>. give  USA   call or email us TO learn more about OUR product and </span><span>services</span><span>.</span></p><p><span>Costumer </span><span>CARE </span><span>no :-  ---- </span><span> (877)  - 328- (6947)</span></p><p><span>THANKS</span></p><p><span>@ -  ALL right </span><span>reserved </span><span>customer</span></p><br></td></tr></tbody></table></div><br><br><p><span>Whenever you receive such emails, always try and verify with the senders on an entirely different email if you know them. Feel free to always send the message to us to validate the email.</span></p><p><span>For more information about phishing, visit:</span><a href="https://itsecurity.umbc.edu/critical/?id=98136" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?id=98136</span></a><span>.</span></p><br><p><span>If you have received any message similar to the one listed above, please forward it with its headers <a href="mailto:tosecurity@umbc.edu">tosecurity@umbc.edu</a>. For instructions, visit:</span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>_________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to <a href="mailto:security@umbc.edu">security@umbc.edu</a> along with the email headers. For instructions, visit:</span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></p><br><br></div>
]]>
</Body>
<Summary>Recently, DOIT received reports of email messages containing variations on the same financial scam.  Examples are included below.  Both the From and the To addresses are fake.  The recipient is...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/112393/guest@my.umbc.edu/48e384fc70b4c6a4c301626b38c9b30a/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 16 Sep 2021 15:19:08 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="112386" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/112386">
<Title>Summary of Phishing Techniques and Defenses</Title>
<Tagline>A Recent Report On Phishing Attacks (And How To Avoid Them)</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div>However you get your news, by now you have seen the term 'phishing' used to describe ways to exploit people on the Internet.  You or someone you know may have been the target of a phishing attack.  At UMBC, the Division of Information Technology (DoIT) saw a surge in various types of phishing attacks since the start of the lockdown in the sprint of 2020.  <br></div><div><br></div><div>The term 'phishing' refers to attempts to gather personal or otherwise sensitive information from a victim.  The information is usually specific and, if possible, unique enough to serve as identification for the victim.  This includes obvious things like social security numbers, phone numbers, and online account passwords.  It may also include less obvious information, such as birthdays, the names of family members, or even the name of the victim's old high school.</div><div><br></div><div>Area 1 Security has published a report based on <span><span> "over 31 million threats discovered from May 1, 2020 to April 30, </span></span><span><span>2021" that describes the different types of phishing and provides some guidance in guarding against them.   <br></span></span></div><div><br></div><div>The report is not long.  We strongly encourage you to look at pp. 17-18, the report's Recommendation section. While it is addressing IT support groups, most of the advice can be useful to individuals as well.<br></div><div><br></div><div><a href="https://www.area1security.com/resources/download-2021-email-threat-report/">https://www.area1security.com/resources/download-2021-email-threat-report/</a></div><div><br></div><div>If you receive a phishing message, <span>please forward it with its headers to </span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. For instructions on displaying headers, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span><br><p><span>______________________________________________________________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></p></div></div>
]]>
</Body>
<Summary>However you get your news, by now you have seen the term 'phishing' used to describe ways to exploit people on the Internet.  You or someone you know may have been the target of a phishing...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/112386/guest@my.umbc.edu/656ddc80653e366f3f3e13307978e7ad/api/pixel</TrackingUrl>
<Tag>learn</Tag>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 16 Sep 2021 15:15:12 -0400</PostedAt>
<EditAt>Mon, 01 Nov 2021 16:43:10 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="112310" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/112310">
<Title>Account data breach: Nitro</Title>
<Tagline>Digital Document Service Breached</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>In September 2020, a Portable Document Format(PDF) file and digital document service, Nitro, suffered a data breach. This breach contained data for approximately 78 million customers and was exposed online. The customer information included names, passwords and the titles of documents. No financial information was leaked.</span></p><br><p><span> 1,440 UMBC accounts were victims of this breach. The victims are being notified via their UMBC emails and/or their alternate emails. If you have a Nitro account, please contact them to see if you have been affected by this breach. To see if you were involved in any other breach, visit: </span><a href="https://haveibeenpwned.com/" rel="nofollow external" class="bo"><span>https://haveibeenpwned.com/</span></a><span>.</span></p><br><br><p><span>More about Nitro data breach:</span></p><p><span><a href="https://infosec.berry.edu/2021/01/19/data-breach-notification-nitro-pdf/#:~:text=In%20September%20of%202020%20there%20was%20a%20breach,or%20vikings.berry.edu%20email%20address%20">https://infosec.berry.edu/2021/01/19/data-breach-notification-nitro-pdf/#:~:text=In%20September%20of%202020%20there%20was%20a%20breach,or%20vikings.berry.edu%20email%20address%20</a> included%20in%20the%20 breach.</span></p><br><br><p><span>If you have any questions or concerns, email us at: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>Information about this breach was provided to us by Have I Been Pwned(HIBP). </span></p><p> </p><p><span>______________________________________________________________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></p></div>
]]>
</Body>
<Summary>In September 2020, a Portable Document Format(PDF) file and digital document service, Nitro, suffered a data breach. This breach contained data for approximately 78 million customers and was...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/112310/guest@my.umbc.edu/b015eeb17b697f9414e770c24f4ad2a9/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 14 Sep 2021 16:04:20 -0400</PostedAt>
<EditAt>Tue, 14 Sep 2021 16:05:04 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="112308" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/112308">
<Title>Account data breach: Romwe</Title>
<Tagline>Online Fashion Site Breached</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>In June 2018, an online fashion website, Romwe, suffered a data breach. This breach has data for approximately 20 million customers. The data was sold online. The customer information includes names, email addresses, IP addresses, physical addresses, phone numbers, and passwords. No financial information was leaked.</span></p><br><p><span>229  UMBC accounts were potential victims of this breach. The victims are being notified via their UMBC emails and/or their alternate emails. If you have a Romwe account, please contact them to see if you have been affected by this breach. To see if you were involved in any other breach visit:</span><a href="https://haveibeenpwned.com/" rel="nofollow external" class="bo"><span>https://haveibeenpwned.com/</span></a><span>.</span></p><br><br><p><span>More about Romwe data breach:</span></p><p><span><a href="https://us.romwe.com/datasecurityFAQs-a-1039.html?SASSource=cjunction&amp;affiliateID=100357191_5250933&amp;url_from=cj.com&amp;cjevent=dd0a33c1077f11ec804300290a82b82d">https://us.romwe.com/datasecurityFAQs-a-1039.html?SASSource=cjunction&amp;affiliateID=100357191_5250933&amp;url_from=cj.com&amp;cjevent=dd0a33c1077f11ec804300290a82b82d</a></span></p><br><br><br><p><span>If you have any questions or concerns, email us at:</span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>Information about this breach was provided to us by Have I Been Pwned(HIBP). </span></p><p> </p><p><span>______________________________________________________________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurit</span></a><span>y.</span></p></div>
]]>
</Body>
<Summary>In June 2018, an online fashion website, Romwe, suffered a data breach. This breach has data for approximately 20 million customers. The data was sold online. The customer information includes...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/112308/guest@my.umbc.edu/685d281e225088a2a9a529d5cdcfb79b/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 14 Sep 2021 16:00:50 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="112307" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/112307">
<Title>Vendor Breaches and Account Compromises</Title>
<Tagline>Password Stopped Working?  This Might Be Why.</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><h3><span>Vendor Breaches and Account Compromises</span></h3><br><p><span>Internet vendors will, at times, suffer data breaches.  Sometimes the service will attempt to contact it’s account holders and other times it won’t.  Often, after some time has passed, the malicious actors who stole the original data or others who have acquired it in the meantime will release it publicly.  UMBC’s Division of Information Technology (DoIT) subscribes to a service called HaveIBeenPwned which looks for such public releases and searches them for email addresses ending in @umbc.edu.</span></p><br><p><span>For example, if you registered for a member’s discount card with Giant Food or signed-up for online banking and entered your email address as </span><a href="mailto:myname@umbc.edu" rel="nofollow external" class="bo"><span>myname@umbc.edu</span></a><span>,  DoIT may receive notification if a publicly released breach included that email address.  This does NOT automatically mean that your UMBC account was compromised.  If you use a different password on your Giant account than you use on your UMBC account, then your UMBC account is still secure.</span></p><br><p><span>If DoIT determines that your UMBC account has been compromised (or if we are unable to determine that it hasn’t), your password will be replaced with a random string of text.  You will also receive email in your Password Reset Email account (</span><span>not</span><span> your primary UMBC account) notifying you of the password change. </span></p><br><p><span>DoIT has no way of knowing what the new randomized password is, but you can recover access to your account by going to the MyUMBC login page and selecting “Forgot your password?” (see image below).  You will then need to answer the security questions you set up for your account.  After answering correctly, a link will be sent to your designated Password Reset Email account.  If you have trouble with this, the Technology Support Center (</span><a href="https://doit.umbc.edu/tsc/" rel="nofollow external" class="bo"><span>https://doit.umbc.edu/tsc/</span></a><span>, 410-455-3838) can assist you.</span></p><br><p><span><span><img src="https://lh4.googleusercontent.com/AwjNsPp6Wp1hTCCQ4VNlBRrzrc8eAz98vDyNJ2ME5mz-raFZcLk39DeQXLuwtSXE_WRoOXCs2-XBVMo_1OBYz_1LTA4ePeS5_dwbskmQxhb7KACOLDE0yDkDlKcOl9tnAAi6E-5S=s0" width="541" height="470" style="max-width: 100%; height: auto;"></span></span></p><br><br></div>
]]>
</Body>
<Summary>Vendor Breaches and Account Compromises   Internet vendors will, at times, suffer data breaches.  Sometimes the service will attempt to contact it’s account holders and other times it won’t. ...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/112307/guest@my.umbc.edu/40987f9cf2e4f4b975569be2b32010ef/api/pixel</TrackingUrl>
<Tag>learn</Tag>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 14 Sep 2021 15:54:43 -0400</PostedAt>
<EditAt>Mon, 01 Nov 2021 16:44:36 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="112267" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/112267">
<Title>Phishing Alert: President Freeman A. Hrabowski impersonator</Title>
<Tagline>This Is Not Dr. Hrabowski!</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><br><p><span>Recently, DOIT received an email from a compromised account at North Central Kansas Technical College(NCKTC) impersonating Dr Hrabowski. The email consisted of a Microsoft word document titled “EVALUATION FORM.” Below is a copy of the email. We removed the name of the NCKTC user and the To field for privacy reasons.</span></p><br><br><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: NCKTC member’s name &lt;<a href="mailto:userID@ncktc.edu">userID@ncktc.edu</a>&gt;</span></p><p><span>Date: Wed, Aug 25, 2021 at 12:00 PM</span></p><p><span>Subject: NCKTC member name shared "EVALUATION FORM" with you.</span></p><p><span>To: </span></p><br><p><span><span><img src="https://lh4.googleusercontent.com/gxKZJLBmXeNRA9AxGaSwu6ljZsXoDQNyRrskyNQIhO2Adn3LWj1rIlV4PvOYeT7x3gBA-DpPdvlDW07g_FBkngsXazBSngRtRvemm2uljcjprzUEu35-91T0UTrFUFI6JOUOPgi6=s0" width="610" height="312" style="max-width: 100%; height: auto;"></span></span></p></td></tr></tbody></table></div><br><p><span>The link for the email will take you to the EVALUATION FORM document. See below to look inside the Word docs. </span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span><span><img src="https://lh5.googleusercontent.com/lmVx6LKFKxRlJR31r9FoBsS3P2KEhG4UeZajeNjeO85w6g_Oo987-1nIkcWd3M5rgKVZ_hqTVaYTMy4CZsjYJzwHcsZKE6snjkPQGO6vhj-oIhUdyHRz5eJVyOMZ-S6umLU3gQsz=s0" width="610" height="309" style="max-width: 100%; height: auto;"></span></span></p></td></tr></tbody></table></div><br><p><span>This link will ask you to sign in to your Microsoft account to view a file/form that the compromised account shared on One Drive. </span><span>DO NOT CLICK ON ANY OF THE LINKS IN THE EMAIL OR THE DOCS. </span><span>However, if you have done so already, please contact us immediately at</span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. </span></p><br><p><span>A lot of phishing emails contain a link that asks the recipients to sign into their accounts. Whenever you receive such emails, always try and verify with the senders on an entirely different email if you know them. Feel free to always send the message to us to validate the email.</span></p><br><p><span>For more information about phishing, visit:</span><span><a href="https://itsecurity.umbc.edu/critical/?id=98136">https://itsecurity.umbc.edu/critical/?id=98136</a>.</span></p><br><p><span>If you have received any message similar to the one listed above, please forward it with its headers to</span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>______________________________________________________________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></p><br><br><br><br><br><br><br><br></div>
]]>
</Body>
<Summary>Recently, DOIT received an email from a compromised account at North Central Kansas Technical College(NCKTC) impersonating Dr Hrabowski. The email consisted of a Microsoft word document titled...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/112267/guest@my.umbc.edu/5d2ed9704c24bfcbe9a7381192490342/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 13 Sep 2021 18:28:49 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="112255" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/112255">
<Title>Email marketing and the User-Agent-String</Title>
<Tagline>When What Looks Like Phishing Is Just Spam</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Recently, DOIT received multiple reports of suspicious messages about student loans from email addresses with the format &lt;emails@alert###.info&gt;. The recipients of these messages marked them as phishing, but on careful investigation, we realised that these were legitimate. We therefore classified these messages as spam instead of phishing. </span></p><br><p><span>According to Phishing.org, “[</span><span>p]hishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.</span><span>” A third party company, CollegeLoans, sent these messages on behalf of these loan companies. Therefore, they are not malicious or criminal; instead, they are commercial. </span></p><br><p><span>Nonetheless, you might not have subscribed to receive these messages; hence they are spam. According to Cisco.com, “[</span><span>s]pam is unsolicited and unwanted junk email sent out in bulk to an indiscriminate recipient list. Typically, ...sent for commercial purposes.”</span><span> These emails are advertisements. They target university students since people in this demographic may need help covering tuition costs. </span></p><br><p><span>As mentioned earlier, these loan messages or advertisements originated from the third party company, </span><span>CollegeLoan. This company is located in Puerto Rico. When you click on the link in the email, they will earn a commission whether or not you apply for the loans.</span><span> It is business. It’s email marketing. </span></p><br><p><span>CollegeLoans sends out links on behalf of the following companies:</span></p><ul><li><p><span>Sallie Mae Smart Student Loan</span></p></li><li><p><span>Discover Undergraduate Loan</span></p></li><li><p><span>Credible Student Loan</span></p></li><li><p><span>Earnest Student Loan</span></p></li><li><p><span>College Ave Student Loan</span></p></li><li><p><span>CommonBond Student Loan</span></p></li></ul><br><p><span>We were also suspicious because clicking the link might take the reader to Amazon.com rather than the advertised site.  Among the information webservers can collect when you click is something called a User-Agent-String.  This string helps the website determine the version of the browser you are using in order to avoid trying to perform advanced functions on old browsers.   Bad actors may use this feature to hide from browsers commonly used to analyze malicious sites. However, we determined that the link is not malicious. </span></p><br><p><span>We are not sure of the reason that CollegeLoans chose to use browser detection. However, it is not uncommon for developers/companies to add this feature to their code/applications. According to  MDN web Docs, using a browser detection would depend on one of the following:</span></p><ul><li><p><span>If you are trying to work around a specific bug in some version of a browser.</span></p></li><li><p><span>If you are trying to check for the existence of a particular feature.</span></p></li><li><p><span>If you want to provide different HTML depending on which browser.</span></p></li></ul><div>When you receive messages like this<span>, plese mark them as spam or phishing and continue to report them to us at: </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a>.</span></div><div><span><br></span></div><p><span>Source:</span></p><br><p><a href="https://www.phishing.org/what-is-phishing" rel="nofollow external" class="bo"><span>https://www.phishing.org/what-is-phishing</span></a></p><br><p><a href="https://www.cisco.com/c/en/us/products/security/email-security/what-is-spam.html#:~:text=Spam%20email%20is%20unsolicited%20and,botnets%2C%20networks%20of%20infected%20computers" rel="nofollow external" class="bo"><span>https://www.cisco.com/c/en/us/products/security/email-security/what-is-spam.html#:~:text=Spam%20email%20is%20unsolicited%20and,botnets%2C%20networks%20of%20infected%20computers</span></a><span>.</span></p><br><p><span>To read more about user agents, visit </span><a href="https://towardsdatascience.com/the-user-agent-that-crazy-string-underpinning-a-bunch-of-analytics-86507ef632f0" rel="nofollow external" class="bo"><span>https://towardsdatascience.com/the-user-agent-that-crazy-string-underpinning-a-bunch-of-analytics-86507ef632f0</span></a><span>.</span></p><br><p><span><a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Browser_detection_using_the_user_agent">https://developer.mozilla.org/en-US/docs/Web/HTTP/Browser_detection_using_the_user_agent</a></span></p><br><p><span>______________________________________________________________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></p></div>
]]>
</Body>
<Summary>Recently, DOIT received multiple reports of suspicious messages about student loans from email addresses with the format &lt;emails@alert###.info&gt;. The recipients of these messages marked them...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/112255/guest@my.umbc.edu/96ad3039ef3fff9a72053358bbb5565d/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777162216</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777162216</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777162216</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777162216</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777162216</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777162216</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777162216</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 13 Sep 2021 14:45:05 -0400</PostedAt>
</NewsItem>

</News>
