<?xml version="1.0"?>
<News hasArchived="false" page="1" pageCount="1" pageSize="10" timestamp="Sun, 19 Apr 2026 09:28:17 -0400" url="https://beta.my.umbc.edu/groups/itsecurity/posts.xml?tag=phishing">
<NewsItem contentIssues="false" id="152263" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/152263">
<Title>Important Notice: Phishing Campaign via Google Calendar Invites</Title>
<Body>
<![CDATA[
    <div class="html-content"><span><p><span>Dear UMBC Community,</span></p><p><span>DoIT has recently been made aware of a new phishing campaign through Google Calendar. In this scheme, attackers send fraudulent calendar invites that automatically appear on your calendar. These invites often contain messages about fake cryptocurrency invoices and attempt to trick you into clicking links or calling a phone number.</span></p><p><span>Examples of these malicious invites are included below for your reference.</span></p><p><span>If you see a suspicious item on your calendar:</span></p><ul><li><p><span><strong>Do not</strong></span><span><strong> click</strong> on any links, open any attachments or call any phone numbers</span></p></li><li><p><span><strong>Immediately report </strong></span><span>the invite to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span><strong>security@umbc.edu</strong></span></a></p></li><li><p><strong><span>Remove </span><span>the invite</span></strong><span> from your calendar using the Trash Can button</span></p></li></ul><p><span>It’s important to note that simply receiving one of these invites does </span><span><strong>NOT</strong></span><span> mean your account has been compromised. By default, Google Calendar automatically adds invitations from anyone.</span></p><br><p><span>To reduce the chance of receiving unwanted invites in the future, you can also update your individual Google Calendar Event Settings to restrict which invitations are added by adjusting the "Add invitations to my calendar" setting. (See Below)</span></p><p><span><img src="https://my3.my.umbc.edu/groups/itsecurity/posts/152263/attachments/58560" alt="Screenshot of the Google Calendar settings showing the Event Details menu selected and the option for Add Invites to my Calendar visible" style="max-width: 100%; height: auto;"></span></p><p><span>For more information about this setting, please refer to </span><a href="https://support.google.com/calendar/answer/13159188?sjid=9213646357382027005-NA" rel="nofollow external" class="bo"><span>https://support.google.com/calendar/answer/13159188?sjid=9213646357382027005-NA</span></a><span>.</span></p><p><span>Thank you all for your continued awareness and assistance in keeping our community secure.</span><span><br></span><span><br></span><em><span>UMBC Division of Information Technology (DoIT)</span><span><br></span><span>Cybersecurity Assurance and Digital Trust</span></em></p><br><br><br>Example One:</span><div><img src="https://my3.my.umbc.edu/groups/itsecurity/posts/152263/attachments/58561" alt="Example of a Crypto Purchase Order calendar invite" style="max-width: 100%; height: auto;"><span><span>Example Two:</span></span></div><div><img src="https://my3.my.umbc.edu/groups/itsecurity/posts/152263/attachments/58562" alt="Example of an Invoice &amp; Order Details calendar invite" style="max-width: 100%; height: auto;"></div></div>
]]>
</Body>
<Summary>Dear UMBC Community,  DoIT has recently been made aware of a new phishing campaign through Google Calendar. In this scheme, attackers send fraudulent calendar invites that automatically appear on...</Summary>
<AttachmentKind>Photo</AttachmentKind>
<AttachmentUrl>https://assets1-beta.my.umbc.edu/system/shared/attachments/914021432b2c03ea34c37961aa8774ae/69e4d871/news/000/152/263/ba44b9abb1a0331c5d134bafb71f993f/image3.png?1757450404</AttachmentUrl>
<Attachments>
<Attachment kind="Photo" url="https://beta.my.umbc.edu/groups/itsecurity/posts/152263/attachments/58560"></Attachment>
<Attachment kind="Photo" url="https://beta.my.umbc.edu/groups/itsecurity/posts/152263/attachments/58561"></Attachment>
<Attachment kind="Photo" url="https://beta.my.umbc.edu/groups/itsecurity/posts/152263/attachments/58562"></Attachment>
</Attachments>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/152263/guest@my.umbc.edu/28d750f4f998a147f4a4652d12316ee1/api/pixel</TrackingUrl>
<Tag>cyber-awareness</Tag>
<Tag>phishing</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776441867</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1776441867</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776441867</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1776441867</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776441867</AvatarUrl>
<Sponsor>IT Security - DoIT Cybersecurity Assurance and Digital Trust</Sponsor>
<PawCount>5</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 09 Sep 2025 16:34:17 -0400</PostedAt>
<EditAt>Tue, 09 Sep 2025 16:48:10 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="151677" important="true" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/151677">
<Title>Account Verification Emails</Title>
<Tagline>They are phishing!</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div>Hello UMBC Community,</div><div><br></div><div>As we approach the Fall Semester, the Division of Information Technology (DoIT) has observed an increase in phishing attempts targeting the UMBC community. While we are doing our best to stay on top of these emails, we need your support.</div><div><br></div><div>Please do not enter your myUMBC password or your DUO code into Google or Monday Forms. DoIT does not need your password to validate your account, nor are we deactivating accounts. If you encounter either of these campaigns in your mailbox, please forward the email to <a href="mailto:security@umbc.edu">security@umbc.edu</a> or click the menu with the three dots to “Report Phishing.” This will allow the team to quickly quarantine the message and protect other community members.</div><div><br></div><div>Thank you for your support! </div><div><br></div></div>
]]>
</Body>
<Summary>Hello UMBC Community,     As we approach the Fall Semester, the Division of Information Technology (DoIT) has observed an increase in phishing attempts targeting the UMBC community. While we are...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/151677/guest@my.umbc.edu/16e2ada2cdc4de936d60adeccbb6b100/api/pixel</TrackingUrl>
<Tag>phishing</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776441867</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1776441867</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776441867</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1776441867</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776441867</AvatarUrl>
<Sponsor>IT Security - DoIT Cybersecurity Assurance and Digital Trust</Sponsor>
<PawCount>7</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Fri, 22 Aug 2025 17:11:16 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="150919" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/150919">
<Title>Thank you for being part of UMBC (Phishing Edition)</Title>
<Tagline>We are glad you are here, but we don't want your password</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div>DoIT is aware of an ongoing phishing campaign targeting faculty and staff. The message arrives in users' inboxes appearing to be a document shared from Google. Within the document there is a link that masquerades as personalized compensation statement, but is actually a form attempting to collect your myUMBC credentials and DUO codes. <div><strong><br></strong></div><div><strong>This email is phishing. Please do not enter your myUMBC password or DUO codes on web forms.</strong> </div><div><br></div><div>We are working to quarantine the messages and scramble passwords for any account that may have been compromised as a result of the phish. We are asking for your continued diligence as the holiday may affect our ability to get the form taken down. Please do not provide your password or DUO codes on web forms, and forward suspicious messages to <a href="mailto:security@umbc.edu">security@umbc.edu</a>.</div><div><br></div><div>If you did provide your password or DUO code, please change your password and reach out to us at <a href="mailto:security@umbc.edu">security@umbc.edu</a> as soon as possible. Instructions on how to change your password can be found here: <a href="https://umbc.atlassian.net/wiki/spaces/faq/pages/30736465/How+do+I+change+my+myUMBC+password">https://umbc.atlassian.net/wiki/spaces/faq/pages/30736465/How+do+I+change+my+myUMBC+password</a></div><div><br></div><div>Thanks again and hope everyone has a Happy 4th of July!!</div></div><img src="https://my3.my.umbc.edu/groups/itsecurity/posts/150919/attachments/57623" alt="Screenshot of the phishing form thanking the recipient for being a part of UMBC. The screenshot has a link that says View Your Statement." style="max-width: 100%; height: auto;"><br></div>
]]>
</Body>
<Summary>DoIT is aware of an ongoing phishing campaign targeting faculty and staff. The message arrives in users' inboxes appearing to be a document shared from Google. Within the document there is a link...</Summary>
<AttachmentKind>Image</AttachmentKind>
<AttachmentUrl>https://assets4-beta.my.umbc.edu/system/shared/attachments/916ffa5e774b9bb356a46e016fcb2df1/69e4d871/news/000/150/919/329995168de8869ce0d6c4083026d5b0/Image 7-4-25 at 2.15&#8239;PM.jpeg?1751654219</AttachmentUrl>
<Attachments>
<Attachment kind="Image" url="https://beta.my.umbc.edu/groups/itsecurity/posts/150919/attachments/57623"></Attachment>
<Attachment kind="Image" url="https://beta.my.umbc.edu/groups/itsecurity/posts/150919/attachments/57624"></Attachment>
</Attachments>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/150919/guest@my.umbc.edu/16abf47e19323bf92f08a8d5fb327af4/api/pixel</TrackingUrl>
<Tag>phishing</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776441867</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1776441867</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776441867</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1776441867</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776441867</AvatarUrl>
<Sponsor>IT Security - DoIT Cybersecurity Assurance and Digital Trust</Sponsor>
<PawCount>15</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Fri, 04 Jul 2025 14:43:01 -0400</PostedAt>
<EditAt>Fri, 04 Jul 2025 14:48:10 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="147565" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/147565">
<Title>Beware of PayPal "New Address" Emails</Title>
<Tagline>New approach (to phishing). Same goal.</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><p>Cyberattackers constantly evolve their tactics to bypass organizational defenses.  A recent trend involves exploiting PayPal's gift address feature to deliver phishing messages.  These messages may include a fake support number to trick recipients into calling or malicious links designed to steal account credentials.  In either case, the attacker's goal is to compromise your PayPal account.</p><p>If you receive a PayPal notification about account changes or a sent invoice, <strong>do not</strong> click any links in the email. Instead, directly type the official PayPal URL into your web browser to ensure you're interacting with the legitimate PayPal website, not a fraudulent copy.</p></div>To learn more about this new method of attack: <a href="https://www.bleepingcomputer.com/news/security/beware-paypal-new-address-feature-abused-to-send-phishing-emails/" rel="nofollow external" class="bo">https://www.bleepingcomputer.com/news/security/beware-paypal-new-address-feature-abused-to-send-phishing-emails/</a></div>
]]>
</Body>
<Summary>Cyberattackers constantly evolve their tactics to bypass organizational defenses.  A recent trend involves exploiting PayPal's gift address feature to deliver phishing messages.  These messages...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/147565/guest@my.umbc.edu/2b59018686410f6eb3b93de02b62bc12/api/pixel</TrackingUrl>
<Tag>phishing</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776441867</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1776441867</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776441867</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1776441867</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776441867</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Mon, 24 Feb 2025 09:09:35 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="147530" important="false" status="posted" url="https://beta.my.umbc.edu/groups/itsecurity/posts/147530">
<Title>Financial Aid and Job Offers Email</Title>
<Tagline>It seemed phishy because it was!</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div>This morning, several individuals received a phishing email disguised as a job opportunity. We want to thank everyone who reported it. Your reports allow us to take immediate action to protect others.</div><div><br></div><div>If you receive a suspicious email, please report it. Google provides the ability to report phishing in your web browser by clicking the three vertical dots next to the email sent date and selecting "Report Phishing." You can also forward the email to <a href="mailto:security@umbc.edu">security@umbc.edu</a>. Both options create a ticket for our team.</div><div><br></div><div>Phishing is the use of deception to obtain sensitive information. In this case, the email attempted to collect your personal information. There were a couple of red flags that make it clear it is phishing:</div><div><ol><li>The email claimed to be from the Career Center but was sent from a personal Gmail address (not @umbc.edu).</li><li>The link to the UMBC application portal redirected you to a Google Form, not UMBC's official portals.</li><li>The Google Form was asking for personal information.</li><li>The email requested that replies be sent to a personal Gmail address instead of the Career Center's UMBC email address.</li></ol></div><div><img src="https://my3.my.umbc.edu/groups/itsecurity/posts/147530/attachments/55666" style="max-width: 100%; height: auto;"></div><div><br></div><div>Thank you again to all who reported the phish!</div></div>
]]>
</Body>
<Summary>This morning, several individuals received a phishing email disguised as a job opportunity. We want to thank everyone who reported it. Your reports allow us to take immediate action to protect...</Summary>
<AttachmentKind>Image</AttachmentKind>
<AttachmentUrl>https://assets2-beta.my.umbc.edu/system/shared/attachments/852d377b14e28bee32eca4079459f7ec/69e4d871/news/000/147/530/47b6ed0b6b6824c8dc892e2e48b462f9/Phishy Email.png?1740148103</AttachmentUrl>
<Attachments>
<Attachment kind="Image" url="https://beta.my.umbc.edu/groups/itsecurity/posts/147530/attachments/55666"></Attachment>
</Attachments>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/147530/guest@my.umbc.edu/0b9728621d8f27afc862cd897158196f/api/pixel</TrackingUrl>
<Tag>phishing</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776441867</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776441867</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1776441867</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776441867</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1776441867</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776441867</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776441867</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>7</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Fri, 21 Feb 2025 09:37:54 -0500</PostedAt>
<EditAt>Fri, 21 Feb 2025 09:38:22 -0500</EditAt>
</NewsItem>

</News>
