<?xml version="1.0"?>
<News hasArchived="false" page="14" pageCount="21" pageSize="10" timestamp="Tue, 28 Apr 2026 14:53:44 -0400" url="https://dev.my.umbc.edu/groups/doit/posts.xml?page=14&amp;tag=notice">
  <NewsItem contentIssues="false" id="95089" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/95089">
    <Title>Account data breach: Drizly</Title>
    <Tagline>Credentials Breach Report</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>In July 2020, an online alcohol delivery service, Drizly, suffered a data breach. This breach contained 2.5 million customers data that was sold online, and then posted on a hacking forum. The customer information includes names, email addresses, IP addresses, physical addresses, date of birth, phone numbers, and passwords. No financial information was leaked.</span></p><br><p><span>106 UMBC accounts were victims of this breach. The victims are being notified via their UMBC emails and/or their alternate emails. If you have a Drizly account, please contact them to see if you have been affected by this breach. To see if you were involved in any other breach visit: </span><a href="https://haveibeenpwned.com/" rel="nofollow external" class="bo"><span>https://haveibeenpwned.com/</span></a><span>.</span></p><br><br><p><span>More about Drizly data breach:</span></p><p><a href="https://techcrunch.com/2020/07/28/drizly-data-breach/" rel="nofollow external" class="bo"><span>https://techcrunch.com/2020/07/28/drizly-data-breach/</span></a></p><br><p><a href="https://www.forbes.com/sites/katedingwall/2020/07/29/alcohol-e-commerce-giant-drizly-hit-with-huge-data-breach/#63b0d40b5a96" rel="nofollow external" class="bo"><span>https://www.forbes.com/sites/katedingwall/2020/07/29/alcohol-e-commerce-giant-drizly-hit-with-huge-data-breach/#63b0d40b5a96</span></a></p><br><p><span>If you have any questions or concerns email us: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> </span></p><br><p><span>Information about this breach was provided to us by Have I Been Pwned(HIBP). </span></p><p> </p><p><span>_____________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><p> </p><p><span>Need to set up a recovery email for your UMBC account?</span></p><p><span>Follow the instructions here: </span><a href="https://my3.my.umbc.edu/groups/itsecurity/posts/94776" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity/posts/94776</span></a></p><br><span>Follow us on myUMBC</span><span>:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></div>
      ]]>
    </Body>
    <Summary>In July 2020, an online alcohol delivery service, Drizly, suffered a data breach. This breach contained 2.5 million customers data that was sold online, and then posted on a hacking forum. The...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/95089/guest@my.umbc.edu/89316cd852a70895cf563be575901740/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Mon, 24 Aug 2020 12:27:41 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="95088" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/95088">
    <Title>Account Data Breach: Havenly</Title>
    <Tagline>Credentials Breach Report</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>In June 2020, Havenly, an interior design website, suffered a data breach. Approximately 1.4 million members' personal information was exposed. This data includes names, email, phone numbers, addresses and passwords stored as SHA-1 hashes. This information was shared on an online hacking community. </span></p><br><p><span>28 UMBC accounts were affected by this breach. The victims have been notified via their UMBC emails and/or their alternate emails. If you have a Havenly account, please contact them to see if you have been affected by this breach.</span></p><br><p><span>More about Heavenly data breach:</span></p><p><a href="https://www.bleepingcomputer.com/news/security/hacker-leaks-386-million-user-records-from-18-companies-for-free/" rel="nofollow external" class="bo"><span>https://www.bleepingcomputer.com/news/security/hacker-leaks-386-million-user-records-from-18-companies-for-free/</span></a><span> </span></p><br><p><span>If you have any questions or concerns email us: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> </span></p><br><p><span>Information about this breach was provided to us by Have I Been Pwned(HIBP).</span></p><br><p> </p><p><span>_____________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><p> </p><p><span>Need to set up a recovery email for your UMBC account?</span></p><p><span>Follow the instructions here: </span><a href="https://my3.my.umbc.edu/groups/itsecurity/posts/94776" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity/posts/94776</span></a></p><br><p><span>Follow us on myUMBC</span><span>:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></p></div>
      ]]>
    </Body>
    <Summary>In June 2020, Havenly, an interior design website, suffered a data breach. Approximately 1.4 million members' personal information was exposed. This data includes names, email, phone numbers,...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/95088/guest@my.umbc.edu/37cde20daa1e1e214e861b07e9f048a8/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Mon, 24 Aug 2020 12:25:16 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="95087" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/95087">
    <Title>Account Data Breach: Promo</Title>
    <Tagline>Credentials Breach Report</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>In June 2020, a marketing video creator website, Promo, suffered a data breach. 22 million users' personal information was leaked on an online hacking forum. This data includes names, email, gender, IP addresses and passwords stored as SHA-256 hashes. This information was shared on an online hacking community. </span></p><br><p><span>34 UMBC accounts were affected by this breach. The victims have been notified via their UMBC emails and/or their alternate emails. If you have a Promo account, please contact them to see if you have been affected by this breach. Also visit </span><a href="https://haveibeenpwned.com/" rel="nofollow external" class="bo"><span>https://haveibeenpwned.com/</span></a><span> to see if you were involved in any other breach.</span></p><br><p><span>More about Promo data breach:</span></p><p><a href="https://support.promo.com/en/articles/4276475-promo-data-breach-faq" rel="nofollow external" class="bo"><span>https://support.promo.com/en/articles/4276475-promo-data-breach-faq</span></a><span> </span></p><br><p><a href="https://www.bleepingcomputer.com/news/security/promocom-discloses-data-breach-after-22m-user-records-leaked-online/#:~:text=Promo.com%2C%20an%20Israeli-based%20marketing%20video%20creation%20site%2C%20has,networks%20such%20as%20Facebook%2C%20Instagram%2C%20Twitter%2C%20and%20LinkedIn." rel="nofollow external" class="bo"><span>https://www.bleepingcomputer.com/news/security/promocom-discloses-data-breach-after-22m-user-records-leaked-online/#:~:text=Promo.com%2C%20an%20Israeli-based%20marketing%20video%20creation%20site%2C%20has,networks%20such%20as%20Facebook%2C%20Instagram%2C%20Twitter%2C%20and%20LinkedIn.</span></a></p><br><br><p><span>If you have any questions or concerns email us: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> </span></p><br><p><span>Information about this breach was provided to us by Have I Been Pwned(HIBP). </span></p><p> </p><p><span>_____________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><p> </p><p><span>Need to set up a recovery email for your UMBC account?</span></p><p><span>Follow the instructions here: </span><a href="https://my3.my.umbc.edu/groups/itsecurity/posts/94776" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity/posts/94776</span></a></p><br><p><span>Follow us on myUMBC</span><span>:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></p></div>
      ]]>
    </Body>
    <Summary>In June 2020, a marketing video creator website, Promo, suffered a data breach. 22 million users' personal information was leaked on an online hacking forum. This data includes names, email,...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/95087/guest@my.umbc.edu/9b440e99fda3d256ddc3796c3a64a556/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Mon, 24 Aug 2020 12:24:27 -0400</PostedAt>
    <EditAt>Mon, 24 Aug 2020 12:25:39 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="95086" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/95086">
    <Title>Account Data breach: ProctorU</Title>
    <Tagline>Credentials Breach Report</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>In June 2020, ProctorU, an online examination service, suffered a data breach. Over 444K user records were exposed and posted to an online hacking community. These records contain names, emails, physical addresses, phone numbers and passwords.</span></p><br><p><span>36</span><span>UMBC accounts were affected by this breach. The victims have been notified via their UMBC emails and/or their alternate emails. If you have a ProctorU account, please contact them to see if you have been affected by this breach. To see if you were involved in any other breach visit: </span><a href="https://haveibeenpwned.com/" rel="nofollow external" class="bo"><span>https://haveibeenpwned.com/</span></a><span>.</span></p><br><p><span>More about ProctorU data breach:</span></p><p><a href="https://www.smh.com.au/national/hackers-hit-university-online-exam-tool-20200806-p55j6h.html" rel="nofollow external" class="bo"><span>https://www.smh.com.au/national/hackers-hit-university-online-exam-tool-20200806-p55j6h.html</span></a></p><br><p><a href="https://www.bleepingcomputer.com/news/security/proctoru-confirms-data-breach-after-database-leaked-online/" rel="nofollow external" class="bo"><span>https://www.bleepingcomputer.com/news/security/proctoru-confirms-data-breach-after-database-leaked-online/</span></a></p><br><p><span>If you have any questions or concerns email us: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> </span></p><br><p><span>Information about this breach was provided to us by Have I Been Pwned(HIBP). </span></p><p> </p><p><span>_____________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><p> </p><p><span>Need to set up a recovery email for your UMBC account?</span></p><p><span>Follow the instructions here: </span><a href="https://my3.my.umbc.edu/groups/itsecurity/posts/94776" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity/posts/94776</span></a></p><br><p><span>Follow us on myUMBC</span><span>:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></p></div>
      ]]>
    </Body>
    <Summary>In June 2020, ProctorU, an online examination service, suffered a data breach. Over 444K user records were exposed and posted to an online hacking community. These records contain names, emails,...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/95086/guest@my.umbc.edu/00f49b7a650a2111ae6eca31a0576d38/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Mon, 24 Aug 2020 12:21:59 -0400</PostedAt>
    <EditAt>Mon, 24 Aug 2020 12:26:02 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="95085" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/95085">
  <Title>Microsoft SharePoint Phishing Scam</Title>
  <Tagline>A Scam Targeting Microsoft SharePoint Users</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span>Malicious actors are using Covid-19 and current economic conditions to exploit victims with new phishing scams. The article linked below talks about two similar phishing scams. One scam claims to be giving the user a bonus while mimicking a Microsoft SharePoint notification. The other attempts to spoof a Microsoft Planner email notification. Both scams are trying to steal the user’s Microsoft login credentials. </span></p><br><p><span>“Summer Bonus” Phishing Scam</span></p><br><p><span>The scammer sends an email that looks like a legitimate Microsoft SharePoint notification. The email offers what looks like a bonus for the month while also having an “open” button to display an explanatory file. An example of this email is shown below.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span><span><img src="https://lh6.googleusercontent.com/zpGReAPSZiSRNJQ_35ZnLTRLFk1y7FppGEXMd9ijXbyR9XwRyZpWlIJaoqAJ78fu0q4fXb7-_nR9RgLUmjsZH_7XpuchopERN2ZViG3tHs54W4qfvVbwFtPADMVnVWdwzvpR1Qd8" width="610" height="527" style="max-width: 100%; height: auto;"></span></span></p></td></tr></tbody></table></div><br><p><span>If the victim clicks on the “open” button they will be brought to a website that looks very similar to a Microsoft login page. A closer look reveals that this is not a link to a Microsoft login page but to an AppSpot site created by the scammers. Appspot.com is a cloud computing platform for developing and hosting web applications in Google-managed data centers.</span></p><br><p><span>If the victim enters their login credentials into the fake Microsoft login page, their account would be compromised.</span></p><br><p><span>Microsoft Planner Phishing Scam</span></p><br><p><span>Similar to the “Summer Bonus” scam, this Microsoft Planner Phishing Scam uses an email that tries to spoof a Microsoft Planner notification. As in the “Summer Bonus” scam, it has a button but this one says “Open in Microsoft Planner” and will take you to a fake Microsoft login page. An example of this email is shown below.</span></p><p><span> </span></p><div><table><colgroup></colgroup><tbody><tr><td><p><span><span><img src="https://lh5.googleusercontent.com/CXJUnqd9G1yL7OP-dLc7__wnmI5KZ7WtUpY95ZF5ooHBLVWdDMwQ4CwzvJ_06MeWYwPpPyxv0Y3XX2PAzArgpEhnO668nD3zHUHEWKkVgaq-SZUC60rPoywdkIVbhjIz9nT54TnM" width="610" height="524" style="max-width: 100%; height: auto;"></span></span></p></td></tr></tbody></table></div><br><p><span>As with the previous scam, if the victim enters their login credentials into the fake Microsoft login page, their account would be compromised.</span></p><br><p><span>To avoid these scams, make sure the site you land on after clicking the button is really a Microsoft domain. If the site is a login for Microsoft then the URL should direct your browser to a legitimate Microsoft domain.</span></p><br><p><span>Even before clicking any buttons, look at the From address in the headers. </span><span>The scammer’s display name makes it appear as if it belongs to the targeted company. The headers can show if the From email address itself is spoofed and who is actually sending the email to you. </span></p><br><p><span>Always remember that if it feels “too good to be true”, then it is probably too good to be true. It is also good practice to check with a supervisor before responding to any unsolicited requests for credentials or logins that appear to come from your employer.</span></p><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>The images and the original article can be found here. Please check it out for more information: </span></p><p><a href="https://www.area1security.com/blog/july-bonus-microsoft-spear-phishing/?utm_medium=email&amp;utm_source=blast&amp;utm_term=na&amp;utm_content=na&amp;utm_campaign=2020-Q3-Email-Blast-Spot-Campaign&amp;mkt_tok=eyJpIjoiWVdKbE1HVXlOakkzWVRWaiIsInQiOiJFWnFFZVYxYXBuTFpcLytrc1hzNkFodUZ1XC9CbWRPcUROYmhMWlM0NisyZmo3K0cybFFyY0xmMnhYXC9lYUIzMit2UXZGYzFPTURmTSt2Z1cxRDkxOTladFUwVGl5Wmczd2FmZWFvSkRZZm9iN0FVZGh0TGs2b2FlazhaSFU0ZWhzbSJ9" rel="nofollow external" class="bo"><span>https://www.area1security.com/blog/july-bonus-microsoft-spear-phishing/?utm_medium=email&amp;utm_source=blast&amp;utm_term=na&amp;utm_content=na&amp;utm_campaign=2020-Q3-Email-Blast-Spot-Campaign&amp;mkt_tok=eyJpIjoiWVdKbE1HVXlOakkzWVRWaiIsInQiOiJFWnFFZVYxYXBuTFpcLytrc1hzNkFodUZ1XC9CbWRPcUROYmhMWlM0NisyZmo3K0cybFFyY0xmMnhYXC9lYUIzMit2UXZGYzFPTURmTSt2Z1cxRDkxOTladFUwVGl5Wmczd2FmZWFvSkRZZm9iN0FVZGh0TGs2b2FlazhaSFU0ZWhzbSJ9</span></a></p><br><p><span>To read more articles published by DoIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
  </Body>
  <Summary>Malicious actors are using Covid-19 and current economic conditions to exploit victims with new phishing scams. The article linked below talks about two similar phishing scams. One scam claims to...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/95085/guest@my.umbc.edu/b71f97a748a34795397c539c4c6983f8/api/pixel</TrackingUrl>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 24 Aug 2020 12:20:48 -0400</PostedAt>
  <EditAt>Mon, 24 Aug 2020 12:26:24 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="95084" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/95084">
    <Title>"Quick Response" - A UMBC Impersonation Scam</Title>
    <Tagline>A Common Scam That Still Works</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>Recently DoIT has been notified that an email scammer has been trying to impersonate other UMBC staffers. The email comes from a scammer who is claiming to be someone from UMBC and has the Subject “Quick response.” An example of this phishing email can be seen below.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: </span><span>FORGED NAME </span><span>&lt;</span><span><a href="mailto:.umbc@gmail.com">.umbc@gmail.com</a></span><span>&gt;</span></p><p><span>Date: Thu, Aug 20, 2020</span></p><p><span>Subject: Quick response</span></p><p><span>To: </span><span>&lt;@umbc.edu</span><span>&gt;</span></p><p> </p><p><span>Available?</span></p><p> </p><p><span>--</span></p><p><span>FORGED NAME</span></p></td></tr></tbody></table></div><br><p><span>The email that is shown above is only the first email that the scammer will send to users to try and get their attention. In similar phishing emails, once the user responds  the scammers would claim that they were stuck in a meeting and ask the user if they could go to the store and buy them gift cards. </span></p><br><p><span>Even though this email is short it still shows some red flags of a phishing email. </span></p><br><ul><li><p><span>The email itself is not personalized and is very vague</span><span>. The reason for this is so that the scammer can send the email to as many people as possible.</span></p></li><li><p><span>There is a sense of urgency</span><span>. Even with this email being so short, the sense of urgency comes with the subject line of “Quick response” trying to show that they need you to respond as soon as possible.</span></p></li><li><p><span>The From email address is suspicious</span><span>. Some scammers will use addresses of the form &lt;johnsmith.</span><a href="mailto:umbc@gmail.com" rel="nofollow external" class="bo"><span>umbc@gmail.com</span></a><span>&gt;. Without a closer examination some might assume it is coming from a UMBC source while in actuality it is coming from an unknown Google mail address.</span></p></li><li><p><span>The email signature and name are meant to look legitimate</span><span>. The scammer will try to base their phishing email on that of the person they are trying to impersonate. This will include an email signature meant to look like an actual UMBC staff member’s and the sender's name being that of the person they are trying to impersonate, often a supervisor. </span></p></li></ul><br><p><span>You can find other examples of similar scams here </span><a href="https://itsecurity.umbc.edu/critical/?id=94968" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?id=94968</span></a><span> and </span><a href="https://itsecurity.umbc.edu/critical/?id=94950" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?id=94950</span></a><span> or check out the DoIT Security page main page for more updated information.</span></p><br><p><span>If you do receive this or a similar email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
      ]]>
    </Body>
    <Summary>Recently DoIT has been notified that an email scammer has been trying to impersonate other UMBC staffers. The email comes from a scammer who is claiming to be someone from UMBC and has the Subject...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/95084/guest@my.umbc.edu/9c777090fa25c9ed45f2e31e935ec17d/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Mon, 24 Aug 2020 12:19:31 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="95006" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/95006">
    <Title>Account Data Breach: Truefire</Title>
    <Tagline>Truefire Data Breach</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>In February 2020, the guitar tuition website TrueFire suffered a data breach. Over 600,000 individuals were affected. Information such as names, emails, addresses, account balances, and passwords were exposed. </span></p><br><p><span>Five UMBC email addresses were victims of this breach. These individuals were notified via their UMBC emails and/or their recovery emails. If you have a Truefire membership, please contact them to see if you were affected by this breach. If you have any questions or concerns email us: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a></p><p> </p><p><span>Information about this breach was provided to Have I Been Pwned(HIBP) by </span><a href="https://dehashed.com/" rel="nofollow external" class="bo"><span>dehashed.com</span></a><span>.</span></p><br><br><p><span>More about Truefire data breach:</span></p><br><p><a href="https://guitar.com/news/industry-news/truefire-data-breach/" rel="nofollow external" class="bo"><span>https://guitar.com/news/industry-news/truefire-data-breach/https://guitar.com/news/industry-news/truefire-data-breach/</span></a></p><br><p> </p><p><span>_____________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><p> </p><p><span>Need to set up a recovery email for your UMBC account?</span></p><p><span>Follow the instructions here: </span><a href="https://my3.my.umbc.edu/groups/itsecurity/posts/94776" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity/posts/94776</span></a></p><br><p><span>Follow us on myUMBC</span><span>:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></p></div>
      ]]>
    </Body>
    <Summary>In February 2020, the guitar tuition website TrueFire suffered a data breach. Over 600,000 individuals were affected. Information such as names, emails, addresses, account balances, and passwords...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/95006/guest@my.umbc.edu/2158b1aafd30648876752703c2af24de/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Fri, 21 Aug 2020 12:14:19 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="94968" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/94968">
    <Title>&#8220;QUICK REQUEST&#8221; UMBC Impersonation Scam</Title>
    <Tagline>Another Example Of A Gift Card Scam Targeting UMBC accounts</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>The DoIT has recently been notified of a malicious actor trying to impersonate a UMBC staffer. This scammer is sending emails with the subject line “QUICK REQUEST” and asking victims if they are available with the goal of getting gift cards from the victim. An example of an email chain is shown below with the name of the From and the email signature removed for privacy reasons.</span><span><br><br></span></p><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: FORGED NAME &lt;<a href="mailto:.umbc@gmail.com">.umbc@gmail.com</a>&gt;</span><span><br></span><span>Date: Aug 19, 2020, at 11:33 AM</span></p><p><span>Subject QUICK REQUEST</span></p><p><span>To :&lt;@umbc.edu&gt;</span></p><br><p><span>Available?</span></p><br><p><span>--</span></p><p><span>FORGED NAME</span></p></td></tr></tbody></table></div><br><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>FORGED NAME&lt;<a href="mailto:.umbc@gmail.com">.umbc@gmail.com</a>&gt; wrote:</span><span><br><br></span></p><p><span>I’m in an impromptu meeting right now and that's why i'm contacting you through here. I should have called you, but phone is not allowed to be used during the meeting. I don't know when the meeting will be rounding up, And i want you to help me out on something very important  from a store around you and I will reimburse you back when I’m out of the meeting. Let me know if you can do this.</span></p><p><span>--</span><span><br></span><span>FORGED NAME</span></p></td></tr></tbody></table></div><br><p><span>The scammer targets a department and tries to impersonate some senior person in that department. The scammer will send emails asking the victim if they are “available.” </span></p><br><p><span>If the victim respondes, they will receive a second email asking the victim to purchase gift cards because the scammer is currently in a meeting and can’t do it themselves. Note that the second email has poor grammar and random capitalizations. This email also has a sense of urgency with the scammer claiming to be in a meeting and using words like “important” and the subject “QUICK REQUEST” all in caps.</span></p><br><p><span>Note that the sender’s address in both messages is &lt;</span><a href="mailto:.umbc@gmail.com" rel="nofollow external" class="bo"><span>.umbc@gmail.com</span></a><span>&gt;. The full email from the scammer was shortened for privacy reasons. This address allows the victim to see the “umbc” and, without close examination, to assume that the message is coming from a UMBC source when in actuality it is coming from an unknown Google mail address. The email also had an email signature which was based on that of an actual UMBC staff member.</span></p><br><p><span>If you do receive this or any other email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
      ]]>
    </Body>
    <Summary>The DoIT has recently been notified of a malicious actor trying to impersonate a UMBC staffer. This scammer is sending emails with the subject line “QUICK REQUEST” and asking victims if they are...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/94968/guest@my.umbc.edu/de8dfe20a0867f3a7563b3ebfac2f660/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Thu, 20 Aug 2020 00:01:41 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="94950" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/94950">
  <Title>&#8220;TASK&#8221; UMBC Impersonation Scam</Title>
  <Tagline>An E-mail Exchange With A Scammer</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span>Recently the DoIT has been notified of a malicious actor trying to impersonate a UMBC staffer. The phishing email has the subject line “TASK” and a chain of emails from the scammer can be seen below. The example has had the name and email address of the victim removed for privacy reasons.</span><span><br><br></span></p><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: </span><span>FORGED NAME </span><span> &lt;</span><span><a href="mailto:executiveoffice76@gmail.com">executiveoffice76@gmail.com</a></span><span>&gt;</span></p><p><span>Date: Thu, Aug 13, 2020 at 10:35 AM</span></p><p><span>Subject: TASK</span></p><p><span>To: &lt;</span><span>@umbc.edu</span><span>&gt;</span></p><br><p><span>Hello,</span></p><p> </p><p><span>Confirm your availability? Need you to handle a quick request. Get back to me as soon as you can.</span></p><p> </p><p><span>Thanks.</span></p><p><span>FORGED NAME</span></p></td></tr></tbody></table></div><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: </span><span>FORGED NAME </span><span> &lt;</span><a href="mailto:executiveoffice76@gmail.com" rel="nofollow external" class="bo"><span>executiveoffice76@gmail.com</span></a><span>&gt;</span><span><br><br></span></p><p><span>How are you doing? Presently in a meeting. How fast can you get some cards from a nearby store? They are needed shortly. Get back to me as soon as you can</span></p><br><p><span>Sincerely,</span></p></td></tr></tbody></table></div><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: </span><span>FORGED NAME </span><span> &lt;</span><span><a href="mailto:executiveoffice76@gmail.com">executiveoffice76@gmail.com</a></span><span>&gt;</span><span><br></span><span><br></span><span>Need steam gift cards 5 of them in 100$ denominations. Make sure you keep the receipt for proper documentation and reimbursement purposes.  When you get them scratch off the code panel, then take clear pictures of them and attach them here.</span></p><br><p><span>Sorry for the inconvenience.</span></p></td></tr></tbody></table></div><p><span><br></span><span>First the malicious actor sends an email asking if the user is available to help them. Note that in the first email there is a  sense of urgency as well as a lack of personalization to the recipient. These can be red flags of a phishing email.</span></p><br><p><span>In the second email, the scammer asks the user if they could run out to the store and get some gift cards for a meeting that the scammer is currently in. The text continues to foster a sense of urgency using words like “fast” and “quickly”.</span></p><br><p><span>In the  last email the scammer asks the user for five one hundred dollar Steam gift cards. Steam gift cards are used on Steam, a video game digital distribution service. The scammer will ask the user to send them a copy of the codes on the back of the gift cards.</span><span><br></span><span><br></span><span>If you do receive this or a similar email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to <a href="mailto:security@umbc.edu">security@umbc.edu</a>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
  </Body>
  <Summary>Recently the DoIT has been notified of a malicious actor trying to impersonate a UMBC staffer. The phishing email has the subject line “TASK” and a chain of emails from the scammer can be seen...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/94950/guest@my.umbc.edu/c64a265daac1a82114ea6975fde1ecd3/api/pixel</TrackingUrl>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 18 Aug 2020 18:00:36 -0400</PostedAt>
  <EditAt>Tue, 18 Aug 2020 18:00:46 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="94949" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/94949">
    <Title>Office 365 phishing via malicious OAuth apps</Title>
    <Tagline>You Can Be Tricked Into Giving Access To Your Files</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>During the pandemic, Microsoft has seen a rise in phishing campaigns. One such campaign uses the Office 365 phishing via malicious OAuth apps. The phishing attack attempts to trick individuals into giving a malicious Office 365 app permission to their legitimate Office 365 account.</span></p><br><p><span>Open Authentication(OAuth) is an open standard protocol which allows users to give websites and applications access to their information without the use of a password or username. Popular sites that use OAuth include Google, Twitter etc.</span></p><br><p><span>When granting such access, you may see something like this:</span></p><br><p><span><span><img src="https://lh5.googleusercontent.com/O39hD-enEia9P7snkYUor3iZTsk38MWaLVwso35W2t99OQXmCvic8hXl5nvCy6bQEad1hV8ZhEpZj9vMneKtUaVhVL2oa4H6VYe4F8ndEp0gSjiVMxRzDGtNJfKNxBCc65EQ5e9D" width="337" height="344" style="max-width: 100%; height: auto;"></span></span></p><br><br><p><span>Once the malicious Office 365 app is linked to your Office 365 account, the hackers can access your private information and any other sensitive data stored on your Office365 account. This malicious Office 365 app asks for permissions which include but are not limited to:</span></p><ul><li><p><span>Reading your contacts.</span></p></li><li><p><span>Reading your mail.</span></p></li><li><p><span>Reading all OneNote notebooks that you can access. </span></p></li><li><p><span>Reading and writing to your mailbox settings.</span></p></li><li><p><span>Having full access to all files you have access to.</span></p></li></ul><br><p><span>Microsoft has taken legal actions against 6 domains that store the malicious Office 365 applications.</span></p><p><span>However, you can check the apps and services that you have given consent to access your Office 365</span></p><p><span>information.</span></p><br><p><span>To disable these permissions:</span></p><ol><li><p><span>Visit: </span><a href="https://account.live.com/consent/Manage?uaid=a11edb2059b64ae499fce9f494c2f53f" rel="nofollow external" class="bo"><span>https://account.live.com/consent/Manage?uaid=a11edb2059b64ae499fce9f494c2f53f</span></a></p></li><li><p><span>Click </span><span>Edit</span></p></li><li><p><span>Click </span><span>Remove these permissions</span></p></li></ol><br><br><br><p><span>Source: </span><a href="https://www.bleepingcomputer.com/news/security/microsoft-warns-of-office-365-phishing-via-malicious-oauth-apps/" rel="nofollow external" class="bo"><span>https://www.bleepingcomputer.com/news/security/microsoft-warns-of-office-365-phishing-via-malicious-oauth-apps/</span></a></p><br><p><a href="https://www.bleepingcomputer.com/news/security/phishing-attack-hijacks-office-365-accounts-using-oauth-apps/" rel="nofollow external" class="bo"><span>https://www.bleepingcomputer.com/news/security/phishing-attack-hijacks-office-365-accounts-using-oauth-apps/</span></a></p><br><p><span>_________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><p><span>Forward it to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></p></div>
      ]]>
    </Body>
    <Summary>During the pandemic, Microsoft has seen a rise in phishing campaigns. One such campaign uses the Office 365 phishing via malicious OAuth apps. The phishing attack attempts to trick individuals...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/94949/guest@my.umbc.edu/96be352428497fca5b322b002ebca635/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Tue, 18 Aug 2020 17:53:04 -0400</PostedAt>
  </NewsItem>
</News>
