<?xml version="1.0"?>
<News hasArchived="false" page="1" pageCount="20" pageSize="10" timestamp="Sun, 19 Apr 2026 01:07:52 -0400" url="https://beta.my.umbc.edu/groups/itsecurity/posts.xml?tag=notice">
<NewsItem contentIssues="false" id="143015" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/143015">
<Title>Gift Card Scams Are Targeting UMBC Staff</Title>
<Tagline>If it seems weird, it is.  Don't do it.</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p>For several years, UMBC's Division of Information Technology has received reports of gift card scams. Recently, some of these scams have been sent as text messages to personal phones, falsely representing themselves as directions from senior administration officials. Regardless of how the message is sent or received, who appears to be sending it, or what personal information it may contain, <strong><em>it's a scam</em></strong>. Nobody is going to ask you to buy several hundred dollars' worth of gift cards and send the PINs.</p><p>The scam is simple, and while details may vary, the basic outline remains the same.</p><p><strong>Short version:</strong><br>Someone tells you to buy one or more gift cards and then to send them the numbers off the back.</p><p><strong>Detailed version:</strong><br>The victim receives a message, possibly through email, SMS text message, or even a phone call, telling them that someone in authority (a supervisor, the Internal Revenue Service, etc.) needs them to purchase some quantity of gift cards. The message will specify a type of gift card, such as Google Play or iTunes, but it could be any card that can be used like money. The message will often be worded to make the immediate purchase seem urgent and may state that the person needing the card cannot be reached directly (e.g., "in a meeting" or "out of the country").</p><p>The victim is instructed to get the PIN off the back of the card and send it or a picture of it via phone, email, or some other method of electronic communication.</p><p>Once this is done, the scam is over. The scammer can sell the PIN numbers at a discount. Since the scammer has spent nothing, everything is pure profit.</p><p>If you receive a scam message involving UMBC phone numbers, UMBC-owned phones, or mentioning members of the UMBC community, please notify DoIT through email at <a rel="nofollow external" class="bo">security@umbc.edu</a>.</p><p>You can find more information about these scams at:</p><ul><li><a href="https://consumer.ftc.gov/articles/avoiding-and-reporting-gift-card-scams">https://consumer.ftc.gov/articles/avoiding-and-reporting-gift-card-scams</a></li><li><a href="https://consumer.ftc.gov/consumer-alerts/2023/07/if-you-paid-scammer-gift-card-your-money-gone-maybe-not">https://consumer.ftc.gov/consumer-alerts/2023/07/if-you-paid-scammer-gift-card-your-money-gone-maybe-not</a></li><li><a href="https://support.apple.com/gift-card-scams">https://support.apple.com/gift-card-scams</a></li></ul><p><br></p></div>
]]>
</Body>
<Summary>For several years, UMBC's Division of Information Technology has received reports of gift card scams. Recently, some of these scams have been sent as text messages to personal phones, falsely...</Summary>
<Website>https://consumer.ftc.gov/articles/avoiding-and-reporting-gift-card-scams</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/143015/guest@my.umbc.edu/c2bf0580fdecd5d462396b63ee9944c8/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776441867</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1776441867</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776441867</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1776441867</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776441867</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>15</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 31 Jul 2024 21:02:24 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="130051" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/130051">
<Title>Two Unusual Phishing Campaigns</Title>
<Tagline>Scammers get creative</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div>Recently the Division of Information Technology (DoIT) received notification of two phishing campaigns at other universities.  While neither of these has been reported at UMBC, we are posting this warning as a precautionary measure.</div><div> </div><div>One campaign is an advertisement for extras in a movie.  The extras are to appear nude or semi-nude in a party scene and anyone interested is asked to reply for more details.The email is from a standard gmail.com account, not a recognized film production company.</div><div> </div><div>The other campaign is a questionnaire directed to male recipients asking personal questions about circumcision.  The sender is described as a nurse working for an unnamed non-profit organization.  Like the studio advertisement, the message is from a standard gmail.com account.</div><div> </div><div>Both of these messages are fakes trying to gather personal information about the recipient.  Presumably the goal is identity theft, though there may also be a later attempt to scam the recipient for money.</div><div> </div><div>As always with phishing messages, <strong>Please Do Not Reply!</strong></div><div><br></div><div>If you have received any message similar to the ones described above, please forward it with its headers to <a href="mailto:security@umbc.edu">security@umbc.edu</a>. For instructions, visit <a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970">https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</a>.</div><div><br></div><div>If you need further assistance, please contact us at <a href="mailto:security@umbc.edu">security@umbc.edu</a>.</div><div>__________________________________________________________<br><br></div><div>For more information about phishing, please visit <a href="https://itsecurity.umbc.edu/cyber-awareness/spam-and-phishing-faqs/">https://itsecurity.umbc.edu/cyber-awareness/spam-and-phishing-faqs/</a></div><div><br>Receive any suspicious emails?</div><div>Forward them to <a href="mailto:security@umbc.edu">security@umbc.edu</a> along with the email headers. For instructions, visit <a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970">https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</a>.</div><div><br>Follow us on myUMBC: <a href="https://my3.my.umbc.edu/groups/itsecurity">https://my3.my.umbc.edu/groups/itsecurity</a>.</div></div>
]]>
</Body>
<Summary>Recently the Division of Information Technology (DoIT) received notification of two phishing campaigns at other universities.  While neither of these has been reported at UMBC, we are posting this...</Summary>
<Website>https://itescurity.umbc.edu</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/130051/guest@my.umbc.edu/b8406f14fe53696bb24f336193a96094/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776441867</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1776441867</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776441867</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1776441867</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776441867</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/130/051/2753e50142e2f5b7089b165accdcc900/xxlarge.jpg?1672851649</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/130/051/2753e50142e2f5b7089b165accdcc900/xlarge.jpg?1672851649</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/130/051/2753e50142e2f5b7089b165accdcc900/large.jpg?1672851649</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/130/051/2753e50142e2f5b7089b165accdcc900/medium.jpg?1672851649</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/130/051/2753e50142e2f5b7089b165accdcc900/small.jpg?1672851649</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/130/051/2753e50142e2f5b7089b165accdcc900/xsmall.jpg?1672851649</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/130/051/2753e50142e2f5b7089b165accdcc900/xxsmall.jpg?1672851649</ThumbnailUrl>
<PawCount>7</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Fri, 06 Jan 2023 16:44:38 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="129969" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/129969">
<Title>Protecting your online account over Winter Break</Title>
<Body>
<![CDATA[
    <div class="html-content"><div>As we prepare for the winter break, we commonly see a surge in malicious activity toward user accounts. Users receive emails warning about unpaid invoices, expired passwords, or full inboxes. These messages are made to convince people that they are in danger of losing money or access if they don't respond, or click a link within an email. Very often these messages will appear to come from someone you know, from a company you may have done business with, or in some cases, from what looks like your own account.</div><div> </div><div>Other common phishing messages recently have included invoices from companies like PayPal or GeekSquad saying they will be charging your credit card if you don't click a link. These messages are fake. </div><div> </div><div>We have some FAQs available on how to identify phishing/spam messages you can look at below.</div><div> </div><div><a href="https://itsecurity.umbc.edu/cyber-awareness/spam-and-phishing-faqs/" rel="nofollow external" class="bo">UMBC Phishing and Spam FAQs</a></div><div> </div><div>As well as some best practices for keeping your account secure:</div><div><a href="https://itsecurity.umbc.edu/cyber-awareness/" rel="nofollow external" class="bo">Cybersecurity Awareness – Security - UMBC</a></div><div> </div><div>If you receive any messages like this, please forward them to <a href="mailto:security@umbc.edu">security@umbc.edu</a> along with the email headers. For instructions on forwarding email headers, please visit: <a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo">How do I forward full email headers? - Find Help (FAQs) - UMBC</a>.</div></div>
]]>
</Body>
<Summary>As we prepare for the winter break, we commonly see a surge in malicious activity toward user accounts. Users receive emails warning about unpaid invoices, expired passwords, or full inboxes....</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/129969/guest@my.umbc.edu/15fdd505c7dd0a1313df3c60b40055b7/api/pixel</TrackingUrl>
<Tag>learn</Tag>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776441867</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1776441867</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776441867</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1776441867</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776441867</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/129/969/f94c5a86b59201fa4ce2411213f40d01/xxlarge.jpg?1671734441</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/129/969/f94c5a86b59201fa4ce2411213f40d01/xlarge.jpg?1671734441</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/129/969/f94c5a86b59201fa4ce2411213f40d01/large.jpg?1671734441</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/129/969/f94c5a86b59201fa4ce2411213f40d01/medium.jpg?1671734441</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/129/969/f94c5a86b59201fa4ce2411213f40d01/small.jpg?1671734441</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/129/969/f94c5a86b59201fa4ce2411213f40d01/xsmall.jpg?1671734441</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/129/969/f94c5a86b59201fa4ce2411213f40d01/xxsmall.jpg?1671734441</ThumbnailUrl>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 22 Dec 2022 13:44:11 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="128602" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/128602">
<Title>Account Data Breach: Twitter</Title>
<Tagline>Hackers list database of 5.4 million records for sale</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><span>In January 2022, a vulnerability in Twitter's platform allowed an attacker to build a database of email addresses and phone numbers of millions of users of the social platform. In a disclosure notice later shared in August 2022, Twitter advised that the vulnerability was related to a bug introduced in June 2021 and that they are directly notifying impacted customers. The impacted data included either email address or phone number alongside other public information including username, display name, bio, location, and profile photo. The data, which included the information on 5.4 million accounts, was posted for sale with an asking price of more than $30,000.</span></div><div><span><br></span></div><div><span>Of the accounts listed, approximately 56 UMBC accounts were indicated in this potential breach. The victims are being notified via their UMBC emails. If you have an account with Twitter, please contact them to see if you have been affected by this breach.</span></div><div><span><br></span></div><div><span>More information on the Twitter potential breach (and subsequent extortion attempts) can be seen at an article from Bleeping Computer: <a href="https://www.bleepingcomputer.com/news/security/twitter-confirms-zero-day-used-to-expose-data-of-54-million-accounts/">https://www.bleepingcomputer.com/news/security/twitter-confirms-zero-day-used-to-expose-data-of-54-million-accounts/</a></span></div><div><span><br></span></div><div><span>If you have any questions or concerns, please email us at <a href="mailto:security@umbc.edu">security@umbc.edu</a>. Information about this potential breach was provided to us by Have I Been Pwned (HIBP): <a href="https://haveibeenpwned.com">https://haveibeenpwned.com</a>.</span></div><hr><div><span>Receive any suspicious emails?</span></div><div><span><br></span></div><div><span>Forward it to <a href="mailto:security@umbc.edu">security@umbc.edu</a> along with the email headers. For instructions, visit: <a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970">https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</a>.</span></div><div><span><br></span></div><div><span>Follow us on <a href="myUMBC:https://my3.my.umbc.edu/groups/itsecurity">myUMBC:https://my3.my.umbc.edu/groups/itsecurity</a>.</span></div></div>
]]>
</Body>
<Summary>In January 2022, a vulnerability in Twitter's platform allowed an attacker to build a database of email addresses and phone numbers of millions of users of the social platform. In a disclosure...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/128602/guest@my.umbc.edu/8677200beb2ca3005a4d2000ae48c886/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776441867</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1776441867</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776441867</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1776441867</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776441867</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/602/1580743208a1d7a22b65875c78ca84ba/xxlarge.jpg?1666206795</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/602/1580743208a1d7a22b65875c78ca84ba/xlarge.jpg?1666206795</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/602/1580743208a1d7a22b65875c78ca84ba/large.jpg?1666206795</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/602/1580743208a1d7a22b65875c78ca84ba/medium.jpg?1666206795</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/602/1580743208a1d7a22b65875c78ca84ba/small.jpg?1666206795</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/602/1580743208a1d7a22b65875c78ca84ba/xsmall.jpg?1666206795</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/602/1580743208a1d7a22b65875c78ca84ba/xxsmall.jpg?1666206795</ThumbnailUrl>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Wed, 19 Oct 2022 15:23:27 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="128572" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/128572">
<Title>Account Data Breach: StripChat</Title>
<Tagline>Millions of records exposed from an adult cam site</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><span>In November 2021, the live sex cams and adult chat website StripChat left several databases exposed and unsecured. In June the following year, over 65 million StripChat records appeared on a popular hacking forum. The exposed data included usernames, email addresses and IP addresses, biographical data, transaction data, and chat messages.</span></div><div><span><br></span></div><div><span>Of the accounts listed, approximately four UMBC accounts were indicated in this potential breach. The victims have been notified via their UMBC email. If you have an account with Stripchat, please contact them to see if you have been affected by this breach.</span></div><div><span><br></span></div><div><span>More information on the StripChat breach (and subsequent extortion attempts) can be seen at an article from The Record: <a href="https://therecord.media/adult-cam-site-stripchat-exposes-the-data-of-millions-of-users-and-cam-models/">https://therecord.media/adult-cam-site-stripchat-exposes-the-data-of-millions-of-users-and-cam-models/</a></span></div><div><span><br></span></div><div><span>If you have any questions or concerns, please email us at <a href="mailto:security@umbc.edu">security@umbc.edu</a>. Information about this potential breach was provided to us by Have I Been Pwned (HIBP): <a href="https://haveibeenpwned.com">https://haveibeenpwned.com</a>.</span></div><hr><div><span>Receive any suspicious emails?</span></div><div><span><br></span></div><div><span>Forward it to <a href="mailto:security@umbc.edu">security@umbc.edu</a> along with the email headers. For instructions, visit: <a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970">https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</a>.</span></div><div><span><br></span></div><div><span>Follow us on <a href="myUMBC:https://my3.my.umbc.edu/groups/itsecurity">myUMBC:https://my3.my.umbc.edu/groups/itsecurity</a>.</span></div></div>
]]>
</Body>
<Summary>In November 2021, the live sex cams and adult chat website StripChat left several databases exposed and unsecured. In June the following year, over 65 million StripChat records appeared on a...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/128572/guest@my.umbc.edu/2c8176cd85861b131b7c89fc52a2808c/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776441867</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1776441867</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776441867</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1776441867</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776441867</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/572/69c8124eec2f7e45217a63461dcbfa5b/xxlarge.jpg?1666205828</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/572/69c8124eec2f7e45217a63461dcbfa5b/xlarge.jpg?1666205828</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/572/69c8124eec2f7e45217a63461dcbfa5b/large.jpg?1666205828</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/572/69c8124eec2f7e45217a63461dcbfa5b/medium.jpg?1666205828</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/572/69c8124eec2f7e45217a63461dcbfa5b/small.jpg?1666205828</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/572/69c8124eec2f7e45217a63461dcbfa5b/xsmall.jpg?1666205828</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/572/69c8124eec2f7e45217a63461dcbfa5b/xxsmall.jpg?1666205828</ThumbnailUrl>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Wed, 19 Oct 2022 15:03:55 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="128571" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/128571">
<Title>Account Data Breach: SitePoint</Title>
<Tagline>Shared data has already been used in attacks</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><span>In June 2020, the web development site SitePoint suffered a data breach that exposed over one million customer records. Impacted data included email and IP addresses, names, usernames, bios and passwords stored as bcrypt hashes.</span></div><div><span><br></span></div><div><span>Of the accounts listed, approximately 17 UMBC accounts were indicated in this potential breach. The victims are being notified via their UMBC emails. If you have an account with SitePoint, please contact them to see if you have been affected by this breach.</span></div><div><span><br></span></div><div><span>More information on the SitePoint breach (and subsequent extortion attempts) can be seen at an article from Bleeping Computer: <a href="https://www.bleepingcomputer.com/news/security/sitepoint-discloses-data-breach-after-stolen-info-used-in-attacks/">https://www.bleepingcomputer.com/news/security/sitepoint-discloses-data-breach-after-stolen-info-used-in-attacks/</a></span></div><div><span><br></span></div><div><span>If you have any questions or concerns, please email us at <a href="mailto:security@umbc.edu">security@umbc.edu</a>. Information about this potential breach was provided to us by Have I Been Pwned (HIBP): <a href="https://haveibeenpwned.com">https://haveibeenpwned.com</a>.</span></div><hr><div><span>Receive any suspicious emails?</span></div><div><span><br></span></div><div><span>Forward it to <a href="mailto:security@umbc.edu">security@umbc.edu</a> along with the email headers. For instructions, visit: <a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970">https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</a>.</span></div><div><span><br></span></div><div><span>Follow us on <a href="myUMBC:https://my3.my.umbc.edu/groups/itsecurity">myUMBC:https://my3.my.umbc.edu/groups/itsecurity</a>.</span></div></div>
]]>
</Body>
<Summary>In June 2020, the web development site SitePoint suffered a data breach that exposed over one million customer records. Impacted data included email and IP addresses, names, usernames, bios and...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/128571/guest@my.umbc.edu/795f9cd5dc641de3a61d52cc85b0b462/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776441867</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1776441867</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776441867</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1776441867</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776441867</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/571/a3d41bd8ce327f90ec607b0e48c625c7/xxlarge.jpg?1666123306</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/571/a3d41bd8ce327f90ec607b0e48c625c7/xlarge.jpg?1666123306</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/571/a3d41bd8ce327f90ec607b0e48c625c7/large.jpg?1666123306</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/571/a3d41bd8ce327f90ec607b0e48c625c7/medium.jpg?1666123306</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/571/a3d41bd8ce327f90ec607b0e48c625c7/small.jpg?1666123306</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/571/a3d41bd8ce327f90ec607b0e48c625c7/xsmall.jpg?1666123306</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/571/a3d41bd8ce327f90ec607b0e48c625c7/xxsmall.jpg?1666123306</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 18 Oct 2022 16:05:01 -0400</PostedAt>
<EditAt>Tue, 18 Oct 2022 16:06:35 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="128570" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/128570">
<Title>Account Data Breach: ShitExpress</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><span>In August 2022, the online feces delivery service ShitExpress suffered a data breach that exposed 24,000 unique email addresses. The addresses spanned invoices, gift cards, promotions and PayPal records. The breach also exposed the IP and email addresses of senders, physical addresses of recipients and messages accompanying the delivery.</span></div><div><span><br></span></div><div><span>Of the accounts listed, approximately 1 UMBC account was indicated in this potential breach. The victim has been notified via their UMBC email. If you have an account with ShitExpress, please contact them to see if you have been affected by this breach.</span></div><div><br></div><div><span>More information on the ShitExpress breach (and subsequent extortion attempts) can be seen at an article from Bleeping Computer: <a href="https://www.bleepingcomputer.com/news/security/anonymous-poop-gifting-site-hacked-customers-exposed/">https://www.bleepingcomputer.com/news/security/anonymous-poop-gifting-site-hacked-customers-exposed/</a></span></div><div><span><br></span></div><div><span>If you have any questions or concerns, please email us at <a href="mailto:security@umbc.edu">security@umbc.edu</a>. Information about this potential breach was provided to us by Have I Been Pwned (HIBP): <a href="https://haveibeenpwned.com">https://haveibeenpwned.com</a>.</span></div><hr><div><span>Receive any suspicious emails?</span></div><div><span><br></span></div><div><span>Forward it to <a href="mailto:security@umbc.edu">security@umbc.edu</a> along with the email headers. For instructions, visit: <a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970">https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</a>.</span></div><div><span><br></span></div><div><span>Follow us on <a href="myUMBC:https://my3.my.umbc.edu/groups/itsecurity">myUMBC:https://my3.my.umbc.edu/groups/itsecurity</a>.</span></div></div>
]]>
</Body>
<Summary>In August 2022, the online feces delivery service ShitExpress suffered a data breach that exposed 24,000 unique email addresses. The addresses spanned invoices, gift cards, promotions and PayPal...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/128570/guest@my.umbc.edu/09c712d944d2120df4286fdcca0cbe26/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776441867</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1776441867</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776441867</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1776441867</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776441867</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/570/819f6c8c98a519c3f3d7377a5bc548d9/xxlarge.jpg?1666122450</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/570/819f6c8c98a519c3f3d7377a5bc548d9/xlarge.jpg?1666122450</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/570/819f6c8c98a519c3f3d7377a5bc548d9/large.jpg?1666122450</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/570/819f6c8c98a519c3f3d7377a5bc548d9/medium.jpg?1666122450</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/570/819f6c8c98a519c3f3d7377a5bc548d9/small.jpg?1666122450</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/570/819f6c8c98a519c3f3d7377a5bc548d9/xsmall.jpg?1666122450</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/128/570/819f6c8c98a519c3f3d7377a5bc548d9/xxsmall.jpg?1666122450</ThumbnailUrl>
<PawCount>36</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 18 Oct 2022 15:57:00 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="128454" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/128454">
<Title>Fraud Alert: "TASK: Thursday, Oct. 13TH"</Title>
<Tagline>Fraudster Impersonating UMBC Officials</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>This morning, the Division of Information Technology(DoIT) received a report of fraudulent emails sent to the University System of Maryland office.. The fraudster is forging the name of UMBC President Sheares Ashby, probably in an attempt to get the recipient to purchase gift cards on the fraudster’s behalf.  Below is an example of the email. For privacy, we removed the To field.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From:</span><span> Valerie Sheares Ashby &lt;<a href="mailto:executivedir808@gmail.com">executivedir808@gmail.com</a>&gt;</span></p><p><span>Sent:</span><span> Thursday, October 13, 2022 6:35 AM</span></p><p><span>To:</span><span> </span></p><p><span>Subject:</span><span> TASK: Thursday, Oct. 13TH</span></p><p><span> </span></p><p> </p><p><span>Good Morning,</span></p><p> </p><p><span>Is your schedule open? I'll need you to run an errand for me. I'm heading into a meeting with limited communication access soon, so just reply to me via email.</span></p><p> </p><p> </p><p><span>Sincerely,</span></p><p> </p><p><span>Valerie Sheares Ashby</span></p><p> </p><br></td></tr></tbody></table></div><br><br><p><span>A slightly different version appeared in some UMBC inboxes, this one pretending to be from Vice Provost and Dean Rutedge.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From:</span><span> Janet Rutledge &lt;<a href="mailto:executivedir808@gmail.com">executivedir808@gmail.com</a>&gt;</span></p><p><span>Sent:</span><span> Thursday, October 13, 2022 6:35 AM</span></p><p><span>To:</span><span> </span></p><p><span>Subject:</span><span> TASK: Thursday, Oct. 13TH</span></p><p><span> </span></p><p> </p><p><span>Good Morning,</span></p><p> </p><p><span>Is your schedule open? I'll need you to run an errand for me. I'm heading into a meeting with limited communication access soon, so just reply to me via email.</span></p><p> </p><p> </p><p><span>Sincerely,</span></p><p> </p><p><span>Janet Rutledge</span></p><p> </p><br></td></tr></tbody></table></div><br><br><br><p><span>THIS REQUEST IS NOT REAL!</span><span> </span></p><ul><li><p><span>This is a common scam to get the recipient to purchase gift cards or something else of value that can be sent through email.</span></p></li><li><p><span>Whatever you spend, you will not get back.</span></p></li></ul><br><br><p><span>If you have responded to the message and performed any errands such as purchasing gift cards, please do not send the codes to </span><a href="mailto:executivedir808@gmail.com" rel="nofollow external" class="bo"><span>executivedir808@gmail.com</span></a><span>.  </span></p><br><p><span>If you have received any message similar to the one listed above, please forward it with its headers to</span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. For instructions, visit </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>If you need further assistance, please contact us at </span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><p><span>__________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity.</span></a></p><br><br></div>
]]>
</Body>
<Summary>This morning, the Division of Information Technology(DoIT) received a report of fraudulent emails sent to the University System of Maryland office.. The fraudster is forging the name of UMBC...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/128454/guest@my.umbc.edu/0024f186aafc0459f398cecaaa363518/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776441867</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1776441867</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776441867</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1776441867</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776441867</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 13 Oct 2022 11:49:42 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="128276" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/128276">
<Title>Job Scam Posting</Title>
<Tagline>Another Scam</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><br><div>On October 4, 2022, a job offer was posted in at least one group on the MyUMBC site.  The job offer was supposedly from Prof. Erika Fountain for "Administrative Assistants".  This posting was an error and has been taken down.  The job does not exist.  Prof. Fountain did not post it. In the posting below, note that the phone number is not a UMBC office phone number. The number referenced has a 612 area code (<span>Minneapolis, Minnesota</span>).</div><div><br></div><span><span><img src="https://lh5.googleusercontent.com/cMtmF9MPiEdXCsCE_MRiQDU4icq1klC2tE1A__BLo9IB5JJhZ8-DvgX0NBBcXmlPtCFMrJvl9n0FsNmH5ngWqo3aAbP0ovjkIJRA0JchngP7hX71t8ux8F31flmodlBY59Kmj2G_4sMOJUhhyW8OaqxVyc0PJt0cZ9kVKNZPfc_-E8BJOlT6Og3oug" width="624" height="429" style="max-width: 100%; height: auto;"></span></span><div>Again, <strong>THIS IS A SCAM.</strong></div><div><strong><br></strong></div><div><strong>__________________________________________________________<br><br></strong>Receive any suspicious emails?<br><br>Forward it to <a href="mailto:security@umbc.edu">security@umbc.edu</a> along with the email headers. For instructions, visit <a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970">https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</a>.<br><br>Follow us on myUMBC. <a href="https://my3.my.umbc.edu/groups/itsecurity">https://my3.my.umbc.edu/groups/itsecurity</a>.<strong><br></strong></div></div>
]]>
</Body>
<Summary>On October 4, 2022, a job offer was posted in at least one group on the MyUMBC site.  The job offer was supposedly from Prof. Erika Fountain for "Administrative Assistants".  This posting was an...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/128276/guest@my.umbc.edu/e31193d09d1bbf7085f5f9ba8551a95b/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776441867</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1776441867</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776441867</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1776441867</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776441867</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 06 Oct 2022 19:21:26 -0400</PostedAt>
<EditAt>Thu, 06 Oct 2022 19:30:59 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="128248" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/128248">
<Title>Phishing Alert: Final Update Warning!</Title>
<Tagline>They Want Your Password</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><br><p><span>Recently, the Division of Information Technology (DoIT) received a report of a phishing email that appeared to be crafted to attack users in the Computer Science department. The phishers are trying to capture, at least, your UMBC password.. The  Below is an example of the email. For privacy purposes, we removed the To field.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span><span><img src="https://lh4.googleusercontent.com/EUWuWTYfLle3k7hmaGtxPerCTkoVMqT9cwOUpbmmuyH3cBhlVc9bgtf51pjdre_aoAsa7ispn2P6jQ6PJcv8H8dd-706m1J7aE4jFceuYC777Ex_MAGvpvsVfHzBtPABFz6ylua8yMTHFIZ5y8IwTUTWmlEzoftEK0NwS2qiDqQsmoL-ha_Km9YuAA" width="610" height="265" style="max-width: 100%; height: auto;"></span></span></p><p> </p><br></td></tr></tbody></table></div><br><p><span>THIS WARNING IS NOT REAL!</span><span> </span></p><ul><li><p><span>DoIT will not ask you to “confirm your ownership” of your email account.  If we ask you to change your password, we will direct you to my.umbc.edu or to webauth.umbc.edu, not to a non-UMBC site.</span></p></li><li><p><span>Saying that “This message is from a trusted sen der” should make you suspicious from the start.  If someone walked up to you in the street and, instead of introducing themselves by name, simply told you that they were trusted, would you be comfortable?</span></p></li><li><p><span>Whoever wrote this seems to think that “sender” is two words.</span></p></li></ul><p><span> </span></p><br><br><p><span>PLEASE DO </span><span>NOT</span><span> CLICK THE LINK!</span></p><br><p><span>If you have already clicked the link and entered your password:</span></p><ul><li><p><span>If you entered your UMBC password on the form, please change your password </span><span>immediately</span><span>.</span></p></li><li><p><span>If you entered your UMBC password and you used that same password for any other account(s) (e.g. Social Media, Online Banking, etc.), change the passwords on the account(s) </span><span>immediately.</span></p></li><li><p><span>If you entered banking, credit card, or other information, please contact your bank or other financial institution </span><span>immediately</span><span> and report what happened.</span></p></li><li><p><span>If you entered personal information such as your address, phone number, etc., monitor your finances and be very careful about responding to suspicious phone calls, mail, text messages, etc.</span></p></li></ul><br><p><span>If you have received any message similar to the one listed above, please forward it with its headers to</span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. For instructions, visit </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>If you need further assistance, please contact us at </span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><p><span>__________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity.</span></a></p></div>
]]>
</Body>
<Summary>Recently, the Division of Information Technology (DoIT) received a report of a phishing email that appeared to be crafted to attack users in the Computer Science department. The phishers are...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/128248/guest@my.umbc.edu/9e2c28a610ce68b50692936d454c0c14/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776441867</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1776441867</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776441867</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1776441867</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776441867</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 06 Oct 2022 12:02:15 -0400</PostedAt>
</NewsItem>

</News>
