<?xml version="1.0"?>
<News hasArchived="false" page="19" pageCount="29" pageSize="10" timestamp="Mon, 27 Apr 2026 09:54:11 -0400" url="https://beta.my.umbc.edu/groups/itsecurity/posts.xml?mode=pawpularity&amp;page=19">
<NewsItem contentIssues="false" id="94777" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94777">
<Title>Amazon Account Phishing Scam</Title>
<Tagline>Contact By A Fake Amazon Rep About A Fake Account</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span>According to the article linked below, malicious actors have been  recently noticed in the UK. The actors pose as an Amazon customer service representative. The goals of this phishing campaign is to steal personal and financial information from Amazon users.</span><br><p><span>The article warns that users are being contacted through emails and/or phone calls claiming that they have opened an Amazon Prime account. The malicious actor then will inform the users that the account was opened fraudulently through a security flaw on their computer.</span></p><br><p><span>The malicious actor then asks the user for remote access to their computer to fix the breach. Allowing this will let the malicious actor steal personal and financial information, including passwords and even banking information.</span></p><br><p><span>Another version of this scam is very similar but claims there is an Amazon-Music subscription instead of an Amazon Prime subscription.</span></p><br><p><span>Amazon has stated that that they will never cold-call a customer, and will never ask for remote access to a computer or payment over the phone. </span><span>Never give any details to an unknown caller</span><span>, and if you’re not sure if the call is legitimate or not, log into your official Amazon account and contact customer support through there.</span></p><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>For more information, please check out: </span></p><p><a href="http://www.irishnews.com/magazine/technology/2020/07/17/news/warning-issued-over-amazon-prime-phishing-scam-2008855/" rel="nofollow external" class="bo"><span>http://www.irishnews.com/magazine/technology/2020/07/17/news/warning-issued-over-amazon-prime-phishing-scam-2008855/</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><br><br><br></div>
]]>
</Body>
<Summary>According to the article linked below, malicious actors have been  recently noticed in the UK. The actors pose as an Amazon customer service representative. The goals of this phishing campaign is...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94777/guest@my.umbc.edu/ab0205fb3f452f797b4af1677ac26bdc/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777289325</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/images/avatars/group/7/original.png?1777289325</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777289325</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777289325</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/images/avatars/group/7/large.png?1777289325</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777289325</AvatarUrl>
<AvatarUrl size="small">https://assets4-beta.my.umbc.edu/images/avatars/group/7/small.png?1777289325</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777289325</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777289325</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 11 Aug 2020 21:14:19 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94776" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94776">
<Title>How to setup an account recovery email address</Title>
<Tagline>A Backup If You Forget Your Password</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><br><br><p><span>Don't have a recovery email on your UMBC account? </span></p><p><span>Follow these steps to set up your recovery email. Please use an email address that is <strong><u><em>not</em></u></strong> your UMBC email.</span></p><br><ol><li><p><span>Login to your myUMBC account: </span><a href="http://my.umbc.edu/account" rel="nofollow external" class="bo"><span>http://my.umbc.edu/account</span></a></p></li><li><p><span>Go to </span><a href="https://webadmin.umbc.edu/admin//Security/Setup/View" rel="nofollow external" class="bo"><span>https://webadmin.umbc.edu/admin//Security/Setup/View</span></a></p></li><li><p><span>Click </span><span>Account security setup</span></p></li><li><p><span>At the top of the page, enter your alternate email address</span></p></li><li><p><span>Scroll down to the bottom of the page and click </span><span>Update my security settings</span></p></li></ol><br><p><span>Don’t have a secondary email address?</span></p><br><p><span>Create one with Google or Yahoo. Instructions can be found here: </span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867956" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867956</span></a></p><br><br><br><p><span>If you have any questions or concerns email us: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>_________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><p><span>Forward it to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> along with the email headers. Instructions for displaying the headers (you normally don't see them) so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></p></div>
]]>
</Body>
<Summary>Don't have a recovery email on your UMBC account?   Follow these steps to set up your recovery email. Please use an email address that is not your UMBC email.     Login to your myUMBC account:...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94776/guest@my.umbc.edu/16d6c0be3e248a816b1595d450bb4a06/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777289325</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/images/avatars/group/7/original.png?1777289325</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777289325</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777289325</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/images/avatars/group/7/large.png?1777289325</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777289325</AvatarUrl>
<AvatarUrl size="small">https://assets4-beta.my.umbc.edu/images/avatars/group/7/small.png?1777289325</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777289325</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777289325</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 11 Aug 2020 21:05:31 -0400</PostedAt>
<EditAt>Tue, 11 Aug 2020 21:06:12 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="94775" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94775">
<Title>Account Data Breach: Wattpad</Title>
<Tagline>Major Data Breach: Wattpad</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span>In June 2020, Wattpad suffered a data breach that exposed approximately 270 million records. These records include, names, usernames, email and IP addresses, genders, birth dates and passwords. This information was sold and then published on a public hacking forum. </span><br><p><span>234 UMBC accounts suffered from this breach; DOIT is currently notifying these individuals via their UMBC emails and/or alternate emails. However, if you have a Wattpad account don't wait; contact the site to see if your information has been exposed.</span></p><br><p><span>If you don’t have a alternate email address listed on your UMBC account, follow these instructions below:</span></p><ol><li><p><span>Login to your myUMBC account: </span><a href="http://my.umbc.edu/account" rel="nofollow external" class="bo"><span>http://my.umbc.edu/account</span></a></p></li><li><p><span>Go to </span><a href="https://webadmin.umbc.edu/admin//Security/Setup/View" rel="nofollow external" class="bo"><span>https://webadmin.umbc.edu/admin//Security/Setup/View</span></a></p></li><li><p><span>Click </span><span>Account security setup</span></p></li><li><p><span>At the top of the page, enter your alternate email address</span></p></li><li><p><span>Scroll down to the bottom of the page and click </span><span>Update my security settings</span></p></li></ol><br><p><span>DOIT has been notified of this breach via Have I Been Pwned(HIBP).</span></p><br><br><p><span>More about Wattpad data breach visit: </span></p><p><a href="https://www.bleepingcomputer.com/news/security/wattpad-data-breach-exposes-account-info-for-millions-of-users/" rel="nofollow external" class="bo"><span>https://www.bleepingcomputer.com/news/security/wattpad-data-breach-exposes-account-info-for-millions-of-users/</span></a></p><br><p><a href="https://bestofprivacy.com/data-breaches/wattpad-data-breach-exposes-account-info-for-millions-of-users/#:~:text=Wattpad%20data%20breach%20exposes%20account%20info%20for%20millions,user-generated%20stories%20on%20a%20variety%20of%20different%20topics." rel="nofollow external" class="bo"><span>https://bestofprivacy.com/data-breaches/wattpad-data-breach-exposes-account-info-for-millions-of-users/#:~:text=Wattpad%20data%20breach%20exposes%20account%20info%20for%20millions,user-generated%20stories%20on%20a%20variety%20of%20different%20topics.</span></a></p><br><br><br><p><span>If you have any questions or concerns email us: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>_________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><p><span>Forward it to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></p></div>
]]>
</Body>
<Summary>In June 2020, Wattpad suffered a data breach that exposed approximately 270 million records. These records include, names, usernames, email and IP addresses, genders, birth dates and passwords....</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94775/guest@my.umbc.edu/7a6c7bd768d58c2f9716d0ce3f7190f2/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777289325</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/images/avatars/group/7/original.png?1777289325</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777289325</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777289325</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/images/avatars/group/7/large.png?1777289325</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777289325</AvatarUrl>
<AvatarUrl size="small">https://assets4-beta.my.umbc.edu/images/avatars/group/7/small.png?1777289325</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777289325</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777289325</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 11 Aug 2020 21:01:34 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94676" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94676">
<Title>Be Wary Of These Covid-19 Scams</Title>
<Tagline>Some Of The Scams Coming Over Email, Phone, and Text</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>In the article linked below, BBC News warns of different Covid-19 themed frauds and scams. Many malicious actors follow the headlines just like the rest of us, and when they see a crisis like Covid-19, they take the opportunity to jump on the fear and try to scam as many people as they can. </span></p><br><p><span>The article warns of these scams to be wary of:</span></p><br><ul><li><p><span>Covid-19 Financial Support Scams</span></p></li><ul><li><p><span>Fake government emails, which look to be from a government department and offer financial grants. The emails contain a link which can steal both personal and financial information.</span></p></li><li><p><span>Scam emails offering access to a “Covid-19 relief fund”, and encouraging users to fill in a form and hand over personal information.</span></p></li><li><p><span>Official-looking emails offering “tax reductions.” The email is reported to contain a link that takes users to a fake government website which can harvest users personal and financial information.</span></p></li><li><p><span>E-mails offering to help Benefit recipients in applying for universal credit, but which fraudsters will grab some of the payment as an advance for their "services".</span></p></li><li><p><span>Email about claiming fake school meal funds and fake government grants.</span><span><br><br></span></p></li></ul><li><p><span>Health Related Scams</span></p></li><ul><li><p><span>Phishing emails claiming that the user has been in contact with someone who has been diagnosed with Covid-19. The links lead to fake websites that are used to steal personal and financial information or even infect the device with malware. </span><span><br></span><span>For official information on contact tracing efforts in Maryland please visit </span><a href="https://coronavirus.maryland.gov/pages/contact-tracing" rel="nofollow external" class="bo"><span>https://coronavirus.maryland.gov/pages/contact-tracing</span></a><span>.</span></p></li><li><p><span>Fake ads for non-existent Covid-19 related products, such as hand sanitizer and face masks. They simply will take the users’ money and send them nothing.</span></p></li><li><p><span>Offers of fake Covid-19 test kits and hand sanitizer, or even products claiming to treat or prevent Covid-19.</span><span><br><br></span></p></li></ul><li><p><span>Social Distancing Related Scams</span></p></li><ul><li><p><span>Fake emails and texts claiming to be from “TV Licensing”, telling people they are eligible for six months of free TV because of Covid-19. Users are then told there has been a problem with their card and are asked to click on a link that takes them to a fake website designed to steal users persona and financial information.</span></p></li><li><p><span>Emails asking people to update their TV subscription services payment details by clicking on a link which is designed to steal credit card information.</span></p></li><li><p><span>Fake profiles on social media sites designed to try and manipulate users into giving them their money. </span></p></li><li><p><span>Fake investment advertisements on social media sites encouraging users to “take advantage of the financial downturn.” Bitcoin platforms are using emails and adverts on social media platforms to encourage users to put money into fake companies using fake websites.</span></p></li><li><p><span>Malicious actors cold-calling home residents offering to do shopping errands.</span></p></li><li><p><span>Messages telling the user that they have been fined for leaving their home more than once a day. Links in these messages are designed to steal a victim’s personal and financial information or to install malicious software onto the user’s device.</span><span><br><br></span></p></li></ul><li><p><span>What We See at UMBC</span></p></li><ul><li><p><span>At UMBC, DoIT is getting reports of work-from-home phishing emails. These phishing emails follow a similar pattern of offering a work-from-home opportunity and ask for personal information like personal email and home address. They will then send a fraudulent check to the user which should not be cashed. </span></p></li><li><p><span>Recently DoIT has also seen phishing emails attempting to impersonate UMBC staff and asking for gift cards or phone numbers.</span></p></li></ul></ul><br><p><span>For more information on these and other phishing attempts at UMBC please visit the DoIT Security page which can be found here </span><a href="https://itsecurity.umbc.edu/" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/</span></a><span>.</span></p><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>For more information, please visit: </span></p><p><a href="https://www.bbc.com/news/business-53573408" rel="nofollow external" class="bo"><span>https://www.bbc.com/news/business-53573408</span></a></p><br><p><span>To read more articles published by DoIT Security please visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>In the article linked below, BBC News warns of different Covid-19 themed frauds and scams. Many malicious actors follow the headlines just like the rest of us, and when they see a crisis like...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94676/guest@my.umbc.edu/236ccbcd1893176b192d2ab2f0ea31f7/api/pixel</TrackingUrl>
<Tag>covid19</Tag>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777289325</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/images/avatars/group/7/original.png?1777289325</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777289325</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777289325</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/images/avatars/group/7/large.png?1777289325</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777289325</AvatarUrl>
<AvatarUrl size="small">https://assets4-beta.my.umbc.edu/images/avatars/group/7/small.png?1777289325</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777289325</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777289325</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 05 Aug 2020 18:12:32 -0400</PostedAt>
<EditAt>Wed, 05 Aug 2020 18:14:26 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="94675" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94675">
<Title>Gift Cards Phishing Scams</Title>
<Tagline>Another Variant Of A Common Scam</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Recently DoIT has been notified of a phishing email scam where the malicious actor is impersonating a UMBC staff member. The name has been removed from the From for privacy reasons, but an example of the email can be seen below:</span><span><br><br></span></p><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: </span><span>Forged Name</span><span> &lt;</span><span><a href="mailto:hjacj00909@gmail.com">hjacj00909@gmail.com</a></span><span>&gt;</span></p><p><span>Date: Mon, Aug 3, 2020 at 1:20 PM</span></p><p><span>Subject: Urgent</span></p><p><span>To: &lt;</span><span>@umbc.edu</span><span>&gt;</span></p><br><br><p><span>I have a task I need you to get done for me Asap,  I want to send out</span></p><p><span>a couple gifts cards to some selected staffs, even though we all put</span></p><p><span>in all our best to move this organization forward, some individuals</span></p><p><span>really stand out and I want to surprise them with a little gifts.this</span></p><p><span>is really urgent and important,  Please let me know if you can head</span></p><p><span>out to purchase the gift cards so I can advise certain product and</span></p><p><span>denominations.</span></p><br><p><span>Thanks</span></p></td></tr></tbody></table></div><br><p><span>The phishing email above not only is impersonating a UMBC staff member, but the email has many grammatical mistakes, and there is a feeling of urgency with the subject line “Urgent” and words like “ASAP” being used. These are just some of the examples of the red flags for identifying this and other phishing email scams.</span><span><br><br></span></p><p><span>The main goal of this phishing email scam is to get the users to purchase the gift cards and give the gift codes to the malicious actors. Other scams similar to this one might ask for products like iTunes cards, gift cards, prepaid debit cards, or even bitcoin.</span></p><br><p><span>If you do receive this or a similar email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p><br><p><span>For more information on a similar scam to the one above:</span><span><br></span><a href="https://itsecurity.umbc.edu/critical/?id=94550" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?id=94550</span></a></p><br><br></div>
]]>
</Body>
<Summary>Recently DoIT has been notified of a phishing email scam where the malicious actor is impersonating a UMBC staff member. The name has been removed from the From for privacy reasons, but an example...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94675/guest@my.umbc.edu/d44c17a5fdf99b5cc9b2372eedcd518d/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777289325</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/images/avatars/group/7/original.png?1777289325</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777289325</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777289325</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/images/avatars/group/7/large.png?1777289325</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777289325</AvatarUrl>
<AvatarUrl size="small">https://assets4-beta.my.umbc.edu/images/avatars/group/7/small.png?1777289325</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777289325</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777289325</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 05 Aug 2020 17:59:00 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94634" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94634">
<Title>Account Data Breach: Dave</Title>
<Tagline>Data Breach On Digital Banking App</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>In June 2020,  Dave, a digital banking app, suffered a data breach. 7.5 million rows of data were leaked to the public on a hacking forum. The breach exposed individuals’ Personal Identifiable Information (PII) such as </span><span>names, dates of birth, encrypted social security numbers and passwords.</span></p><br><p><span>UMBC’s Division of Information Technology (DoIT) has been notified that over 20 UMBC accounts might have been affected by this breach. </span></p><p><span>The individuals who have been affected by the data breach were notified via their UMBC email and/or their alternate emails. If you do not have an alternate email listed on your UMBC account, we suggest that you create one, preferably different from your UMBC email account. </span></p><br><p><span>To link an alternate email account to your UMBC account follow the instructions below:</span></p><ol><li><p><span>Login to your myUMBC account: </span><a href="http://my.umbc.edu/account" rel="nofollow external" class="bo"><span>http://my.umbc.edu/account</span></a></p></li><li><p><span>Go to </span><a href="https://webadmin.umbc.edu/admin//Security/Setup/View" rel="nofollow external" class="bo"><span>https://webadmin.umbc.edu/admin//Security/Setup/View</span></a></p></li><li><p><span>Click </span><span>Account security setup</span></p></li><li><p><span>At the top of the page, enter your alternate email address</span></p></li><li><p><span>Scroll down to the bottom of the page and click </span><span>Update my security settings</span></p></li></ol><br><p><span>If you have a Dave account we suggest that you contact them to see if your information has been leaked. </span></p><br><p><span>The data about Dave was provided to the breach notification service Have I Been Pwned (HIBP) by </span><a href="https://dehashed.com/" rel="nofollow external" class="bo"><span>dehashed.com</span></a><span>.</span></p><br><p><span>For more information on Dave data breach visit:</span></p><br><p><a href="https://www.zdnet.com/article/tech-unicorn-dave-admits-to-security-breach-impacting-7-5-million-users/" rel="nofollow external" class="bo"><span>https://www.zdnet.com/article/tech-unicorn-dave-admits-to-security-breach-impacting-7-5-million-users/</span></a></p><br><p><a href="https://www.tomsguide.com/news/dave-data-breach" rel="nofollow external" class="bo"><span>https://www.tomsguide.com/news/dave-data-breach</span></a><span> </span></p><br><br><p><span>If you have any questions or concerns email us: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> </span></p><p><span>_________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><span>Forward it to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></div>
]]>
</Body>
<Summary>In June 2020,  Dave, a digital banking app, suffered a data breach. 7.5 million rows of data were leaked to the public on a hacking forum. The breach exposed individuals’ Personal Identifiable...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94634/guest@my.umbc.edu/09cd9a32f896cbc2706abcd515234137/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777289325</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/images/avatars/group/7/original.png?1777289325</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777289325</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777289325</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/images/avatars/group/7/large.png?1777289325</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777289325</AvatarUrl>
<AvatarUrl size="small">https://assets4-beta.my.umbc.edu/images/avatars/group/7/small.png?1777289325</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777289325</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777289325</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 04 Aug 2020 10:34:58 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94553" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94553">
<Title>Phishing Emails from SurveyMonkey</Title>
<Tagline>The Survey Site Is Legitimate.  The Survey Is Not.</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>According to an article at </span><a href="https://www.infosecurity-magazine.com" rel="nofollow external" class="bo"><span>https://www.infosecurity-magazine.com</span></a><span>,  Abnormal Security recently discovered a new phishing campaign using malicious emails from a legitimate SurveyMonkey domain. A malicious actor is using this legitimate domain because it allows them to bypass most security filters. </span></p><br><p><span>Even though these emails are sent from the actual SurveyMonkey domain, the reply-to address is in a different domain. Within the email there is a hidden URL that appears as the text ‘Navigate to access statement’ with a message ‘Please do not forward this email as its survey link is unique to you.’”</span></p><br><p><span>Clicking on the link will redirect the user to a form asking for their Office 365 credentials such as email address and password. If the user’s information is entered into this malicious site, then the user’s account will be compromised.</span></p><br><p><span>The article states that the reason this attack is so effective is due to the use of a legitimate email sender, as well as concealing the malicious site URL and the description of the email being “unique” to every user.</span></p><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> and delete the message.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><p><span><br></span><span>For more information, please check out: </span></p><p><a href="https://www.infosecurity-magazine.com/news/surveymonkey-phishers-office-365/" rel="nofollow external" class="bo"><span>https://www.infosecurity-magazine.com/news/surveymonkey-phishers-office-365/</span></a></p><p><a href="https://abnormalsecurity.com/blog/abnormal-attack-stories-phishing-through-surveymonkey/" rel="nofollow external" class="bo"><span>https://abnormalsecurity.com/blog/abnormal-attack-stories-phishing-through-surveymonkey/</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><br><br></div>
]]>
</Body>
<Summary>According to an article at https://www.infosecurity-magazine.com,  Abnormal Security recently discovered a new phishing campaign using malicious emails from a legitimate SurveyMonkey domain. A...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94553/guest@my.umbc.edu/5750a760c5ff3d4c9e9d994a31d49ee0/api/pixel</TrackingUrl>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777289325</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/images/avatars/group/7/original.png?1777289325</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777289325</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777289325</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/images/avatars/group/7/large.png?1777289325</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777289325</AvatarUrl>
<AvatarUrl size="small">https://assets4-beta.my.umbc.edu/images/avatars/group/7/small.png?1777289325</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777289325</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777289325</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 30 Jul 2020 16:37:43 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94550" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94550">
<Title>Recent Spear-phishing Emails</Title>
<Tagline>Faked Email Messages Looking For Your Phone Number</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>A new wave of Spear-phishing emails hit roughly 300 UMBC inboxes this weekend. An example is shown below, with the From field altered and the To field removed for privacy. There is no body in this particular email.</span></p><p><span>From: Forged Name &lt;<a href="mailto:name@gmail.com">name@gmail.com</a>&gt;</span></p><p><span>Date: Sat, Jul 25, 2020 at 9:26 AM</span></p><p><span>Subject: Send me your available text number?</span></p><p><span>To:</span></p><p><span> </span></p><p><span>This malicious email uses the name of a UMBC staffer in an attempt to appear credible. However, the Gmail address, unnatural-sounding subject line, and lack of body content are all clear red flags. More generally, be wary of emails from unverified sources with any urgent but unexplained request. Similar emails that were reported previously were precursors to gift card scams.</span></p><p><span>The best way to avoid these scams is to simply not respond. Instead, report suspicious emails by forwarding them to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. Include the full email headers by following the instructions at</span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>For more information on scams and phishing, please visit </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=36766495" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=36766495</span></a><span>.</span></p><br><span>To read more articles published by DOIT visit: </span><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>.</span></div>
]]>
</Body>
<Summary>A new wave of Spear-phishing emails hit roughly 300 UMBC inboxes this weekend. An example is shown below, with the From field altered and the To field removed for privacy. There is no body in this...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94550/guest@my.umbc.edu/cdf202fee9c64f4fbff01ee671da24d1/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777289325</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/images/avatars/group/7/original.png?1777289325</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777289325</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777289325</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/images/avatars/group/7/large.png?1777289325</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777289325</AvatarUrl>
<AvatarUrl size="small">https://assets4-beta.my.umbc.edu/images/avatars/group/7/small.png?1777289325</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777289325</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777289325</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 30 Jul 2020 15:42:43 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="94549" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94549">
<Title>Fake Job Offers from Corestaff</Title>
<Tagline>UMBC Community Gets More Fake Job Offers</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Jobs phishing Alert: Corestaff</span></p><br><p><span>During the past week, DOIT has received several notifications of phishing emails impersonating Corestaff. Below is a sample message that was sent to many UMBC students. The To field was removed for privacy purposes.</span></p><br><p><span>From: </span><span>Corestaff Services</span><span> &lt;</span><span><a href="mailto:corestaffserviceshr@gmail.com">corestaffserviceshr@gmail.com</a></span><span>&gt;</span></p><p><span>Date: Wed, Jul 22, 2020 at 7:42 PM</span></p><p><span>Subject: JOB DESCRIPTION</span></p><br><br><p><span>Dear applicant,</span></p><p> </p><p><span>Thanks for getting back to us with your interest in the job position, </span><span>CORESTAFF SERVICES Inc®</span><span> is a privately held company within Allegis Group, the largest private talent management firm in the world. Our long-standing history and industry-leading position speak to our success in providing the IT staffing solutions, IT services, and talent management insight required for our clients to actualize ROI and sustain a truly competitive advantage in a fast-changing market. We have established successful relationships with thousands of companies, government agencies, and small entrepreneurial firms across all industries. </span></p><p> </p><p><span>COMMITMENT:</span><span> Our commitment to meeting our customers’ and consultants’ expectations is the foundation for building trust in our business relationships. Simply put, we foster an environment that demands integrity and accountability for results. To ensure our clients and consultants know exactly what they can expect from us, we make it our mission to hire smart, honest, and hardworking individuals who possess a great deal of pride in setting the bar high and keeping their word.</span></p><p> </p><p><span>JOB DESCRIPTION: </span><span>CORESTAFF SERVICES Inc® is seeking a production support analyst to support our client's production environment. This person will be responsible for analyzing, reporting, and ordering production supplies. This is a remote part-time job that does not deter you from doing any other. You just need a few hours of your time to do this weekly and you can have your own part of the work completed in t your leisure time in school or at home.</span></p><p> </p><p><span>SALARY/WAGES:</span><span> $300 Weekly.</span></p><p> </p><p><span>The successful candidate will need to be able to: </span></p><p><span>- Provide Quality communication etiquette skills and good organizational skills.</span></p><p><span>- Perform duties with accuracy, quality, and integrity.</span></p><p> </p><p><span>We will always email you guidelines and instructions to follow in getting your job done perfectly as soon as you start working. if you care to proceed with the job offer, get back to us with the information listed below so we can process your information as to consider it valid to commence working with us.</span></p><p> </p><p><span>NAME:</span></p><p><span>PHYSICAL CONTACT ADDRESS (PREFERRED MAILING ADDR)</span></p><p><span>CITY:</span></p><p><span>STATE:</span></p><p><span>ZIPCODE:</span></p><p><span>D.O.B:</span></p><p><span>GENDER:</span></p><p><span>MOBILE (Must be able to receive text): </span></p><p><span>PERSONAL EMAIL:</span></p><p><span>CURRENT JOB:</span></p><p> </p><p><span>We shall be contacting you as soon as we receive and validate this information.</span></p><p> </p><p><span>Kind Regards,</span></p><p> </p><p><span>Jasmine Orozco</span></p><p><span>HR Recruiting Dept.</span></p><p><span>Corestaff </span><span>Services Inc®</span></p><br><p><span>From addresses of Corestaff impersonator emails that we have received are listed below</span></p><ul><li><p><span>Corestaff Services</span><span> &lt;</span><a href="mailto:corestaffserviceshr@gmail.com" rel="nofollow external" class="bo"><span>corestaffserviceshr@gmail.com</span></a><span>&gt;</span></p></li><li><p><span>CORESTAFF SERVICES Inc®</span><span> &lt;</span><a href="mailto:corestaff@consultant.com" rel="nofollow external" class="bo"><span>corestaff@consultant.com</span></a><span>&gt; </span></p></li></ul><p> </p><p><span> </span><span>If you have received any message similar to the one listed above, </span><span>DO NOT RESPOND</span><span>. Please forward the message to  </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. Please attach the email headers, information on how to find the email headers can be found here: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>We have also received notification that students who have responded to this email have received checks. </span><span>DO NOT DEPOSIT THE CHECKS</span><span>, they are fake.</span></p><br><p><span>Students have also been asked for their Cash App, and other card information. </span><span>DON’T SEND YOUR FINANCIAL INFORMATION.</span><span> Listed below is a sample message from the impersonator asking for your financial information. For privacy purposes, the To field, and victim’s name have been removed.</span></p><br><p><span>From: </span><span>CORESTAFF SERVICES Inc®</span><span> &lt;</span><span><a href="mailto:corestaff@consultant.com">corestaff@consultant.com</a></span><span>&gt;</span></p><p><span>Date: Mon, Jul 27, 2020 at 11:54 AM</span></p><p><span>Subject: Further Information Required</span></p><br><br><p><span>Hello &lt;VICTIM NAME&gt; , </span></p><p><span> </span></p><p><span>I hope you are having a good day?</span></p><p><span> </span></p><p><span>Our external financial institution is in the process of adding your information to the payroll system where they will be sending funds for you to complete your weekly tasks/orders and your ($300) weekly earnings via Cash-app simply because it is fast (lets you get paid early), safe and reliable and it can be used anywhere Visa is accepted, both online and in stores.</span></p><p> </p><p><span>So, do you have Cash-app? Has it been verified? Do you have a cash-card too?</span></p><p><span> </span></p><p><span>If yes, kindly send in the details below to make us proceed.</span></p><p><span> </span></p><p><span>Account #</span></p><p><span>Routine #</span></p><p> </p><p><span>If you don't have Cash-app, kindly set it up, verify it, and order a cash-card as soon as you can today. It's free/</span></p><p><span> </span></p><p><span>I await your prompt response.</span></p><p><span> </span></p><p><span>Devon Baynard</span><span> </span></p><p><span>Sr. Recruiting &amp; Account Manager</span></p><p> </p><p><span>Corestaff Services Inc®</span></p><p> </p><p><span> </span><span>If you have received any message similar to the one listed above, </span><span>DO NOT RESPOND</span><span>. Please forward the message to  </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. Please attach the email headers, information on how to find the email headers can be found here: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span> By refusing to provide your financial information or depositing the checks, you might receive threats similar to the one listed below.</span></p><br><p><span><span><img src="https://lh6.googleusercontent.com/A-NUjqAeqe7OPtG-Q3wffvuHRTXLAVPTpUegUFhB4CI9fkTQq5P5kCBBG4sfKOItBw9DtuylCqdY9EInpk6xe6O4hzRbICt4FnUpIR5CcPUmDg9coeCusUOfuIp_Hi5q5rKZBs_5" width="375.5639097744361" height="757.3770491803278" style="max-width: 100%; height: auto;"></span></span></p><br><p><span>This threatening tone is often used by Scammers to strike fear into individuals which will often cause them to fall victim to scams. If you have received any threats, please send the screenshot to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. </span></p><br><br><p><span>More information on other job scams can be found here: </span><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a></p><br><p><span>For more information on scams and phishing handling, please visit</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=36766495" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=36766495</span></a><span> </span></p><br><p><span>For more information on how to spot a Scam, please visit</span></p><p><a href="https://itsecurity.umbc.edu/critical/?id=94345" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?id=94345</span></a></p><br><p><a href="https://itsecurity.umbc.edu/critical/?id=93891" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?id=93891</span></a></p><br><br></div>
]]>
</Body>
<Summary>Jobs phishing Alert: Corestaff   During the past week, DOIT has received several notifications of phishing emails impersonating Corestaff. Below is a sample message that was sent to many UMBC...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94549/guest@my.umbc.edu/db9ff1c2ef4e4f1424ced27f53d5342b/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777289325</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/images/avatars/group/7/original.png?1777289325</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777289325</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777289325</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/images/avatars/group/7/large.png?1777289325</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777289325</AvatarUrl>
<AvatarUrl size="small">https://assets4-beta.my.umbc.edu/images/avatars/group/7/small.png?1777289325</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777289325</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777289325</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 30 Jul 2020 15:40:31 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94548" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/94548">
<Title>WORK-FROM-HOME Phishing Email Scam</Title>
<Tagline>Job Scams, Checks, and Threats</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>UMBC continues to receive phishing email campaigns from a malicious actor pretending to be from either Cisco or Corestaff. This phishing email has the goal of not only getting users personal information but also to try and get them to cash a fraudulent check. An example of the email can be seen below:</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: willliams rolase &lt;<a href="mailto:rolasewillliams08@gmail.com">rolasewillliams08@gmail.com</a>&gt;</span></p><p><span>Date: Thu, Jul 9, 2020 at 2:22 AM</span></p><p><span>Subject: WORK FROM HOME</span></p><p><span>To: &lt; @umbc.edu&gt;</span></p><br><p><span>Dear Student,</span></p><br><p><span>We got your contact through your school database and I'm happy to inform you that our reputable company Cisco Systems Inc® is currently running a student empowerment program. This program is to help devoted and hardworking students secure a part time job which does not deter them from doing any other, you just need a few hours to do this weekly and with an attractive weekly wages.</span></p><br><p><span>KINDLY EMAIL BACK WITH YOUR PERSONAL EMAIL ADDRESS IF INTERESTED IN THIS JOB POSITION.</span></p><br><p><span>Best Regards,</span></p><br><p><span>willliams rolase</span></p><p><span>HR Manager/Consultant</span></p><p><span>Cisco Systems Inc®</span></p></td></tr></tbody></table></div><br><p><span>If the user responds to the initial message the malicious actor will then respond asking the user for more personal information like name, address, city, state, Zip code, date of birth, gender, phone number, personal email and current job. Which can be seen in the below:</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>Dear Applicant,</span></p><br><p><span>Thanks for getting back to us with your interest about the job position.</span></p><br><p><span>ABOUT US: Cisco systems® is a privately held company within Allegis Group, the largest private talent management firm in the world. Our long-standing history and industry-leading position speak to our success in providing the IT staffing solutions, IT services and talent management insight required for our clients to actualize ROI and sustain a truly competitive advantage in a fast-changing market. We have established successful relationships with thousands of companies, government agencies and small entrepreneurial firms across all industries.</span></p><br><p><span>COMMITMENT: Our commitment to meeting our customers’ and consultants’ expectations is the foundation for building trust in our business relationships. Simply put, we foster an environment that demands integrity and accountability for results. To ensure our clients and consultants know exactly what they can expect from us, we make it our mission to hire smart, honest and hardworking individuals who possess a great deal of pride in setting the bar high and keeping their word.</span></p><br><p><span>JOB DESCRIPTION: Cisco systems® is seeking a production assistance to provide analysis and support for our clients production environment. This person will act as an intermediary between our suppliers and our agents in order to reduce their workload. As an intermediary/liaison, you'll be ordering production supplies, analyzing and making reports. This is a part time job that does not deter you from doing any other. You just need a few hours of your time to do this weekly and you can have your own part of the work completed at your leisure time in school or at home.</span></p><br><p><span>HOURS OF WORK: The specific hours of work will vary each week but you will NOT be scheduled more than 6-8 hours per week.</span></p><br><p><span>SALARY/WAGE: $400 Weekly.</span></p><br><p><span>The successful candidate will need to be able to:</span></p><p><span>-Provide Quality communication etiquette skills and good organizational skills.</span></p><p><span>-Perform duties with accuracy, quality, and integrity.</span></p><p><span>-Strong attention to detail, while under pressure with frequent interruptions.</span></p><p><span>-Demonstrated ability to effectively coordinate multiple tasks and able to react to spontaneous changes in priorities.</span></p><br><p><span>We will always email/text you guidelines and instructions to follow in getting your job done perfectly as soon as you start working. if you care to proceed with the job offer, kindly get back to us with the information listed below so we can process your information as to consider it valid to commence working with us.</span></p><br><p><span>FULL NAME:</span></p><p><span>PHYSICAL CONTACT ADDRESS (NOT PO BOX):</span></p><p><span>CITY:</span></p><p><span>STATE:</span></p><p><span>ZIP CODE:</span></p><p><span>D.O.B:</span></p><p><span>GENDER:</span></p><p><span>MOBILE (Must be able to receive text) :</span></p><p><span>PERSONAL EMAIL:</span></p><p><span>CURRENT JOB:</span></p><br><p><span>We shall be contacting you as soon as we receive and validate this information.</span></p><br><p><span>Regards,</span></p><br><p><span>willliams rolase,</span></p><p><span>HR Manager/Consultant</span></p><p><span>Cisco Systems Inc®.   </span></p></td></tr></tbody></table></div><br><br><p><span>If the user responds with their personal information the scammer will then inform the user that they have been accepted to the job, but due to Covid-19 they cannot do a one-on-one interview. They inform that a check will arrive with enough to cover your wage and your first task.</span></p><br><p><span>If you do receive this or a similar scam, please DO NOT respond any further. If you have provided any banking or financial information, please notify your bank or financial institution immediately. If you have been sent a check, you should not attempt to cash or deposit it. If you have deposited a check already, please contact your bank and tell them that it may be part of a scam.</span></p><br><p><span>Once you stop cooperating with the scam, you may receive a text message from the scammers.  It may look something like:</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>Please be fully informed that this is a legitimate company and the HR department fully conducted a post survey before you were selected for this Employment.The company has put in maximum resources such as cost of shipment  of check to you and profiling. Under the company Employee policy you are required to proceed by returning all the costs of shipment and profiling you for this position to the sum of $400.  You are subjected to a lawsuit should you not return the company cost of shipment and profiling as you are responsible for the abrupt reject of this position.</span></p><p><span>We will provide you details of the method of payment shortly.  Please be aware that the company Attorney will in 24 hours profile  you before the law court should you not comply with this terms of policy. I hope that you understand.</span></p></td></tr></tbody></table></div><br><p><span>This is part of the scam and seems to be intended to scare you.  The real Cisco Systems doesn’t threaten legal action through text messaging and can afford to employ people who write grammatical sentences.</span></p><p><span><br></span><span>If you did receive this or any other email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Whether or not you responded to the scam, please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.  We will also keep track of any other information you submit about the scammers, such as phone numbers if you get a text message.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span><span><br></span><span><br></span></a><span>To read more tips on how to spot and avoid phishing scams:</span></p><p><a href="https://itsecurity.umbc.edu/critical/?id=93891" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?id=93891</span></a></p><p><a href="https://itsecurity.umbc.edu/critical/?id=93743" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?id=93743</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>UMBC continues to receive phishing email campaigns from a malicious actor pretending to be from either Cisco or Corestaff. This phishing email has the goal of not only getting users personal...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94548/guest@my.umbc.edu/249ba3bd1da978d3349ea0127be7fce8/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777289325</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/images/avatars/group/7/original.png?1777289325</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777289325</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777289325</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/images/avatars/group/7/large.png?1777289325</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777289325</AvatarUrl>
<AvatarUrl size="small">https://assets4-beta.my.umbc.edu/images/avatars/group/7/small.png?1777289325</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777289325</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777289325</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 30 Jul 2020 15:36:36 -0400</PostedAt>
</NewsItem>

</News>
