<?xml version="1.0"?>
<News hasArchived="false" page="16" pageCount="29" pageSize="10" timestamp="Mon, 27 Apr 2026 11:01:27 -0400" url="https://beta.my.umbc.edu/groups/itsecurity/posts.xml?mode=pawpularity&amp;page=16">
<NewsItem contentIssues="false" id="95701" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/95701">
<Title>Data Breach: LiveAuctioneers</Title>
<Tagline>Data Breach On Online Marketplace</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>On June 19, 2020 an online antique Marketplace, LiveAuctioneers, suffered a data breach. Approximately 3.4 million records were leaked. The records include names, email and IP addresses, physical addresses, phone numbers and passwords stored as unsalted MD5 hashes.The information was sold online and redistributed to a hacking forum. </span></p><br><p><span>29 UMBC accounts were victims of this breach. The victims are being notified via their UMBC emails and/or their alternate emails. If you have a LiveAuctioneers account, please contact them to see if you have been affected by this breach. To see if you were involved in any other breach visit: </span><a href="https://haveibeenpwned.com/" rel="nofollow external" class="bo"><span>https://haveibeenpwned.com/</span></a><span>.</span></p><br><br><p><span>More about LiveAuctioneers data breach:</span></p><br><p><a href="https://www.bleepingcomputer.com/news/security/liveauctioneers-reports-data-breach-after-user-records-sold-online/" rel="nofollow external" class="bo"><span>https://www.bleepingcomputer.com/news/security/liveauctioneers-reports-data-breach-after-user-records-sold-online/</span></a></p><br><p><a href="https://portswigger.net/daily-swig/liveauctioneers-data-breach-millions-of-cracked-passwords-for-sale-say-researchers" rel="nofollow external" class="bo"><span>https://portswigger.net/daily-swig/liveauctioneers-data-breach-millions-of-cracked-passwords-for-sale-say-researchers</span></a></p><br><p><span>If you have any questions or concerns email us: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> </span></p><br><p><span>Information about this breach was provided to us by Have I Been Pwned(HIBP). </span></p><p> </p><p><span>_____________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><p> </p><p><span>Need to set up a recovery email for your UMBC account?</span></p><p><span>Follow the instructions here: </span><a href="https://my3.my.umbc.edu/groups/itsecurity/posts/94776" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity/posts/94776</span></a></p><br><span>Follow us on myUMBC</span><span>:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></div>
]]>
</Body>
<Summary>On June 19, 2020 an online antique Marketplace, LiveAuctioneers, suffered a data breach. Approximately 3.4 million records were leaked. The records include names, email and IP addresses, physical...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95701/guest@my.umbc.edu/d1552b867ee2664afd3bac8764721a96/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777298598</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777298598</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777298598</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777298598</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1777298598</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777298598</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777298598</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777298598</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777298598</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 11 Sep 2020 11:19:48 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="95627" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/95627">
<Title>Covid-19 Scams Are Still Active</Title>
<Tagline>Some More Tips To Identify Contact Tracing Scams</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>With Covid-19 being something we all face in our daily lives, malicious actors are not giving up on scamming people out of not only their personal and financial information, but are also trying to get their victims’ money or even just installing a malicious software onto their victim’s devices.</span></p><br><p><span>The article linked below from Forbes is a good reminder that there are still many types of Covid-19 themed threats from phishing scams to fake websites.</span></p><br><p><span>Phishing Scams</span></p><br><p><span>Phishing emails are one of the biggest scams out there. As time goes on the scammers get more and more creative with their phishing techniques. With many people worried about Covid-19 and working from home, scammers are posing as loan specialists, health officials, and national authorities. For example, some scammers send emails that appear to be from the World Health Organization (WHO) or the Center for Disease Control and Prevention (CDC).</span></p><br><p><span>Here are some tip to look for to try and spot a phishing email:</span></p><br><ul><li><p><span>Unfamiliar email address</span></p></li><li><p><span>Generic greetings</span></p></li><li><p><span>Spelling and grammatical errors</span></p></li><li><p><span>Sense of urgency or demand for immediate action</span></p></li><li><p><span>Request for banking or personal information</span><span><br><br></span></p></li></ul><p><span>At UMBC we see phishing emails with scammers saying that they are from places like Cisco or Corestaff trying to give work from home opportunities to students. We have also seen attempts in which a compromised umbc account will be used to send out phishing emails. For more information on these scams or other tips please check out the DoIT security articles which are linked below.</span></p><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. </span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>Bogus Websites</span></p><br><p><span>Another common scamming technique is the use of fake websites. Scammers will provide a link to these websites in their phishing emails to make the scam more believable. The scammer tries to make the website look as legitimate as possible. They may do this by using similar domain names such as &lt;<a href="http://www.umbc.net&amp;gt">www.umbc.net&gt</a>; instead of &lt;<a href="http://www.umbc.edu&amp;gt">www.umbc.edu&gt</a>;.</span></p><br><p><span>There are ways to try and make sure the website you are visiting is legitimate. Before you click, check the link! If you move your cursor over the link </span><span>without</span><span> clicking, the real link address should appear at the bottom of your browser. </span></p><br><p><span>Here are some other tips to help verify that a website is legitimate:</span><span><br><br></span></p><ul><li><p><span> Check to see if the website has a secure connection, this can be seen at the top left of the search bar where there is a little lock icon.</span></p></li><li><p><span>Look for https in the URL instead of http, (the </span><span>s </span><span>stands for secure).</span></p></li><li><p><span>Verify the website's privacy policy if possible.</span></p></li><li><p><span>Check for contact information on the website, if there is no privacy or contact information that is a big red flag.</span></p></li><li><p><span>Watch out for signs of malware, meaning suspicious pop-ups and fake-looking ads.</span></p></li></ul><br><p><span>Fake Advertisements</span></p><br><p><span>Similar to the creation of fake websites, scammers are creating fake ads. Scammers use fake ads to trick people into providing information for things like Covid-19 loans and stimulus checks. </span></p><p><span><br></span><span>Just as with phishing emails, these ads will have a sense of urgency to them. Using terms like “Act now before funds run out.” The important thing to remember here is to </span><span>not </span><span>click on ads on unfamiliar websites and pages. Please do not give out personal or financial information online if the person or site that you are giving it to is not secure and trusted.</span></p><br><p><span>Phony Phone Calls and Texts</span></p><br><p><span>Phishing campaigns are not limited to emails, but can appear in phone calls, text messages, and direct messages (DMs) on social media sites like Facebook and Twitter. If you receive a strange message or voicemail from an unknown sender or caller, do not respond or click on any links.</span></p><br><p><span>For text messages and DMs, use the same precautions as with phishing emails. Do not click on links from unsolicited messages, watch out for spelling and grammatical errors, and do not provide any personal or financial information.</span></p><br><p><span>For more information on tips to help protect against phishing scams done over text or DMs (also known as “smishing”) please check out this article: </span><a href="https://itsecurity.umbc.edu/critical/?id=94345" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?id=94345</span></a><span>. </span><span><br></span><span><br></span><span>When it comes to phone calls, use caution. Do not give away any personal or financial information over the phone, especially your Social Security number or bank account information. If you feel the call is suspicious, hang up. If the scammers are claiming to be from a company or a bank and you feel the call is suspicious, do not interact try to find the actual customer service number from the company’s website, to confirm if the call was legitimate or not.</span></p><br><p><span>For more information, please check out: </span></p><p><a href="https://www.forbes.com/sites/mikekappel/2020/08/05/cybersecurity-threats-during-covid-19/#68b36c80113c" rel="nofollow external" class="bo"><span>https://www.forbes.com/sites/mikekappel/2020/08/05/cybersecurity-threats-during-covid-19/#68b36c80113c</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>With Covid-19 being something we all face in our daily lives, malicious actors are not giving up on scamming people out of not only their personal and financial information, but are also trying to...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95627/guest@my.umbc.edu/fcc31dd687ec51221af4f8c7412a8807/api/pixel</TrackingUrl>
<Tag>covid19</Tag>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777298598</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777298598</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777298598</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777298598</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1777298598</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777298598</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777298598</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777298598</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777298598</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 09 Sep 2020 20:09:27 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="95625" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/95625">
<Title>Covid-19 Contact Tracing Scams</Title>
<Tagline>Contact Tracing Scammers Are Still Active</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>With Covid-19 still very present in our day to day lives, many states have started to roll out contact tracing programs to help control the spread of disease. This is done by informing people who have come in contact with someone who has tested positive and warning them to watch for symptoms. But with anything new that starts, malicious actors are quick to jump on the bandwagon and exploit the chance to try and scam people out of personal and financial information.</span></p><br><p><span>These scams work by sending an unsolicited message to you via text, email, or a social media app. These messages will explain that you’ve come in contact with someone who has tested positive for Covid-19.  The message will instruct you to self-isolate and provide a link for more information. The link can contain malware that could cause harm to your device.</span></p><br><p><span>Another version of this scam involves a robocall claiming to be part of “contact and tracing efforts.” The call will inform you that you have come in contact with someone who tested positive for Covid-19. After you elect to speak to a representative, the “contact tracer” asks to verify your personal information. This starts with your full name, date of birth, but can quickly move to personal identifiable information and/or financial information.</span></p><br><p><span>Here are some tips to help tell if you are talking to a real contact tracer:</span></p><ul><li><p><span>Contact tracers will ask you to confirm your identity, but not financial information. They will ask for you to confirm your name, address and date of birth. They may also ask about your current health, medical history, and recent travels. They will </span><span>not </span><span>ask for any government ID numbers or bank account details. </span></p></li><li><p><span>Contact tracers will identify themselves. They should start the call with their name and stating that they are calling from the department of health or another official recognized organization.</span></p></li><li><p><span>Contact tracing is normally done by phone call. Not through social media or texting.</span></p></li><li><p><span>A real contact tracer will never reveal the identity of the person who tested positive. </span></p></li><li><p><span>If you receive a link and are not sure if it is real, double check it. If the contact tracer is claiming to be from the government the URL should end in .gov (for the United States) or .ca (for Canada). </span></p></li></ul><br><p><span>If you live in Maryland, please visit </span><a href="https://coronavirus.maryland.gov/pages/contact-tracing" rel="nofollow external" class="bo"><span>https://coronavirus.maryland.gov/pages/contact-tracing</span></a><span> for more information on Maryland’s contact tracing efforts. According to the link above, the caller ID for a Maryland contact tracer should be marked as “MD COVID”. If you do not have caller ID, the phone number you are looking for is (240) 466-4488.</span></p><br><p><span>If you do receive a message that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address or phone number is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>For more information, please check out: </span></p><p><a href="https://www.bbb.org/article/news-releases/22560-scam-alert-covid-contact-tracing-work-inspires-copycat-scams" rel="nofollow external" class="bo"><span>https://www.bbb.org/article/news-releases/22560-scam-alert-covid-contact-tracing-work-inspires-copycat-scams</span></a></p><br><p><span>To read more articles published by DoIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>With Covid-19 still very present in our day to day lives, many states have started to roll out contact tracing programs to help control the spread of disease. This is done by informing people who...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95625/guest@my.umbc.edu/38c2880e3e9dcfcae2daf0b20259f118/api/pixel</TrackingUrl>
<Tag>covid19</Tag>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777298598</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777298598</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777298598</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777298598</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1777298598</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777298598</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777298598</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777298598</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777298598</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 09 Sep 2020 19:52:07 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="95624" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/95624">
<Title>Job Scam "Internship" From A Compromised UMBC Account</Title>
<Tagline>Check The "Reply-To" Address</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>The job scam below was recently reported to DoIT. The subject of the email is just “Internship” and has a very short message as can be seen below. The name and email of the from and to fields were removed for privacy reasons.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: COMPROMISED EMAIL &lt;@umbc.edu&gt;</span></p><p><span>Date: Sun, 6 Sep 2020</span></p><p><span>Subject: Internship</span></p><p><span>To: &lt;@umbc.edu&gt;</span><span><br></span><span><br></span><span>Personal_Assistant  urgently needed. Contact <a href="mailto:charlenabolinlyco21@gmail.com">charlenabolinlyco21@gmail.com</a> for more information or to sign up.</span></p><br><p><span>Regards,</span></p><p><span>HR  Manager.</span></p></td></tr></tbody></table></div><br><p><span>Please note that the phishing message above is supposedly coming froman umbc email but the reply-to in the emails header is set to &lt;</span><a href="mailto:charlenabolinlyco21@gmail.com" rel="nofollow external" class="bo"><span>charlenabolinlyco21@gmail.com</span></a><span>&gt;. This would mean if the user tried to respond to the email above they would not be responding to the umbc email address, but instead they would be directly emailing the scammers at &lt;</span><a href="mailto:charlenabolinlyco21@gmail.com" rel="nofollow external" class="bo"><span>charlenabolinlyco21@gmail.com</span></a><span>&gt;.</span></p><br><p><span>If you do receive this or any other email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>The job scam below was recently reported to DoIT. The subject of the email is just “Internship” and has a very short message as can be seen below. The name and email of the from and to fields were...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95624/guest@my.umbc.edu/41139130f1ac2db6741b2caedb190a9a/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777298598</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777298598</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777298598</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777298598</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1777298598</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777298598</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777298598</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777298598</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777298598</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 09 Sep 2020 19:42:24 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="95316" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/95316">
<Title>FAKE Offer Of A "Personal Assistant" Job</Title>
<Tagline>NOTICE: "Ryan Glenn" Does NOT Want To Hire You.</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>In the last several days, the UMBC
    community has received thousands of fake job offers from "Ryan
    Glenn".  An example is shown below:<br>
    <br>
    </span></p>
    
    <table border="1">
     <tbody><tr>
      <td>
      <p><span>You are eligible to apply for an
      opening as an Online Personal<br>
      Assistant to Ryan Glenn,<br>
      Investor Relations Paylocity.  You will be working remotely and<br>
      getting paid weekly.<br>
      <br>
      You will be required to work for a maximum of an hour daily or six hours
      weekly.<br>
      <br>
      Fill the required information if interested in this opportunity.<br>
      <br>
      Name:<br>
      Physical Address:<br>
      State:<br>
      City:<br>
      Zip Code:<br>
      Phone #:<br>
      Email:<br>
      Alternate Email:<br>
      A little about you and why you think you should be considered:<br>
      <br>
      Send replies to <a href="mailto:charlenabolinlyco21@gmail.com" rel="nofollow external" class="bo"><span>charlenabolinlyco21@gmail.com</span></a> to apply.<br>
      <br>
      Warm Regards<br>
      Charlena B<br>
      Publicity Manager.</span></p>
      <p><span> </span></p>
      </td>
     </tr>
    </tbody></table>
    
    <p><span> </span></p>
    
    <p><span> </span></p>
    
    <p><span>Summary: The message above is coming from
    someone you don’t know and who doesn’t offer a last name. <span> </span>The message asks for detailed information that
    can be used for identity theft.<span>  </span>It is
    from a Gmail account which anyone can create under any name not already in use.<span>  <br></span></span></p><p><span><span><br></span></span></p><p><span>If you respond to this message, you will get
    something like the one below:</span></p>
    
    <p><span> </span></p>
    
    <table border="1">
     <tbody><tr>
      <td>
      <p><span>From: <strong>Ryan Glenn</strong> &lt;<a href="mailto:ryan.glenn.pay@gmail.com" rel="nofollow external" class="bo"><span>ryan.glenn.pay@gmail.com</span></a>&gt;</span></p>
      <p><span>Date: Sat, Aug 29, 2020 at 5:13 PM<br>
      Subject: CONFIRMATION<br>
      To: </span></p>
      <p><span>Hello, further to the interview
      session I had with you, I am </span></p>
      <p><span>pleased to confirm your
      appointment as my Personal Assistant. </span></p>
      <p><span>Please find attached detailed
      offer letter which you will be required </span></p>
      <p><span>to sign, scan and email back to
      me, you can as well e-sign and send </span></p>
      <p><span>a copy as a confirmation of your
      acceptance. </span></p>
      <p><span> </span></p>
      <p><span><span>                            </span></span></p>
      <p><span>Sincerely,</span></p>
      <p><strong><span>Ryan Glenn</span></strong></p>
      <p><strong><span>Vice President</span></strong></p>
      <p><strong><span>FP&amp;A and IR Paylocity</span></strong></p>
      <p> </p>
      </td>
     </tr>
    </tbody></table>
    
    <p> </p>
    
    
    
    <p><span>There is a Ryan Glenn and he is, in fact, a Vice
    President with a corporation called Paylocity.<span> 
    </span>However, he does not want to hire you.<span> 
    </span>This is a scam.<span>  </span>Please do not reply.</span></p>
    
    <p><em><span>If you do receive email
    similar to these examples, or any other email that you suspect is a scam, please
    do not click on any URL or reply. Either of those actions confirms to the
    sender that your email address is valid. Please forward the message (with the
    email headers) to</span></em><span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></span></p>
    
    <p><span> </span></p>
    
    <p><em><span>How do I forward full
    email headers?</span></em><em></em></p>
    
    <p><span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></span></p>
    
    <p><span> </span></p>
    
    <p><em><span>To read more articles
    published by DOIT Security, visit: </span></em><em></em></p>
    
    <p><span><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></span></p>
    
    <p><span><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></span></p>
    
    </div>
]]>
</Body>
<Summary>In the last several days, the UMBC community has received thousands of fake job offers from "Ryan Glenn".  An example is shown below:                You are eligible to apply for an   opening as...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95316/guest@my.umbc.edu/61d0213e9f4ecc0a9d49638ca2ff0614/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777298598</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777298598</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777298598</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777298598</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1777298598</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777298598</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777298598</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777298598</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777298598</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 31 Aug 2020 15:01:58 -0400</PostedAt>
<EditAt>Mon, 31 Aug 2020 15:02:36 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="95307" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/95307">
<Title>Fake Cisco Phishing Job Scams</Title>
<Tagline>Cisco Systems Is NOT Offering You A Job In A Mass Emailing!</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>DoIT has been notified of another malicious actor sending out phishing emails claiming to offer job opportunities with Cisco Systems. The email below is similar to the previous phishing attempts, but  with a new subject line: “UMBC STUDENT EMPOWERMENT PART TIME JOB OPPORTUNITY.”</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: John Williams &lt;<a href="mailto:jw821859@gmail.com">jw821859@gmail.com</a>&gt;</span></p><p><span>Subject: UMBC STUDENT EMPOWERMENT PART TIME JOB OPPORTUNITY</span></p><p><span>Date: August 24, 2020</span></p><p><span>To: &lt;@umbc.edu&gt;</span></p><br><p><span>Dear student, </span></p><br><p><span>   We got your contact through your school database and I'm happy to inform you that our reputable company CISCOsystems® is currently running a student empowerment </span></p><p><span>program. This program is completely school oriented as it has been designed not to deter you from all school activities which is priority for you and this </span></p><p><span>organization. This program is to help loyal and hardworking students like you secure a part time job with an attractive weekly salary.</span></p><p><span>TO PROCEED WITH THIS JOB OFFER, KINDLY REPLY TO THIS MAIL WITH YOUR ALTERNATE E-MAIL ADDRESS IN ORDER TO RECEIVE THE FULL JOB DESCRIPTION. </span></p><br><p><span>Best Regards,</span></p><br><p><span>John Williams,</span></p><p><span>HR Recruit Manager/Consultant</span></p><p><span>CISCOsystems Inc®.</span></p></td></tr></tbody></table></div><br><p><span>If you do receive this or any other email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>DoIT has been notified of another malicious actor sending out phishing emails claiming to offer job opportunities with Cisco Systems. The email below is similar to the previous phishing attempts,...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95307/guest@my.umbc.edu/438bd33a7dc8c63388be709df4731cd9/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777298598</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777298598</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777298598</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777298598</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1777298598</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777298598</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777298598</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777298598</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777298598</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 31 Aug 2020 14:06:12 -0400</PostedAt>
<EditAt>Mon, 31 Aug 2020 14:07:20 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="95305" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/95305">
<Title>Job Scam &#8220;Offer&#8221; From A Compromised UMBC Account</Title>
<Tagline>Fake Job Offer For "Online Personal Assistant"</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Recently the DoIT has been notified of a job scam using a compromised UMBC email account to send out fake job offers. An example of the email (with the name of the sender removed for privacy) is shown below.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: COMPROMISED ACCOUNT &lt;</span><span>@umbc.edu</span><span>&gt;</span></p><p><span>Date: Thu, Aug 27, 2020</span></p><p><span>Subject: Offer</span></p><p><span>To:</span></p><br><p><span>You are eligible to apply for an opening as an Online Personal</span></p><p><span>Assistant to Ryan Glenn,</span></p><p><span>Investor Relations Paylocity.  You will be working remotely and</span></p><p><span>getting paid weekly.</span></p><br><p><span>You will be required to work for a maximum of an hour daily or six hours weekly.</span></p><br><p><span>Fill the required information if interested in this opportunity.</span></p><br><p><span>Name:</span></p><p><span>Physical Address:</span></p><p><span>State:</span></p><p><span>City:</span></p><p><span>Zip Code:</span></p><p><span>Phone #:</span></p><p><span>Email:</span></p><p><span>Alternate Email:</span></p><p><span>A little about you and why you think you should be considered:</span></p><br><p><span>Send replies to </span><span><a href="mailto:charlenabolinlyco21@gmail.com">charlenabolinlyco21@gmail.com</a></span><span> to apply.</span></p><br><p><span>Warm Regards</span></p><p><span>Charlena B</span></p><p><span>Publicity Manager</span></p></td></tr></tbody></table></div><br><p><span>Please note that this phishing message is coming from a umbc email but the reply-to in the emails headers is set to &lt;</span><a href="mailto:charlenabolinlyco21@gmail.com" rel="nofollow external" class="bo"><span>charlenabolinlyco21@gmail.com</span></a><span>&gt;. This means if the user responds to the email above they would not be responding to the umbc email, instead their email would be sent to the &lt;</span><a href="mailto:charlenabolinlyco21@gmail.com" rel="nofollow external" class="bo"><span>charlenabolinlyco21@gmail.com</span></a><span>&gt;.</span></p><br><p><span>If you do receive this or any other email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>Recently the DoIT has been notified of a job scam using a compromised UMBC email account to send out fake job offers. An example of the email (with the name of the sender removed for privacy) is...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95305/guest@my.umbc.edu/8d43dd99b51da03f52decbba3c7b5892/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777298598</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777298598</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777298598</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777298598</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1777298598</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777298598</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777298598</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777298598</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777298598</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 31 Aug 2020 14:01:40 -0400</PostedAt>
<EditAt>Mon, 31 Aug 2020 14:08:25 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="95304" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/95304">
<Title>Tips to Avoid ID Theft on Campus</Title>
<Tagline>Simple Ways To Secure Your Identity</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>With classes starting back up, malicious actors will try even harder to steal people's information or commit Identity theft. The article that is linked below has some tips for college students to help avoid Identity theft by monitoring your inbox and detecting fraud.</span></p><br><p><span>Here are some of the tips that are recommended for college students:</span><span><br><br></span></p><ul><li><p><span>Send sensitive mail to your permanent home or post office box</span><span>. Sending your more sensitive mail to a PO box or permanent home is considered much more secure.</span></p></li><li><p><span>Important documents should be stored away safely</span><span>. Make sure documents like your Social Security card, passport, and bank and credit card statements are stored securely. As well to often shred credit card offers and any other paper document that has sensitive financial information.</span></p></li><li><p><span>Never lend your card or debit card to anyone</span><span>. If you feel uncomfortable about lending your card just say no. This includes lending your card to a friend, or co-signing for a loan or financing for items like a TV. Also at an ATM making sure that no one is ‘shoulder surfing’ your PIN.</span></p></li><li><p><span>Guard your passwords</span><span>. Do not give out your passwords to anyone, use strong passwords and do not use the same password for multiple accounts.</span></p></li><li><p><span>Watch out for phishing emails</span><span>. Be careful not to click on links in unsolicited emails and texts. For more information on phishing email campaigns that could affect UMBC please check out the DoIT Security page main page for more updated information.</span></p></li><li><p><span>Make sure that your computer is up-to-date with antivirus and spyware softwares</span><span>. Always install any updates and patches to your computer's operating system or browser software. These will help to keep your computer safe from malicious softwares.</span></p></li><li><p><span>Be careful while shopping online</span><span>. For more information on tips to safely online please check out this article from the Better Business Bureau, </span><a href="https://www.bbb.org/article/news-releases/22474-bbb-warning-be-careful-purchasing-from-unknown-websites-during-covid-19" rel="nofollow external" class="bo"><span>https://www.bbb.org/article/news-releases/22474-bbb-warning-be-careful-purchasing-from-unknown-websites-during-covid-19</span></a></p></li><li><p><span>Check your credit report at least once a year</span><span>. According to the article you are entitled to one free report a year from each of the tree reporting bureaus: TransUnion, Experian, and Equifax. Look for any suspicious activity or inaccuracies. For more information on this please check the BBB article linked below, this article by the Federal Trade Commision (FTC), </span><a href="https://www.consumer.ftc.gov/articles/0155-free-credit-reports" rel="nofollow external" class="bo"><span>https://www.consumer.ftc.gov/articles/0155-free-credit-reports</span></a><span>.</span></p></li></ul><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>For more information, please check out: </span></p><p><a href="https://www.bbb.org/article/news-releases/10496-bbb-9-tips-to-avoid-id-theft-on-campus" rel="nofollow external" class="bo"><span>https://www.bbb.org/article/news-releases/10496-bbb-9-tips-to-avoid-id-theft-on-campus</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>With classes starting back up, malicious actors will try even harder to steal people's information or commit Identity theft. The article that is linked below has some tips for college students to...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95304/guest@my.umbc.edu/2a53eb72186e06dd9d301ba1ce8d21f4/api/pixel</TrackingUrl>
<Tag>learn</Tag>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777298598</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777298598</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777298598</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777298598</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1777298598</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777298598</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777298598</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777298598</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777298598</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 31 Aug 2020 13:58:28 -0400</PostedAt>
<EditAt>Wed, 03 Nov 2021 11:47:07 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="95303" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/95303">
<Title>&#8220;WorkStudy Update!&#8221; Job Phishing Scam</Title>
<Tagline>Same Scam, Different Details</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span>The UMBC DoIT has been notified of a compromised UMBC account used to send out phishing emails. An example of the email chain is shown below. The name and email address of the compromised UMBC account have been removed for privacy reasons, as well as the name of the user who reported the email.</span><br><p><span>Initial Scam Message</span></p><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: COMPROMISED ACCOUNT &lt;</span><span>@umbc.edu</span><span>&gt;</span></p><p><span>Date: Fri, Aug 28, 2020 at 7:47 AM</span></p><p><span>Subject: WorkStudy Update!</span></p><p><span>To:</span></p><br><p><span>Good morning!</span></p><p><span>My name is &lt;COMPROMISED ACCOUNT&gt;</span><span>and i currently work with the UMBC educational planning center and i would like to inform you that there is a job opening opportunity available to you, This opportunity is only part time and is not expected to clash with your current school/study schedule.Kindly send in an </span><span>instant reply if you are in search of a job so you can receive further information..  </span></p></td></tr></tbody></table></div><br><p><span>Follow-up Scam Message</span></p><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: career management jobs &lt;<a href="mailto:careerjobsdepartment@outlook.com">careerjobsdepartment@outlook.com</a>&gt;</span></p><p><span>Date: Fri, Aug 28, 2020 at 8:48 AM</span></p><p><span>Subject: Re: WorkStudy Update!</span></p><p><span>To:  &lt;</span><a href="mailto:efago1@umbc.edu" rel="nofollow external" class="bo"><span>@umbc.edu</span></a><span>&gt;</span></p><br><p><span>Hello &lt;NAME&gt;</span></p><br><p><span>Thank you for your interest in the available job position, kindly</span></p><p><span>click on the URL below to view the application portal</span></p><br><p><a href="https://tinyur" rel="nofollow external" class="bo"><span>https://tinyur</span></a><span>l .com/JOB-UPDATE</span></p></td></tr></tbody></table></div><br><p><span>The first email is similar to a recent trend in phishing campaigns that we have recently seen, except this one uses the compromised account holder’s name in the email message and has changed  the subject to “WorkStudy Update!” These campaigns, even if sent from different users with different subjects do seem to have a pattern of using “WorkStudy” in the subject as well as having a similar email format for both messages.</span></p><br><p><span>If the user does respond to the first message showing interest, they will receive the second message from a different email address. This is because in the email headers of the first email from the UMBC account, the reply-to is set to the &lt;</span><a href="mailto:careerjobsdepartment@outlook.com" rel="nofollow external" class="bo"><span>careerjobsdepartment@outlook.com</span></a><span>&gt; so instead of the user emailing the &lt;@umbc.edu&gt; email they are emailing the scammer directly.</span></p><br><p><span>The second email contains a link to a malicious site. If you do receive this email please do not click on the URL. In previous similar scams, the scammer is seeking personal information such as name, phone number, email address, home address, age and current occupation.  It also invites the user to ‘tell a bit about themselves’ in a free-form text box.</span></p><br><p><span>If you do receive this or any other email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>The UMBC DoIT has been notified of a compromised UMBC account used to send out phishing emails. An example of the email chain is shown below. The name and email address of the compromised UMBC...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95303/guest@my.umbc.edu/8fc84deb666ad9242e9f0e474365a6e7/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777298598</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777298598</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777298598</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777298598</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1777298598</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777298598</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777298598</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777298598</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777298598</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 31 Aug 2020 13:54:34 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="95196" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/95196">
<Title>&#8220;WorkStudy Offer!&#8221; Job Phishing Scam</Title>
<Tagline>Compromised UMBC Exploited To Send Fake Job Offer</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><p><span>DoIT was notified today of a scammer sending out emails claiming to be offering a job opportunity. The message came from a compromised Umbc email account, so the From name was removed for privacy in the example below.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: </span><span>COMPROMISED ACCOUNT</span><span> &lt;</span><span>@umbc.edu</span><span>&gt;</span></p><p><span>Date: Wed, Aug 26, 2020</span></p><p><span>Subject: WorkStudy Offer!</span></p><p><span>To:</span></p><br><p><span>Good morning!</span></p><p><span>I hope you are well. I would like to share with you this job opportunity,you could earn between $100- $240 weekly. This opportunity is only part time and is not expected to clash with your current school/study schedule.Kindly send in an instant reply if you are in search of a job so you can receive further information</span></p></td></tr></tbody></table></div><br><p><span> If the victim responds showing interest they will receive a message from a different email address &lt;</span><a href="mailto:careerjobsdepartment@outlook.com" rel="nofollow external" class="bo"><span>careerjobsdepartment@outlook.com</span></a><span>&gt; and this email will contain a malicious URL. The scammer is seeking personal information such as name, phone number, email address, home address, age and current occupation.  It also invites the victim to ‘tell a bit about themselves’ in a free-form text box.</span></p><br><p><span>This first email shows a few red flags. For instance, some parts of the message have no spacing, an example of this is “schedule.Kindly”. The email also expresses a sense of urgency with the email asking for the victim to send an “an instant reply.” </span></p><br><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>&lt;</span><a href="mailto:careerjobsdepartment@outlook.com" rel="nofollow external" class="bo"><span>careerjobsdepartment@outlook.com</span></a><span>&gt; responded:</span></p><br><p><span>Thank you for your interest in the available job position, kindly click on the URL below to view the application portal</span></p><br><p><span><a href="https://tinyurl">https://tinyurl</a> .com/JOB-UPDATE</span></p></td></tr></tbody></table></div><br><br><p><span>If you do receive this or a similar email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to <a href="mailto:security@umbc.edu">security@umbc.edu</a>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span> </span></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a><span> </span></p><div><span><br></span></div></span></div>
]]>
</Body>
<Summary>DoIT was notified today of a scammer sending out emails claiming to be offering a job opportunity. The message came from a compromised Umbc email account, so the From name was removed for privacy...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95196/guest@my.umbc.edu/a83372e47dd9d6c04a6489f4869a3349/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777298598</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777298598</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777298598</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777298598</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1777298598</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777298598</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777298598</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777298598</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777298598</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 26 Aug 2020 23:24:52 -0400</PostedAt>
<EditAt>Mon, 31 Aug 2020 11:42:34 -0400</EditAt>
</NewsItem>

</News>
