<?xml version="1.0"?>
<News hasArchived="false" page="19" pageCount="21" pageSize="10" timestamp="Tue, 28 Apr 2026 22:29:52 -0400" url="https://dev.my.umbc.edu/groups/doit/posts.xml?page=19&amp;tag=notice">
  <NewsItem contentIssues="false" id="93551" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/93551">
  <Title>Part Time Job Email Scam</Title>
  <Tagline>UMBC Community Continues To See Fake Job Offers</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span>UMBC DoIT Security continues to receive reports of malicious emails claiming to offer part time job opportunities to UMBC students. </span></p><br><blockquote><blockquote><p><span>From: </span><span>Charlotte Oliver</span><span> &lt;</span><span><a href="mailto:charlotteoli26900@gmail.com">charlotteoli26900@gmail.com</a></span><span>&gt;</span></p><p><span>Date: Sat, May 30, 2020 at 10:55</span></p><p><span>Subject: UMBC STUDENT PART TIME JOB OPPORTUNITY</span></p><p><br></p><p><span>Dear Student,</span></p><p><span> </span></p><p><span>We got your contact through your school database and I'm happy to inform you that our reputable company Cisco Systems Inc® is currently running a student empowerment program. This program is to help devoted and hardworking students secure a part time job which does not deter them from doing any other, you just need a few hours to do this weekly and with an attractive weekly wages.</span></p><p><span> </span></p><p><span>KINDLY EMAIL BACK WITH YOUR  (RESUME) PERSONAL EMAIL ADDRESS AND PHONE NUMBER IF INTERESTED IN THIS JOB POSITION.</span></p><p><span> </span></p><p><span>Best Regards,</span></p><p><span> </span></p><p><span>Charlotte Oliver</span></p><p><span>HR Manager/Consultant</span></p><p><span>Cisco Systems Inc®</span></p></blockquote></blockquote><p> </p><p><span>DO NOT REPLY TO THIS PHISHING EMAIL!</span></p><p><span>This phishing campaign is designed to collect students’ personal information. A reply confirms that your account is active and could lead to more spam. Additionally, if you provide your alternate email address and phone number as requested, you could be vulnerable to phone and text message scams in addition to being pressured by the fake employers for more personal information.</span></p><p><span>This job scam is similar to a COVID-19 themed variant reported in early May. While the message and subject of the emails have changed, the basic premise has not. See the original post at</span><a href="https://itsecurity.umbc.edu/critical/?id=92997" rel="nofollow external" class="bo"><span> https://itsecurity.umbc.edu/critical/?id=92997</span></a><span>.</span></p></div>
]]>
  </Body>
  <Summary>UMBC DoIT Security continues to receive reports of malicious emails claiming to offer part time job opportunities to UMBC students.      From: Charlotte Oliver &lt;charlotteoli26900@gmail.com&gt;...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/93551/guest@my.umbc.edu/96244223050a4302ad9811a98fe02c4c/api/pixel</TrackingUrl>
  <Tag>notice</Tag>
  <Group token="doit">Division of Information Technology (DoIT)</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/doit</GroupUrl>
  <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
  <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
  <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
  <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
  <Sponsor>Division of Information Technology (DoIT)</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 02 Jun 2020 16:17:44 -0400</PostedAt>
  <EditAt>Tue, 02 Jun 2020 16:21:15 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="93410" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/93410">
  <Title>Work From Home Scam</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span>During the  COVID-19, unemployment numbers have been rising and more people are looking for work. Some people have unknowingly gotten involved in breaking the law. According to the article from Idaho News 6 linked below, police found thousands of dollars worth of stolen merchandise in a garage belonging to a homeowner who thought he was renting space to people  working on a reshipping job.</span></p><br><p><span>The article warns that malicious actors post legitimate looking “work from home” help wanted or job openings on places like social media, message boards and even job posting sites. These ads will claim the work will be easy, pays big, and can be done from home. The malicious actor uses stolen credit cards to purchase goods and has the victim reship the items. In fact, the malicious actor is using the victim as part of a money laundering operation.</span><span><br></span><span><br></span><span>The article encourages readers to stay safe while job searching, to make sure that the employer has a readily available phone number for human resources, and has a company website. Scammers on the other hand usually will communicate through email or messenger only and are very secretive about the work, their business, and what the employee will be doing. The article also warns against paying upfront fees since malicious actors will often ask for fees for background checks or other pre-employment checks.</span><span><br></span><span><br></span><span>For more information, please check out:</span></p><p><a href="https://www.kivitv.com/news/bbb-watch-for-work-from-home-scams" rel="nofollow external" class="bo"><span>https://www.kivitv.com/news/bbb-watch-for-work-from-home-scams</span></a></p></div>
]]>
  </Body>
  <Summary>During the  COVID-19, unemployment numbers have been rising and more people are looking for work. Some people have unknowingly gotten involved in breaking the law. According to the article from...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/93410/guest@my.umbc.edu/c90ba55d70cc7bf3846c632a17a72cb8/api/pixel</TrackingUrl>
  <Tag>covid19</Tag>
  <Tag>notice</Tag>
  <Group token="doit">Division of Information Technology (DoIT)</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/doit</GroupUrl>
  <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
  <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
  <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
  <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
  <Sponsor>Division of Information Technology (DoIT)</Sponsor>
  <PawCount>1</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 26 May 2020 11:10:56 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="93375" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/93375">
  <Title>Maryland COVID-19 Contact Tracing</Title>
  <Tagline>Make sure you know who you&#8217;re talking to</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p>May 22, 2020</p>
    
    <p>Next Week, Maryland will begin a state-wide effort to trace
    the spread of COVID-19.<span>  </span>The effort will
    involve health workers making phone calls to Maryland residents.<span>  </span>This is a very important step in identifying
    potential disease clusters and everyone’s help is needed.</p>
    
    <p>At the same time, Maryland in general and UMBC in particular
    have been targets of a wide variety of scams taking advantage of people’s fears
    and uncertainties around this disease.<span>  </span>It
    is very possible that unscrupulous people will take advantage of Maryland’s
    effort as a cover for phone scams.<span>  </span><span>North Carolina, for instance, started a contact tracing effort last
    month and has gotten reports of scammers pretending to be health officials and gathering
    information from residents. </span></p>
    
    <p><span> </span></p>
    
    <h3>Phone Calls</h3>
    
    <p><em><u>When you get a call, your caller ID should read “MD COVID”</u></em>.<span>  </span>You will be asked about your health and about
    your location and interactions within a period of time.<span>  </span>You will be asked for your birth date, contact
    information, and information about any COVID-19 test if you have had one.<span>  </span>You will get guidance about potential symptoms
    to watch for and about self-isolation.</p>
    
    <p><em><u>You will NOT be asked for:</u></em></p>
    
    <ul><li><span><span>·<span>       
    </span></span></span><span>a Social Security number</span></li></ul>
    
    <ul><li><span><span>·<span>       
    </span></span></span><span>financial or bank account
    information</span></li></ul>
    
    <ul><li><span><span>·<span>       
    </span></span></span><span>personal details unrelated to
    COVID-19 </span></li></ul>
    
    <ul><li><span><span>·<span>       
    </span></span></span><span>photographs or videos</span></li></ul>
    
    <ul><li><span><span>·<span>       
    </span></span></span><span>passwords</span></li></ul>
    
    <ul><li><span><span>·<span>       
    </span></span></span><span>payment</span></li></ul>
    
    <p> </p>
    
    <p><span>If anyone asks you for this or other information having nothing
    to do with COVID-19, please do <strong>not</strong> give it to them.<span>  </span></span></p>
    
    <p><span> </span></p>
    
    <h3>Text Messaging</h3>
    
    <p>So far, Maryland has not announced that text messaging will
    be part of the contact tracing effort.<span> 
    </span>If you receive a text message that asks you to click on a link for
    contact tracing, <em><u>do not click it</u></em>. At best, it will take you to a
    scam questionnaire requesting your personal information.<span>  </span>Worse, it could download malware to your
    phone and start harvesting personal information itself.</p>
    
    <p>New Jersey has received reports of text messages pretending
    to be from contact tracers and telling people that they have already had
    contact with a potential COVID-19 carrier.<span> 
    </span>These messages also contain links which will lead to information theft
    and/or malware.<span>  </span><em>Contact tracers don’t
    work like this.</em></p>
    
    <h3><br></h3><div>We encourage the UMBC community to support this important effort to identify and understand the spread of COVID-19.  We also ask you to remain alert to those who try create and exploit fears and confusion for their personal gain.</div><div><br></div><div><br></div><h3>For More Information</h3>
    
    <p><span>Launch of Maryland’s contact tracing effort</span></p>
    
    <ul><li><a href="https://www.baltimoresun.com/coronavirus/bs-md-maryland-contact-tracing-operation-coronavirus-reopening-20200521-jn4wfqgjcjdqbkbu454fhqngim-story.html" rel="nofollow external" class="bo">https://www.baltimoresun.com/coronavirus/bs-md-maryland-contact-tracing-operation-coronavirus-reopening-20200521-jn4wfqgjcjdqbkbu454fhqngim-story.html</a></li></ul>
    
    <ul><li><a href="https://www.wbaltv.com/article/maryland-contact-tracing-ramps-up/32631045#" rel="nofollow external" class="bo">https://www.wbaltv.com/article/maryland-contact-tracing-ramps-up/32631045#</a></li></ul>
    
    <p>FTC Warning
    about COVID-19 contact tracing text message scams</p>
    
    <ul><li><a href="https://www.consumer.ftc.gov/blog/2020/05/covid-19-contact-tracing-text-message-scams" rel="nofollow external" class="bo">https://www.consumer.ftc.gov/blog/2020/05/covid-19-contact-tracing-text-message-scams</a> <br></li></ul><p>Scam
    Warning from North Carolina Attorney General</p>
    
    <ul><li><a href="https://ncdoj.gov/watch-out-for-covid-19-contact-tracing-scams/" rel="nofollow external" class="bo">https://ncdoj.gov/watch-out-for-covid-19-contact-tracing-scams/</a></li></ul>
    
    
    
    <p>Warning
    from New Jersey state officials about text message scams</p>
    
    <ul><li><a href="https://www.nj.com/coronavirus/2020/05/beware-of-coronavirus-contact-tracing-scams-nj-officials-warn-thousands-of-fraud-cases-reported.html" rel="nofollow external" class="bo">https://www.nj.com/coronavirus/2020/05/beware-of-coronavirus-contact-tracing-scams-nj-officials-warn-thousands-of-fraud-cases-reported.html</a></li></ul></div>
]]>
  </Body>
  <Summary>May 22, 2020    Next Week, Maryland will begin a state-wide effort to trace the spread of COVID-19.  The effort will involve health workers making phone calls to Maryland residents.  This is a...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/93375/guest@my.umbc.edu/3d82fc3347444b57cd2f3fd8f44b8077/api/pixel</TrackingUrl>
  <Tag>covid19</Tag>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>2</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Fri, 22 May 2020 15:02:24 -0400</PostedAt>
  <EditAt>Fri, 22 May 2020 15:05:32 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="93247" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/93247">
  <Title>Android Ransomware</Title>
  <Tagline>Malicious Software Pretending  To Provide COVID-19 Info</Tagline>
  <Body>
    <![CDATA[
          <div class="html-content"><h3><span>Android Ransomware</span></h3><br><br><p><span>DomainTools discovered that domain names associated with COVID-19 and Coronavirus have spiked in the past few weeks, and many of those domains are considered malicious. One that caught their eye was a website that offers a real-time coronavirus outbreak tracker as an Android app.</span></p><br><br><p><span>The app says that it offers many features like a heat map and other statistical data about COVID-19, but this app is instead ransomware. When downloading the app, it will ask for administrative access promising that this will allow certain types of information. If the app is given administrative access, it is given the opportunity to lock up all contacts, pictures, videos, and social media accounts unless their ransom is paid in Bitcoin. If the ransom is not paid, the attacker threatens to release all private information publicly and erase the phone's memory.</span></p><br><br><p><span>DomainTools offers tips on how to better protect against ransomware and other malware that tries to capitalize on coronavirus. They first state to be sure to only use trusted information sources from the government and research websites, and not to click on anything health related in your emails. Next they ask Android users to ensure that they download apps from the Google Play store, as third-party stores have a much higher risk of downloading malware.</span></p><br><br><p><span>For more information, please check out: <br><br></span></p><p><a href="https://www.domaintools.com/resources/blog/covidlock-mobile-coronavirus-tracking-app-coughs-up-ransomware" rel="nofollow external" class="bo"><span>https://www.domaintools.com/resources/blog/covidlock-mobile-coronavirus-tracking-app-coughs-up-ransomware</span></a></p><p><a href="https://www.us-cert.gov/Ransomware" rel="nofollow external" class="bo"><span>https://www.us-cert.gov/Ransomware</span></a></p></div>
      ]]>
  </Body>
  <Summary>Android Ransomware    DomainTools discovered that domain names associated with COVID-19 and Coronavirus have spiked in the past few weeks, and many of those domains are considered malicious. One...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/93247/guest@my.umbc.edu/84da75ad259024b2aafd7d464c22f4f9/api/pixel</TrackingUrl>
  <Tag>covid-19</Tag>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 18 May 2020 18:24:13 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="93246" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/93246">
    <Title>COVID-19 Phishing Attacks</Title>
    <Tagline>A review of different attacks exploiting COVID-19 fears</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>Tripwire has released an article warning of these COVID19-related phishing scams. This article can be found at this link: </span><a href="https://www.tripwire.com/state-of-security/security-awareness/covid-19-scam-roundup-may-11-2020/" rel="nofollow external" class="bo"><span>https://www.tripwire.com/state-of-security/security-awareness/covid-19-scam-roundup-may-11-2020/</span></a></p><br><br><p><span>(Fake) Work From Home Offers</span></p><br><p><span>PhishLabs discovered a phishing email attack aiming to entice people laid off due to COVID-19 with a work from home opportunity. The one email they found offered $5000 a month for a fake position. If the reader replies, they are asked for personal and financial information and will be given a more detailed job description involving transfering money through the readers accounts. The malicious actors might not only steal money from the readers account, but also could use the reader as a money mule meaning that they could be held liable for the stolen money that passes through their account. </span></p><br><br><p><span>(Fake) IRS Page</span></p><br><p><span>Researchers at SecureWorks discovered malicious actors targeting readers with a phishing page designed to look like a tax form given by the IRS. The attack is believed to be distributed through email attacks, and the goal of this attack is stealing the readers tax information. Once the malicious actor has the information, they can then impersonate the reader on the official IRS tax form meaning that they will collect not only their tax return but their stimulus checks as well.</span><span><br><br></span></p><p><span><br></span><span>Impersonating Institute of CPAs</span></p><br><p><span>The Microsoft Security Intelligence team discovered that some digital attackers were using COVID-19 themed attack campaigns to distribute malware. One example they found showed a malicious actor impersonating the Institute of CPAs. In their emails they were claiming to be delivering COVID-19 related updates to its members as well as containing a ZIP file. The file is instead an executable that will allow the malicious actor to take control of the affected machine.</span></p></div>
      ]]>
    </Body>
    <Summary>Tripwire has released an article warning of these COVID19-related phishing scams. This article can be found at this link:...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/93246/guest@my.umbc.edu/fd27aef2c212c3511943930f04cf4c82/api/pixel</TrackingUrl>
    <Tag>covid19</Tag>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Mon, 18 May 2020 18:17:39 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="93115" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/93115">
    <Title>Phishing Attack Today Uses Fake Email Renewal Scam</Title>
    <Tagline>Email Tries To Get The Reader To Log In At Fake UMBC Page</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><div>A fairly well-crafted phishing attack hit UMBC mail inboxes today.  <br></div><div><br></div><div><br></div><div>It looks like this:<br></div><div><br></div><div><br></div><div>The link takes the reader to a fake UMBC login page.  It does not look like our usual page, but does have some UMBC logos on it.<br></div><div><br></div><div><blockquote>From: <strong>IT Desk Update</strong> <span>&lt;<a href="mailto:mwelch5@corning-cc.edu" rel="nofollow external" class="bo">mwelch5@corning-cc.edu</a>&gt;</span><br>Date: Wed, May 13, 2020 at 7:16 AM<br>Subject: UMBC Alert<br><br><br><br><h3>Kindly Update your Phone number to avoid being locked out of your email account, Kindly follow the URL below to proceed to setup<div><br><a rel="nofollow external" class="bo">https://tinyurl[.]com/UMBC-UPDATELINK</a></div></h3>  <br></blockquote></div><br><h3><div><br></div></h3><div><br>If you get this message, please forward it to <a href="mailto:security@umbc.edu">security@umbc.edu</a>. <br><br>Do NOT click on the tinyurl link.</div><div><br></div><div><br></div><div><br></div><div><br></div><div><br></div></div>
      ]]>
    </Body>
    <Summary>A fairly well-crafted phishing attack hit UMBC mail inboxes today.           It looks like this:         The link takes the reader to a fake UMBC login page.  It does not look like our usual page,...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/93115/guest@my.umbc.edu/dbb618f3d95a80ed9f99fdfccac9c6da/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="doit">Division of Information Technology (DoIT)</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/doit</GroupUrl>
    <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
    <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
    <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
    <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
    <Sponsor>Division of Information Technology (DoIT)</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Wed, 13 May 2020 13:17:48 -0400</PostedAt>
    <EditAt>Wed, 13 May 2020 17:06:03 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="92998" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/92998">
    <Title>Email Attacks</Title>
    <Tagline>A Review Of Recent Email Trying To Infect Your Computer</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>Email Attacks</span></p><br><br><p><span>Tripwire has released an article warning of these COVID-19 related email scams. The article can be found at this link: </span><a href="https://www.tripwire.com/state-of-security/security-awareness/covid-19-scam-roundup-may-4-2020/" rel="nofollow external" class="bo"><span>https://www.tripwire.com/state-of-security/security-awareness/covid-19-scam-roundup-may-4-2020/</span></a></p><br><h3><span>(FAKE) Failed Delivery Notice</span></h3><br><p><span>They report on a finding from Kaspersky Labs, where they warn of a spam email campaign informing recipients that a delivery attempt had failed because their shipment details were incorrect and the reader needs to update their details. An image of a receipt is included in the message.  The receipt is too small to read easily, so the recipient will probably click on it for a better look. Clicking on the attachment will load spyware onto the user's device.</span></p><br><br><h3><span>(FAKE) Donation to WHO</span></h3><br><p><span>A malicious actor sent out emails urging recipients to consider donating to the World Health Organization. The email has a from address of “support@covid-19[.]world” and includes a link at the bottom saying “Help Us Fight”.  Clicking the link will take the reader to a malicious domain help-who[.]com. For readers to donate they must click on the embedded link which allows the malicious actors to steal the reader’s payment information.</span></p><br><br><h3><span>(FAKE) Update to Family and Medical Leave Act</span></h3><br><p><span>Finally the article reports that IBM X-Force discovered a phishing email campaign that seemed to be from the US Department of Labor. The email states they have made changes to the “Family and Medical Leave of Act” as a result of COVID-19. This email then asks readers to review the attached word document. The attachment will install malware which puts the reader’s computer under the control of a botnet.</span></p></div>
      ]]>
    </Body>
    <Summary>Email Attacks    Tripwire has released an article warning of these COVID-19 related email scams. The article can be found at this link:...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/92998/guest@my.umbc.edu/912d4576f63daa6d0f96033f10a9d408/api/pixel</TrackingUrl>
    <Tag>covid19</Tag>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Fri, 08 May 2020 12:31:45 -0400</PostedAt>
    <EditAt>Fri, 08 May 2020 12:32:40 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="92997" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/92997">
  <Title>COVID-19 Job Scam in Email</Title>
  <Tagline>New Scam Subject: UMBC COVID-19 INFORMATION</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span>The UMBC Division of Information Technology received notification of a new job scam variant on 08may2020.  The subject is: </span><strong><span>UMBC COVID-19 INFORMATION</span></strong></p><br><br><blockquote><p><strong><span>From: </span><span>Koyepes Michael</span><span> &lt;<a href="mailto:michaelkoyepes199@gmail.com">michaelkoyepes199@gmail.com</a>&gt;</span></strong></p><p><strong><span>Date: Fri, May 8, 2020 at 9:54 AM</span></strong></p><p><strong><span>Subject: UMBC COVID-19 INFORMATION</span></strong></p><strong><br></strong><p><strong><span>Dear students,</span></strong></p><strong><br></strong><p><strong><span>University of Maryland, Baltimore County health professionals have been closely monitoring the spread of COVID-19 over the past two months.Therefore the university is organizing an online part time job to sustain the students living.I'm happy to inform you that our reputable company CORESTAFF SERVICES Inc®,is currently running a student empowerment program.</span></strong></p><p><strong><span>    KINDLY EMAIL BACK WITH YOUR  PERSONAL EMAIL ADDRESS IF INTERESTED IN THIS JOB POSITION.</span></strong></p><strong><br></strong><p><strong><span>Kind Regards</span></strong></p><p><strong><span>Koyepes Michael</span></strong></p><p><strong><span>HR Manager/Consultant</span></strong></p><p><strong><span>CORESTAFF SERVICES Inc®</span></strong></p></blockquote><br><br><h3><strong><em><span>This is a scam!  DO NOT REPLY TO IT!</span></em></strong></h3><br><p><span>A reply confirms that your UMBC email address is active.  That is an invitation to get more spam.  You are also asked to provide your personal address.  That’s two addresses for spamming.   You may then be asked to fill out a form with personal information which can then be added to your email address.  That means, at least, that the spam can be targeted to you.  If you provide information such as your birthdate, address, or social security number, the information can also be used for identity theft.  </span></p><br><br><p><span>Even if you are tempted to send the scammer a hostile, insulting message,</span></p><h3><span>DO NOT REPLY!</span></h3><p><span>You will not hurt the scammer’s feelings.  You will simply provide information about yourself directly or indirectly.</span></p><p><span><br></span></p><p><span>E-mail fraud is in the rise.  The Division of Information Technology is tracking it.  If you get suspicious email, please forward it to <a href="mailto:security@umbc.edu">security@umbc.edu</a>.   If you are not sure whether it is suspicious, forward it anyway.  We will investigate it and get back to you.<br></span></p></div>
]]>
  </Body>
  <Summary>The UMBC Division of Information Technology received notification of a new job scam variant on 08may2020.  The subject is: UMBC COVID-19 INFORMATION     From: Koyepes Michael...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/92997/guest@my.umbc.edu/f645a745d90822bcdf375dcead134bfa/api/pixel</TrackingUrl>
  <Tag>covid19</Tag>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Fri, 08 May 2020 12:12:25 -0400</PostedAt>
  <EditAt>Fri, 08 May 2020 12:15:55 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="92915" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/92915">
  <Title>"Password Notification" Scam</Title>
  <Tagline>Email with bogus link wants to steal your password</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><span><p>This morning DoIT has received several reports of a password change scam that has been going around campus:</p><p><br></p><div><table border="1" width="300"><tbody><tr><td><pre><pre>From:  <a href="mailto:ti93943@wildblue.net">ti93943@wildblue.net</a>&#x000A;    Date: Wednesday, May 6, 2020 9:45 AM&#x000A;    Subject: Password Notification&#x000A;    To: &lt; @umbc.edu&gt;</pre>--
    
    Dear Member,
    
    Your UMBC webmail password will expire today.
    
    Visit the maintenance portal below to automatically renew your
    university password.
    
    <a href="https://forms.office.com/Pages/ResponsePage.aspx?id=xxxxxxxxxxxxxxxxxxxxxxx">https://forms.office.com/Pages/ResponsePage.aspx?id=xxxxxxxxxxxxxxxxxxxxxxx</a>
    
    IT Helpdesk | University of Maryland, Baltimore County.
    </pre>
    </td></tr></tbody></table></div><div><br></div><div><strong><u>If you have received this or a similar email, please do not respond or click on the provided URL.</u></strong> Either one of those actions only shows the malicious actor that they have a valid, active email address. <strong><u>Please forward the message (with the email headers) to <a href="mailto:security@umbc.edu">security@umbc.edu</a>, and delete the message.</u></strong></div><div><br></div><div>For more information on spotting phishing messages and handling spam, please check out our FAQ: <a href="https://wiki.umbc.edu/x/HwMxAg">https://wiki.umbc.edu/x/HwMxAg</a></div></span></div>
]]>
  </Body>
  <Summary>This morning DoIT has received several reports of a password change scam that has been going around campus:       From:  ti93943@wildblue.net Date: Wednesday, May 6, 2020 9:45 AM Subject: Password...</Summary>
  <Website>https://itsecurity.umbc.edu</Website>
  <AttachmentKind>Image</AttachmentKind>
  <AttachmentUrl>https://assets2-dev.my.umbc.edu/system/shared/attachments/838cf36caa4794552644821549309262/69f16d20/news/000/092/915/2bfe367f6f040df48462a1a9a684ea43/medium.jpg?1588792899</AttachmentUrl>
  <Attachments>
    <Attachment kind="Image" url="https://dev.my.umbc.edu/groups/doit/posts/92915/attachments/35861"></Attachment>
  </Attachments>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/92915/guest@my.umbc.edu/165851afaec154bbf8b70e452c0dcc34/api/pixel</TrackingUrl>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <ThumbnailUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/092/915/056f70407cf7aa2ee6bd926dadd87e80/xxlarge.jpg?1588780238</ThumbnailUrl>
  <ThumbnailUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/092/915/056f70407cf7aa2ee6bd926dadd87e80/xlarge.jpg?1588780238</ThumbnailUrl>
  <ThumbnailUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/092/915/056f70407cf7aa2ee6bd926dadd87e80/large.jpg?1588780238</ThumbnailUrl>
  <ThumbnailUrl size="medium">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/092/915/056f70407cf7aa2ee6bd926dadd87e80/medium.jpg?1588780238</ThumbnailUrl>
  <ThumbnailUrl size="small">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/092/915/056f70407cf7aa2ee6bd926dadd87e80/small.jpg?1588780238</ThumbnailUrl>
  <ThumbnailUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/092/915/056f70407cf7aa2ee6bd926dadd87e80/xsmall.jpg?1588780238</ThumbnailUrl>
  <ThumbnailUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/092/915/056f70407cf7aa2ee6bd926dadd87e80/xxsmall.jpg?1588780238</ThumbnailUrl>
  <PawCount>1</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Wed, 06 May 2020 12:03:21 -0400</PostedAt>
  <EditAt>Wed, 06 May 2020 15:03:16 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="92403" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/92403">
    <Title>Another Part Time Job Scam...</Title>
    <Body>
      <![CDATA[
          <div class="html-content"><span><p><span>Last week DoIT received several notifications of yet another part-time job scam arriving at email inboxes on our virtual campus.  The To: field has been removed from the example for reasons of privacy.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: </span><span>John Welch</span><span> &lt;<a href="mailto:blueeyedwelch@gmail.com">blueeyedwelch@gmail.com</a>&gt;</span></p><p><span>Date: Fri, Apr 17, 2020, 1:15 PM</span></p><p><span>Subject: UMBC PARTIME JOB</span></p><br><p><span>Corestaff Services is offering you a chance to secure a part time job. Kindly reply back with your alternate email address for more information.</span></p><br><p><span>Kind Regards</span></p><p><span>John Welch</span></p><p><span>HR Manager/Consultant</span></p><p><span>Corestaff Services Inc®</span></p><br></td></tr></tbody></table></div><br><p><span>Over 200 members of the UMBC community received this particular message.  One of the reports also noted that a similar scam naming Corestaff Services appeared in 2018 in accounts at Brown University.  Brown posted a very detailed analysis of the message at: </span><a href="https://it.brown.edu/alerts/read/corestaff-phishing-email-anatomy-scam" rel="nofollow external" class="bo"><span>https://it.brown.edu/alerts/read/corestaff-phishing-email-anatomy-scam</span></a><span>.</span></p><br><p><span>While this message doesn’t share all the issues of the one that went to Brown, it does raise some questions.</span></p><br><ul><li><p><span>Why would the message come from a gmail account rather than a corporate domain like corestaff.com?</span></p></li><li><p><span>What kind of professional HR Manager uses an account called ‘blueeyedwelch’?</span></p></li><li><p><span>Why do they want your alternate email address before they tell you anything else about the job?  They obviously have your UMBC address already.</span></p></li><li><p><span>Why is there no web link or phone number for Corestaff Services anywhere in the message?</span></p></li><li><p><span>“PART-TIME” and “PART TIME” will not set off your spell-checker.  “PARTTIME” is not a word.</span></p></li></ul><br><br><p><span>When you get a message you were not expecting that asks you to provide information, please remember that all information has value. </span><span>Even the simple fact that you are reading the email sent to your UMBC address has value.</span><span>  If you send a response, even an angry or insulting one, you are giving the sender something of value.</span></p><br><p><span>Read once, think twice.  If you are unsure, please forward the message to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.  It always helps if you include the headers, too. </span></p><br><h1><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>How do I forward full email headers?</span></a></h1><p><span>(<a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970">https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</a>)</span></p><div><span><br></span></div></span></div>
      ]]>
    </Body>
    <Summary>Last week DoIT received several notifications of yet another part-time job scam arriving at email inboxes on our virtual campus.  The To: field has been removed from the example for reasons of...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/92403/guest@my.umbc.edu/e8b13b55e9fe43a46feb0839e3421d09/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>1</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Tue, 21 Apr 2020 10:17:18 -0400</PostedAt>
  </NewsItem>
</News>
