<?xml version="1.0"?>
<News hasArchived="false" page="15" pageCount="28" pageSize="10" timestamp="Sun, 19 Apr 2026 11:32:35 -0400" url="https://beta.my.umbc.edu/groups/itsecurity/posts.xml?page=15">
<NewsItem contentIssues="false" id="95624" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/95624">
<Title>Job Scam "Internship" From A Compromised UMBC Account</Title>
<Tagline>Check The "Reply-To" Address</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>The job scam below was recently reported to DoIT. The subject of the email is just “Internship” and has a very short message as can be seen below. The name and email of the from and to fields were removed for privacy reasons.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: COMPROMISED EMAIL &lt;@umbc.edu&gt;</span></p><p><span>Date: Sun, 6 Sep 2020</span></p><p><span>Subject: Internship</span></p><p><span>To: &lt;@umbc.edu&gt;</span><span><br></span><span><br></span><span>Personal_Assistant  urgently needed. Contact <a href="mailto:charlenabolinlyco21@gmail.com">charlenabolinlyco21@gmail.com</a> for more information or to sign up.</span></p><br><p><span>Regards,</span></p><p><span>HR  Manager.</span></p></td></tr></tbody></table></div><br><p><span>Please note that the phishing message above is supposedly coming froman umbc email but the reply-to in the emails header is set to &lt;</span><a href="mailto:charlenabolinlyco21@gmail.com" rel="nofollow external" class="bo"><span>charlenabolinlyco21@gmail.com</span></a><span>&gt;. This would mean if the user tried to respond to the email above they would not be responding to the umbc email address, but instead they would be directly emailing the scammers at &lt;</span><a href="mailto:charlenabolinlyco21@gmail.com" rel="nofollow external" class="bo"><span>charlenabolinlyco21@gmail.com</span></a><span>&gt;.</span></p><br><p><span>If you do receive this or any other email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>The job scam below was recently reported to DoIT. The subject of the email is just “Internship” and has a very short message as can be seen below. The name and email of the from and to fields were...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95624/guest@my.umbc.edu/41139130f1ac2db6741b2caedb190a9a/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776441867</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1776441867</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776441867</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1776441867</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776441867</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 09 Sep 2020 19:42:24 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="95316" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/95316">
<Title>FAKE Offer Of A "Personal Assistant" Job</Title>
<Tagline>NOTICE: "Ryan Glenn" Does NOT Want To Hire You.</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>In the last several days, the UMBC
    community has received thousands of fake job offers from "Ryan
    Glenn".  An example is shown below:<br>
    <br>
    </span></p>
    
    <table border="1">
     <tbody><tr>
      <td>
      <p><span>You are eligible to apply for an
      opening as an Online Personal<br>
      Assistant to Ryan Glenn,<br>
      Investor Relations Paylocity.  You will be working remotely and<br>
      getting paid weekly.<br>
      <br>
      You will be required to work for a maximum of an hour daily or six hours
      weekly.<br>
      <br>
      Fill the required information if interested in this opportunity.<br>
      <br>
      Name:<br>
      Physical Address:<br>
      State:<br>
      City:<br>
      Zip Code:<br>
      Phone #:<br>
      Email:<br>
      Alternate Email:<br>
      A little about you and why you think you should be considered:<br>
      <br>
      Send replies to <a href="mailto:charlenabolinlyco21@gmail.com" rel="nofollow external" class="bo"><span>charlenabolinlyco21@gmail.com</span></a> to apply.<br>
      <br>
      Warm Regards<br>
      Charlena B<br>
      Publicity Manager.</span></p>
      <p><span> </span></p>
      </td>
     </tr>
    </tbody></table>
    
    <p><span> </span></p>
    
    <p><span> </span></p>
    
    <p><span>Summary: The message above is coming from
    someone you don’t know and who doesn’t offer a last name. <span> </span>The message asks for detailed information that
    can be used for identity theft.<span>  </span>It is
    from a Gmail account which anyone can create under any name not already in use.<span>  <br></span></span></p><p><span><span><br></span></span></p><p><span>If you respond to this message, you will get
    something like the one below:</span></p>
    
    <p><span> </span></p>
    
    <table border="1">
     <tbody><tr>
      <td>
      <p><span>From: <strong>Ryan Glenn</strong> &lt;<a href="mailto:ryan.glenn.pay@gmail.com" rel="nofollow external" class="bo"><span>ryan.glenn.pay@gmail.com</span></a>&gt;</span></p>
      <p><span>Date: Sat, Aug 29, 2020 at 5:13 PM<br>
      Subject: CONFIRMATION<br>
      To: </span></p>
      <p><span>Hello, further to the interview
      session I had with you, I am </span></p>
      <p><span>pleased to confirm your
      appointment as my Personal Assistant. </span></p>
      <p><span>Please find attached detailed
      offer letter which you will be required </span></p>
      <p><span>to sign, scan and email back to
      me, you can as well e-sign and send </span></p>
      <p><span>a copy as a confirmation of your
      acceptance. </span></p>
      <p><span> </span></p>
      <p><span><span>                            </span></span></p>
      <p><span>Sincerely,</span></p>
      <p><strong><span>Ryan Glenn</span></strong></p>
      <p><strong><span>Vice President</span></strong></p>
      <p><strong><span>FP&amp;A and IR Paylocity</span></strong></p>
      <p> </p>
      </td>
     </tr>
    </tbody></table>
    
    <p> </p>
    
    
    
    <p><span>There is a Ryan Glenn and he is, in fact, a Vice
    President with a corporation called Paylocity.<span> 
    </span>However, he does not want to hire you.<span> 
    </span>This is a scam.<span>  </span>Please do not reply.</span></p>
    
    <p><em><span>If you do receive email
    similar to these examples, or any other email that you suspect is a scam, please
    do not click on any URL or reply. Either of those actions confirms to the
    sender that your email address is valid. Please forward the message (with the
    email headers) to</span></em><span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></span></p>
    
    <p><span> </span></p>
    
    <p><em><span>How do I forward full
    email headers?</span></em><em></em></p>
    
    <p><span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></span></p>
    
    <p><span> </span></p>
    
    <p><em><span>To read more articles
    published by DOIT Security, visit: </span></em><em></em></p>
    
    <p><span><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></span></p>
    
    <p><span><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></span></p>
    
    </div>
]]>
</Body>
<Summary>In the last several days, the UMBC community has received thousands of fake job offers from "Ryan Glenn".  An example is shown below:                You are eligible to apply for an   opening as...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95316/guest@my.umbc.edu/61d0213e9f4ecc0a9d49638ca2ff0614/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776441867</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1776441867</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776441867</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1776441867</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776441867</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 31 Aug 2020 15:01:58 -0400</PostedAt>
<EditAt>Mon, 31 Aug 2020 15:02:36 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="95307" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/95307">
<Title>Fake Cisco Phishing Job Scams</Title>
<Tagline>Cisco Systems Is NOT Offering You A Job In A Mass Emailing!</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>DoIT has been notified of another malicious actor sending out phishing emails claiming to offer job opportunities with Cisco Systems. The email below is similar to the previous phishing attempts, but  with a new subject line: “UMBC STUDENT EMPOWERMENT PART TIME JOB OPPORTUNITY.”</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: John Williams &lt;<a href="mailto:jw821859@gmail.com">jw821859@gmail.com</a>&gt;</span></p><p><span>Subject: UMBC STUDENT EMPOWERMENT PART TIME JOB OPPORTUNITY</span></p><p><span>Date: August 24, 2020</span></p><p><span>To: &lt;@umbc.edu&gt;</span></p><br><p><span>Dear student, </span></p><br><p><span>   We got your contact through your school database and I'm happy to inform you that our reputable company CISCOsystems® is currently running a student empowerment </span></p><p><span>program. This program is completely school oriented as it has been designed not to deter you from all school activities which is priority for you and this </span></p><p><span>organization. This program is to help loyal and hardworking students like you secure a part time job with an attractive weekly salary.</span></p><p><span>TO PROCEED WITH THIS JOB OFFER, KINDLY REPLY TO THIS MAIL WITH YOUR ALTERNATE E-MAIL ADDRESS IN ORDER TO RECEIVE THE FULL JOB DESCRIPTION. </span></p><br><p><span>Best Regards,</span></p><br><p><span>John Williams,</span></p><p><span>HR Recruit Manager/Consultant</span></p><p><span>CISCOsystems Inc®.</span></p></td></tr></tbody></table></div><br><p><span>If you do receive this or any other email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>DoIT has been notified of another malicious actor sending out phishing emails claiming to offer job opportunities with Cisco Systems. The email below is similar to the previous phishing attempts,...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95307/guest@my.umbc.edu/438bd33a7dc8c63388be709df4731cd9/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776441867</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1776441867</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776441867</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1776441867</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776441867</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 31 Aug 2020 14:06:12 -0400</PostedAt>
<EditAt>Mon, 31 Aug 2020 14:07:20 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="95305" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/95305">
<Title>Job Scam &#8220;Offer&#8221; From A Compromised UMBC Account</Title>
<Tagline>Fake Job Offer For "Online Personal Assistant"</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Recently the DoIT has been notified of a job scam using a compromised UMBC email account to send out fake job offers. An example of the email (with the name of the sender removed for privacy) is shown below.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: COMPROMISED ACCOUNT &lt;</span><span>@umbc.edu</span><span>&gt;</span></p><p><span>Date: Thu, Aug 27, 2020</span></p><p><span>Subject: Offer</span></p><p><span>To:</span></p><br><p><span>You are eligible to apply for an opening as an Online Personal</span></p><p><span>Assistant to Ryan Glenn,</span></p><p><span>Investor Relations Paylocity.  You will be working remotely and</span></p><p><span>getting paid weekly.</span></p><br><p><span>You will be required to work for a maximum of an hour daily or six hours weekly.</span></p><br><p><span>Fill the required information if interested in this opportunity.</span></p><br><p><span>Name:</span></p><p><span>Physical Address:</span></p><p><span>State:</span></p><p><span>City:</span></p><p><span>Zip Code:</span></p><p><span>Phone #:</span></p><p><span>Email:</span></p><p><span>Alternate Email:</span></p><p><span>A little about you and why you think you should be considered:</span></p><br><p><span>Send replies to </span><span><a href="mailto:charlenabolinlyco21@gmail.com">charlenabolinlyco21@gmail.com</a></span><span> to apply.</span></p><br><p><span>Warm Regards</span></p><p><span>Charlena B</span></p><p><span>Publicity Manager</span></p></td></tr></tbody></table></div><br><p><span>Please note that this phishing message is coming from a umbc email but the reply-to in the emails headers is set to &lt;</span><a href="mailto:charlenabolinlyco21@gmail.com" rel="nofollow external" class="bo"><span>charlenabolinlyco21@gmail.com</span></a><span>&gt;. This means if the user responds to the email above they would not be responding to the umbc email, instead their email would be sent to the &lt;</span><a href="mailto:charlenabolinlyco21@gmail.com" rel="nofollow external" class="bo"><span>charlenabolinlyco21@gmail.com</span></a><span>&gt;.</span></p><br><p><span>If you do receive this or any other email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>Recently the DoIT has been notified of a job scam using a compromised UMBC email account to send out fake job offers. An example of the email (with the name of the sender removed for privacy) is...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95305/guest@my.umbc.edu/8d43dd99b51da03f52decbba3c7b5892/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776441867</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1776441867</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776441867</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1776441867</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776441867</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 31 Aug 2020 14:01:40 -0400</PostedAt>
<EditAt>Mon, 31 Aug 2020 14:08:25 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="95304" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/95304">
<Title>Tips to Avoid ID Theft on Campus</Title>
<Tagline>Simple Ways To Secure Your Identity</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>With classes starting back up, malicious actors will try even harder to steal people's information or commit Identity theft. The article that is linked below has some tips for college students to help avoid Identity theft by monitoring your inbox and detecting fraud.</span></p><br><p><span>Here are some of the tips that are recommended for college students:</span><span><br><br></span></p><ul><li><p><span>Send sensitive mail to your permanent home or post office box</span><span>. Sending your more sensitive mail to a PO box or permanent home is considered much more secure.</span></p></li><li><p><span>Important documents should be stored away safely</span><span>. Make sure documents like your Social Security card, passport, and bank and credit card statements are stored securely. As well to often shred credit card offers and any other paper document that has sensitive financial information.</span></p></li><li><p><span>Never lend your card or debit card to anyone</span><span>. If you feel uncomfortable about lending your card just say no. This includes lending your card to a friend, or co-signing for a loan or financing for items like a TV. Also at an ATM making sure that no one is ‘shoulder surfing’ your PIN.</span></p></li><li><p><span>Guard your passwords</span><span>. Do not give out your passwords to anyone, use strong passwords and do not use the same password for multiple accounts.</span></p></li><li><p><span>Watch out for phishing emails</span><span>. Be careful not to click on links in unsolicited emails and texts. For more information on phishing email campaigns that could affect UMBC please check out the DoIT Security page main page for more updated information.</span></p></li><li><p><span>Make sure that your computer is up-to-date with antivirus and spyware softwares</span><span>. Always install any updates and patches to your computer's operating system or browser software. These will help to keep your computer safe from malicious softwares.</span></p></li><li><p><span>Be careful while shopping online</span><span>. For more information on tips to safely online please check out this article from the Better Business Bureau, </span><a href="https://www.bbb.org/article/news-releases/22474-bbb-warning-be-careful-purchasing-from-unknown-websites-during-covid-19" rel="nofollow external" class="bo"><span>https://www.bbb.org/article/news-releases/22474-bbb-warning-be-careful-purchasing-from-unknown-websites-during-covid-19</span></a></p></li><li><p><span>Check your credit report at least once a year</span><span>. According to the article you are entitled to one free report a year from each of the tree reporting bureaus: TransUnion, Experian, and Equifax. Look for any suspicious activity or inaccuracies. For more information on this please check the BBB article linked below, this article by the Federal Trade Commision (FTC), </span><a href="https://www.consumer.ftc.gov/articles/0155-free-credit-reports" rel="nofollow external" class="bo"><span>https://www.consumer.ftc.gov/articles/0155-free-credit-reports</span></a><span>.</span></p></li></ul><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>For more information, please check out: </span></p><p><a href="https://www.bbb.org/article/news-releases/10496-bbb-9-tips-to-avoid-id-theft-on-campus" rel="nofollow external" class="bo"><span>https://www.bbb.org/article/news-releases/10496-bbb-9-tips-to-avoid-id-theft-on-campus</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>With classes starting back up, malicious actors will try even harder to steal people's information or commit Identity theft. The article that is linked below has some tips for college students to...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95304/guest@my.umbc.edu/2a53eb72186e06dd9d301ba1ce8d21f4/api/pixel</TrackingUrl>
<Tag>learn</Tag>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776441867</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1776441867</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776441867</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1776441867</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776441867</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 31 Aug 2020 13:58:28 -0400</PostedAt>
<EditAt>Wed, 03 Nov 2021 11:47:07 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="95303" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/95303">
<Title>&#8220;WorkStudy Update!&#8221; Job Phishing Scam</Title>
<Tagline>Same Scam, Different Details</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span>The UMBC DoIT has been notified of a compromised UMBC account used to send out phishing emails. An example of the email chain is shown below. The name and email address of the compromised UMBC account have been removed for privacy reasons, as well as the name of the user who reported the email.</span><br><p><span>Initial Scam Message</span></p><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: COMPROMISED ACCOUNT &lt;</span><span>@umbc.edu</span><span>&gt;</span></p><p><span>Date: Fri, Aug 28, 2020 at 7:47 AM</span></p><p><span>Subject: WorkStudy Update!</span></p><p><span>To:</span></p><br><p><span>Good morning!</span></p><p><span>My name is &lt;COMPROMISED ACCOUNT&gt;</span><span>and i currently work with the UMBC educational planning center and i would like to inform you that there is a job opening opportunity available to you, This opportunity is only part time and is not expected to clash with your current school/study schedule.Kindly send in an </span><span>instant reply if you are in search of a job so you can receive further information..  </span></p></td></tr></tbody></table></div><br><p><span>Follow-up Scam Message</span></p><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: career management jobs &lt;<a href="mailto:careerjobsdepartment@outlook.com">careerjobsdepartment@outlook.com</a>&gt;</span></p><p><span>Date: Fri, Aug 28, 2020 at 8:48 AM</span></p><p><span>Subject: Re: WorkStudy Update!</span></p><p><span>To:  &lt;</span><a href="mailto:efago1@umbc.edu" rel="nofollow external" class="bo"><span>@umbc.edu</span></a><span>&gt;</span></p><br><p><span>Hello &lt;NAME&gt;</span></p><br><p><span>Thank you for your interest in the available job position, kindly</span></p><p><span>click on the URL below to view the application portal</span></p><br><p><a href="https://tinyur" rel="nofollow external" class="bo"><span>https://tinyur</span></a><span>l .com/JOB-UPDATE</span></p></td></tr></tbody></table></div><br><p><span>The first email is similar to a recent trend in phishing campaigns that we have recently seen, except this one uses the compromised account holder’s name in the email message and has changed  the subject to “WorkStudy Update!” These campaigns, even if sent from different users with different subjects do seem to have a pattern of using “WorkStudy” in the subject as well as having a similar email format for both messages.</span></p><br><p><span>If the user does respond to the first message showing interest, they will receive the second message from a different email address. This is because in the email headers of the first email from the UMBC account, the reply-to is set to the &lt;</span><a href="mailto:careerjobsdepartment@outlook.com" rel="nofollow external" class="bo"><span>careerjobsdepartment@outlook.com</span></a><span>&gt; so instead of the user emailing the &lt;@umbc.edu&gt; email they are emailing the scammer directly.</span></p><br><p><span>The second email contains a link to a malicious site. If you do receive this email please do not click on the URL. In previous similar scams, the scammer is seeking personal information such as name, phone number, email address, home address, age and current occupation.  It also invites the user to ‘tell a bit about themselves’ in a free-form text box.</span></p><br><p><span>If you do receive this or any other email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>The UMBC DoIT has been notified of a compromised UMBC account used to send out phishing emails. An example of the email chain is shown below. The name and email address of the compromised UMBC...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95303/guest@my.umbc.edu/8fc84deb666ad9242e9f0e474365a6e7/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776441867</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1776441867</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776441867</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1776441867</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776441867</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 31 Aug 2020 13:54:34 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="95196" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/95196">
<Title>&#8220;WorkStudy Offer!&#8221; Job Phishing Scam</Title>
<Tagline>Compromised UMBC Exploited To Send Fake Job Offer</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><p><span>DoIT was notified today of a scammer sending out emails claiming to be offering a job opportunity. The message came from a compromised Umbc email account, so the From name was removed for privacy in the example below.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: </span><span>COMPROMISED ACCOUNT</span><span> &lt;</span><span>@umbc.edu</span><span>&gt;</span></p><p><span>Date: Wed, Aug 26, 2020</span></p><p><span>Subject: WorkStudy Offer!</span></p><p><span>To:</span></p><br><p><span>Good morning!</span></p><p><span>I hope you are well. I would like to share with you this job opportunity,you could earn between $100- $240 weekly. This opportunity is only part time and is not expected to clash with your current school/study schedule.Kindly send in an instant reply if you are in search of a job so you can receive further information</span></p></td></tr></tbody></table></div><br><p><span> If the victim responds showing interest they will receive a message from a different email address &lt;</span><a href="mailto:careerjobsdepartment@outlook.com" rel="nofollow external" class="bo"><span>careerjobsdepartment@outlook.com</span></a><span>&gt; and this email will contain a malicious URL. The scammer is seeking personal information such as name, phone number, email address, home address, age and current occupation.  It also invites the victim to ‘tell a bit about themselves’ in a free-form text box.</span></p><br><p><span>This first email shows a few red flags. For instance, some parts of the message have no spacing, an example of this is “schedule.Kindly”. The email also expresses a sense of urgency with the email asking for the victim to send an “an instant reply.” </span></p><br><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>&lt;</span><a href="mailto:careerjobsdepartment@outlook.com" rel="nofollow external" class="bo"><span>careerjobsdepartment@outlook.com</span></a><span>&gt; responded:</span></p><br><p><span>Thank you for your interest in the available job position, kindly click on the URL below to view the application portal</span></p><br><p><span><a href="https://tinyurl">https://tinyurl</a> .com/JOB-UPDATE</span></p></td></tr></tbody></table></div><br><br><p><span>If you do receive this or a similar email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to <a href="mailto:security@umbc.edu">security@umbc.edu</a>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span> </span></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a><span> </span></p><div><span><br></span></div></span></div>
]]>
</Body>
<Summary>DoIT was notified today of a scammer sending out emails claiming to be offering a job opportunity. The message came from a compromised Umbc email account, so the From name was removed for privacy...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95196/guest@my.umbc.edu/a83372e47dd9d6c04a6489f4869a3349/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776441867</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1776441867</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776441867</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1776441867</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776441867</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 26 Aug 2020 23:24:52 -0400</PostedAt>
<EditAt>Mon, 31 Aug 2020 11:42:34 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="95109" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/95109">
<Title>Phishing Email from Fake UMBC IT Desk</Title>
<Tagline>Phsihing Attack Sent To Over 1000 UMBC Accounts</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>A compromised UMBC account was used to send phishing emails to over 1200 other UMBC accounts today. These malicious emails, claiming to be from the “UMBC IT Desk,” contained a link to a fake myUMBC login page, potentially allowing the malicious actors to steal any passwords entered on the site. To prevent further malicious activity, DoIT Security has scrambled the password of the account used to send the emails.</span></p><p><span>From: &lt;name removed&gt;</span></p><p><span>Date: Mon, Aug 24, 2020 at 10:40 AM</span></p><p><span>Subject: COVID-19 Update</span></p><p><span>To:</span></p><br><br><p><span>This is the UMBC IT Desk. Kindly Update your details to avoid beinglocked out of your email account.</span></p><p><span>Follow the URLbelow to proceed to setup umbc.edu/cas-web/login/Update</span></p><p><span>IT DeskUMBC</span></p><p><span> </span></p><p><span>The link leads to this fake login page:</span></p><p><span><span><img src="https://lh4.googleusercontent.com/qESGwhhjWX4Eq5wLk8x42DzKncvfCb8MXubrCFGRovWZciOQQsHK6zJeWxyP7DN1T_md66vgViBCx9OrzF8VzKuK80L_Fa0zwPSBj7nNvnyN0GeV4NUMm96XgnZWvIoo5G-LEJkF" width="624" height="351" style="max-width: 100%; height: auto;"></span></span></p><p><span>Always check the URL before entering credentials online. Notice that this site is not in the umbc.edu domain, despite claiming to be myUMBC. In addition, you can compare it to the real login page by navigating to myUMBC without using a link to see that it does not match.</span></p><p><span>As of this writing, approximately 150 people have clicked this link. If you have entered your UMBC password after clicking the link in this phishing email, please change it to something substantively different as soon as possible. Instructions for doing so can be found here:</span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867939" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867939</span></a><span>.</span></p><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p></div>
]]>
</Body>
<Summary>A compromised UMBC account was used to send phishing emails to over 1200 other UMBC accounts today. These malicious emails, claiming to be from the “UMBC IT Desk,” contained a link to a fake...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95109/guest@my.umbc.edu/76a7aa4617da4d330558aa3e1cf11818/api/pixel</TrackingUrl>
<Tag>covid19</Tag>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776441867</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1776441867</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776441867</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1776441867</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776441867</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 24 Aug 2020 16:00:48 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="95090" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/95090">
<Title>Account data breach: Zoosk (2020)</Title>
<Tagline>Credentials Breach Report</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>In January 2020, Zoosk 2020, an online dating service, suffered a data breach. This breach contained 24 million users data that was posted online. The user information includes dates of birth, drinking habits, education levels, email addresses, ethnicities, family structure, genders, geographic locations, income levels, names, nicknames, physical attributes, political views, relationship statuses, religions, sexual orientations,and smoking habits. While the passwords posted were not valid for access to UMBC accounts, we suggest you change your UMBC password as a safety precaution.</span></p><br><p><span>76 UMBC accounts were victims of this breach. The victims are being notified via their UMBC emails and/or their alternate emails. If you have a Zoosk (2020) account, please contact them to see if you have been affected by this breach. To see if you were involved in any other breach visit: </span><a href="https://haveibeenpwned.com/" rel="nofollow external" class="bo"><span>https://haveibeenpwned.com/</span></a><span>.</span></p><br><br><p><span>More about Zoosk(2020) data breach:</span></p><p><a href="https://grahamcluley.com/zoosk-hacking/" rel="nofollow external" class="bo"><span>https://grahamcluley.com/zoosk-hacking/</span></a></p><br><p><a href="https://www.justice4you.com/blog/zoosk-data-breach.html#:~:text=According%20to%20the%20notice%2C%20an%20unauthorized%20party%20breached,by%20email%2C%20including%20more%20than%20560%2C000%20California%20residents." rel="nofollow external" class="bo"><span>https://www.justice4you.com/blog/zoosk-data-breach.html#:~:text=According%20to%20the%20notice%2C%20an%20unauthorized%20party%20breached,by%20email%2C%20including%20more%20than%20560%2C000%20California%20residents.</span></a></p><br><p><span>If you have any questions or concerns email us: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> </span></p><br><p><span>Information about this breach was provided to us by Have I Been Pwned(HIBP). </span></p><p> </p><p><span>_____________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><p> </p><p><span>Need to set up a recovery email for your UMBC account?</span></p><p><span>Follow the instructions here: </span><a href="https://my3.my.umbc.edu/groups/itsecurity/posts/94776" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity/posts/94776</span></a></p><br><p><span>Follow us on myUMBC</span><span>:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></p></div>
]]>
</Body>
<Summary>In January 2020, Zoosk 2020, an online dating service, suffered a data breach. This breach contained 24 million users data that was posted online. The user information includes dates of birth,...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95090/guest@my.umbc.edu/e19d02e85d33f6e43f12987559f2f8a4/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776441867</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1776441867</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776441867</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1776441867</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776441867</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 24 Aug 2020 13:00:41 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="95089" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/95089">
<Title>Account data breach: Drizly</Title>
<Tagline>Credentials Breach Report</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>In July 2020, an online alcohol delivery service, Drizly, suffered a data breach. This breach contained 2.5 million customers data that was sold online, and then posted on a hacking forum. The customer information includes names, email addresses, IP addresses, physical addresses, date of birth, phone numbers, and passwords. No financial information was leaked.</span></p><br><p><span>106 UMBC accounts were victims of this breach. The victims are being notified via their UMBC emails and/or their alternate emails. If you have a Drizly account, please contact them to see if you have been affected by this breach. To see if you were involved in any other breach visit: </span><a href="https://haveibeenpwned.com/" rel="nofollow external" class="bo"><span>https://haveibeenpwned.com/</span></a><span>.</span></p><br><br><p><span>More about Drizly data breach:</span></p><p><a href="https://techcrunch.com/2020/07/28/drizly-data-breach/" rel="nofollow external" class="bo"><span>https://techcrunch.com/2020/07/28/drizly-data-breach/</span></a></p><br><p><a href="https://www.forbes.com/sites/katedingwall/2020/07/29/alcohol-e-commerce-giant-drizly-hit-with-huge-data-breach/#63b0d40b5a96" rel="nofollow external" class="bo"><span>https://www.forbes.com/sites/katedingwall/2020/07/29/alcohol-e-commerce-giant-drizly-hit-with-huge-data-breach/#63b0d40b5a96</span></a></p><br><p><span>If you have any questions or concerns email us: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> </span></p><br><p><span>Information about this breach was provided to us by Have I Been Pwned(HIBP). </span></p><p> </p><p><span>_____________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><p> </p><p><span>Need to set up a recovery email for your UMBC account?</span></p><p><span>Follow the instructions here: </span><a href="https://my3.my.umbc.edu/groups/itsecurity/posts/94776" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity/posts/94776</span></a></p><br><span>Follow us on myUMBC</span><span>:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></div>
]]>
</Body>
<Summary>In July 2020, an online alcohol delivery service, Drizly, suffered a data breach. This breach contained 2.5 million customers data that was sold online, and then posted on a hacking forum. The...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95089/guest@my.umbc.edu/89316cd852a70895cf563be575901740/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776441867</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1776441867</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776441867</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1776441867</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776441867</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 24 Aug 2020 12:27:41 -0400</PostedAt>
</NewsItem>

</News>
