<?xml version="1.0"?>
<News hasArchived="false" page="2" pageCount="21" pageSize="10" timestamp="Sun, 26 Apr 2026 08:42:27 -0400" url="https://dev.my.umbc.edu/groups/doit/posts.xml?page=2&amp;tag=notice">
  <NewsItem contentIssues="false" id="128066" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/128066">
  <Title>Hurricane-Related Scams</Title>
  <Tagline>An Advisory From CISA</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><div>The <span>Cybersecurity and Infrastructure Security Agency (CISA) has posted a warning about scammers pretending to be charitable agencies either soliciting contributions for hurricane victims or trying to scam the victims directly.</span></div><div><span><br></span></div><div><span>You can find the CISA post at:<br></span></div><div><span><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/09/30/hurricane-related-scams">https://www.cisa.gov/uscert/ncas/current-activity/2022/09/30/hurricane-related-scams</a><br></span></div><div><span><br></span></div><div><span><br></span></div><div><span>It is unfortunately common for unscrupulous actors to take advantage of disasters and emergency conditions in order to prey upon both those who honestly wish to help and those who truly need help.  The CISA post includes references to various resources that can help identify and avoid these scams.  Some of these resources are useful for detecting scams in general, particularly fake charities.  Be mindful when you see unsolicited email, text messages, or phone calls related to hurricane relief.  Make sure that your assistance is going where you want it to go.</span></div><div><span><br></span></div><div><br><p><span>If you have received a suspicious message, please forward it with its headers to</span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span> security@umbc.edu</span></a><span>. For instructions, visit </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>If you need further assistance, please contact us at </span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><p><span>__________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC.</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span> https://my3.my.umbc.edu/groups/itsecurity.</span></a></p></div><div><span><br></span></div><div><span><br></span></div><div></div></div>
]]>
  </Body>
  <Summary>The Cybersecurity and Infrastructure Security Agency (CISA) has posted a warning about scammers pretending to be charitable agencies either soliciting contributions for hurricane victims or trying...</Summary>
  <Website>https://www.cisa.gov/uscert/ncas/current-activity/2022/09/30/hurricane-related-scams</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/128066/guest@my.umbc.edu/63065da20db05e1beb905dd31c1a2c3a/api/pixel</TrackingUrl>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Fri, 30 Sep 2022 14:18:21 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="127811" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/127811">
  <Title>Job Phishing Alert: Work Remotely and Earn Weekly</Title>
  <Tagline>Another Fake Job Scam Pretending To Be From Prof. Hennigan</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><br><p><span>Recently, the Division of Information Technology(DoIT) received multiple reports of job phishing emails from a Gmail account. The phishers are pretending to offer a research assistant  job. Below is an example of the email. For privacy purposes, we removed the To field.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: "Michael J. Tagler" &lt;<a href="mailto:jasonharvey001@gmail.com">jasonharvey001@gmail.com</a>&gt;</span></p><p><span>Date: Tue, 30 Aug 2022 22:43:38 +0800</span></p><p><span>Subject: Work Remotely and Earn Weekly</span></p><p> </p><p><span>University of Maryland, Baltimore County, The Office of the Department of Economics urgently needs the services of students to work remotely as research assistants and get paid weekly. The position is served remotely and assignments can be carried out in your leisure time. The position is open to students from any department of the institution UMBC. To proceed with the application process, contact Professor Christopher Hennigan now at (210) 701-1852 via text message stating your full name, email address, year of study, and department to receive the job description and further application requirements.</span></p><p> </p><p><span>Best Regards,</span></p><p> </p><p><span>Professor Christopher Hennigan</span></p><p><span>Department: Chemical Engineering</span></p><p><span>Technology Research Center,</span></p><p><span>Room 253</span></p><p><span>(210)701-1852</span></p><p><span>University of Maryland, Baltimore County</span></p><p> </p><br></td></tr></tbody></table></div><br><p><span>THIS JOB OFFER IS NOT REAL!</span><span> </span></p><ul><li><p><span>The From header says it is from Michael J. Tagler with the email address of </span><a href="mailto:jasonharvey001@gmail.com" rel="nofollow external" class="bo"><span>jasonharvey001@gmail.com</span></a><span>.  This is not impossible, but it is odd.</span></p></li><li><p><span>The signature block at the end says the message is from Prof. Hennigan in Chemical Engineering.  Why would a professor of Chemical Engineering be advertising for a research assistant in economics?</span></p></li><li><p><span>Why would a Prof. Hennigan be using an account named “Michael J. Tagler” with the email address of </span><a href="mailto:jasonharvey001@gmail.com" rel="nofollow external" class="bo"><span>jasonharvey001@gmail.com</span></a><span>?</span></p></li><li><p><span>Why would Prof. Hennigan’s office number </span></p></li><ul><li><p><span>be a non-UMBC phone number?</span></p></li><li><p><span>have an area code for the San Antonio area of Texas?</span></p></li></ul><li><p><span>If you look up Christopher Hennigan at </span><a href="https://my.umbc.edu" rel="nofollow external" class="bo"><span>https://my.umbc.edu</span></a><span>, you will find that his office is in ENG321, not TRC253</span></p></li><li><p><span>Campus job offers are posted at </span><a href="https://careers.umbc.edu/handshake" rel="nofollow external" class="bo"><span>https://careers.umbc.edu/handshake</span></a><span>, not broadcast in email messages.</span></p></li></ul><br><p><span>If you respond to this message, they will likely send you a check to deposit.</span><span> DO NOT DEPOSIT THE CHECK!</span><span> If you have shared any banking information, </span><span>CONTACT YOUR BACK IMMEDIATELY!</span></p><br><p><span>If you have received any message similar to the one listed above, please forward it with its headers to</span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. For instructions, visit </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>If you need further assistance, please contact us at </span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><p><span>__________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity.</span></a></p><br><br></div>
]]>
  </Body>
  <Summary>Recently, the Division of Information Technology(DoIT) received multiple reports of job phishing emails from a Gmail account. The phishers are pretending to offer a research assistant  job. Below...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/127811/guest@my.umbc.edu/45d9dfcead08d3ca2ad324aa7cb76649/api/pixel</TrackingUrl>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 20 Sep 2022 17:50:38 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="127685" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/127685">
  <Title>Phishing Alert: Part-Time Student Administrative Assistant</Title>
  <Tagline>PLEASE look for jobs at https://careers.umbc.edu/handshake/</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><span>Recently, the Division of Information Technology(DoIT) received multiple reports of job phishing emails from a Gmail account. The phishers are pretending to offer a Part-Time Student Administrative Assistant job. Below is an example of the email. For privacy purposes, we removed the To field.</span><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: </span><span>Larry Grace</span><span> &lt;<a href="mailto:lg384399@gmail.com">lg384399@gmail.com</a>&gt;</span></p><p><span>Date: Fri, Sep 16, 2022 at 4:02 PM</span></p><p><span>Subject: Part-Time Student Administrative Assistant Needed</span></p><p><span>To:</span></p><p> </p><p> </p><p><span>The service of a student assistant is urgently required to work part-time and get paid $315 weekly. Tasks will be carried out remotely and work time is 8 hours in a week. </span></p><p><span>If interested, send a copy of your updated resume and a functional google chat email address to our Department of Sociology via this email address to proceed further on the job roles/responsibilities.</span></p><p> </p><p> </p><p> </p><p><span>Regards</span></p><p><span>Marina Adler</span></p><p><span>Professor of Sociology</span></p><p><span>Department Of Sociology </span></p></td></tr></tbody></table></div><br><p><span>THIS JOB OFFER IS NOT REAL!</span><span> </span></p><ul><li><p><span>Positions at UMBC are advertised at </span><a href="https://careers.umbc.edu/handshake/" rel="nofollow external" class="bo"><span>https://careers.umbc.edu/handshake/</span></a><span>.  They are not dispersed to all available email addresses.</span></p></li><li><p><span>Why would email from Prof. Adler have a From address of: </span><span>Larry Grace</span><span> &lt;<a href="mailto:lg384399@gmail.com">lg384399@gmail.com</a>&gt;</span><span>?</span></p></li><li><p><span>Why not use the phone instead of Google Chat?</span></p></li><li><p><span>Even if Prof. Adler wanted to use Google Chat,she must already have your UMBC address in Google Mail.  She doesn’t need to ask for another one.</span></p></li></ul><br><p><span>If you respond to this message, they will likely send you a check to deposit.</span><span> DO NOT DEPOSIT THE CHECK!</span><span> If you have shared any banking information, </span><span>CONTACT YOUR BACK IMMEDIATELY!</span></p><br><p><span>If you have received any message similar to the one listed above, please forward it with its headers to</span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. For instructions, visit </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>If you need further assistance, please contact us at </span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><p><span>__________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity.</span></a></p></div>
]]>
  </Body>
  <Summary>Recently, the Division of Information Technology(DoIT) received multiple reports of job phishing emails from a Gmail account. The phishers are pretending to offer a Part-Time Student...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/127685/guest@my.umbc.edu/cd9ecd47b7062e4fbc11e7d3777cde8d/api/pixel</TrackingUrl>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Fri, 16 Sep 2022 16:56:37 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="127319" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/127319">
  <Title>Job Scam Alert: Research Assistant Position</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span><br></span></p><p> </p><p><span>Recently, the Division of Information Technology(DoIT) received a report of job phishing emails from a Gmail account (</span><span><span><a href="mailto:nikkijoy39@gmail.com">nikkijoy39@gmail.com</a></span>) . The phishers are pretending to offer a job as a Research Assistant. Below is an example of the email. For privacy purposes, we removed the To field.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: nikki joy &lt;<a href="mailto:nikkijoy39@gmail.com">nikkijoy39@gmail.com</a>&gt;</span></p><p> </p><p><span>University of Maryland, Baltimore County, The Office of the Department of Economics urgently needs the services of students to work remotely as research assistants and get paid weekly. The position is served remotely and assignments can be carried out in your leisure time. The position is open to students from any department of the institution UMBC. To proceed with the application process, contact Professor Christopher Hennigan now at  (210) 701-1852 via text message stating your full name, email address, year of study, and department to receive the job description and further application requirements.</span></p><p> </p><p><span> </span></p><p> </p><p><span>Best Regards,</span></p><p> </p><p><span> </span></p><p> </p><p><span>Professor Christopher Hennigan</span></p><p> </p><p><span>Department: Chemical Engineering</span></p><p> </p><p><span>Technology Research Center,  </span></p><p> </p><p><span>Room 253</span></p><p> </p><p><span>(210)701-1852</span></p><p> </p><p><span>University of Maryland, Baltimore County</span></p><p> </p><p> </p><br></td></tr></tbody></table></div><br><p><span>THIS JOB OFFER IS NOT REAL!</span><span> </span></p><p><span>Red Flags</span></p><ul><li><p><span>No legitimate job offer will ask you to reply by text message.  This is intended to make the communication harder to detect and to document.</span></p></li><li><p><span>An office phone in UMBC’s Technology Resource Center will not have a 210 area code (San Antonio, Texas).</span></p></li><li><p><span>Campus job offers are supposed to get posted at Handshake (</span><a href="https://careers.umbc.edu/handshake/" rel="nofollow external" class="bo"><span>https://careers.umbc.edu/handshake/</span></a><span>), not sent out as spam to various addresses.</span></p></li><li><span>Look at the contact at the end of the message.  Prof. Hennigan is listed as a member of the Chemical Engineering department.  He is unlikely to be looking for a research assistant for the Department of Economics.<br></span></li></ul><br><br><p><span>If you respond to this message, they may send you a check to deposit.</span><span> DO NOT DEPOSIT THE CHECK!</span><span> If you have shared any banking information, </span><span>CONTACT YOUR BACK IMMEDIATELY!</span></p><br><p><span>If you have received any message similar to the one listed above, please forward it with its headers to</span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. For instructions, visit </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>If you need further assistance, please contact us at </span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><p><span>__________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity.</span></a></p><br><br></div>
]]>
  </Body>
  <Summary>   Recently, the Division of Information Technology(DoIT) received a report of job phishing emails from a Gmail account (nikkijoy39@gmail.com) . The phishers are pretending to offer a job as a...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/127319/guest@my.umbc.edu/16881ddf7deefcc2ba4742915ec30f85/api/pixel</TrackingUrl>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 06 Sep 2022 15:50:52 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="126949" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/126949">
  <Title>All Students Req'd to Enroll in Duo by End of AY 2022-23</Title>
  <Tagline>MFA account security is optional now, but highly recommended</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><span><p><span>As part UMBC’s </span><a href="https://itsecurity.umbc.edu/" rel="nofollow external" class="bo"><span>ongoing efforts</span></a><span> to keep the campus safe online, the Division of Information Technology (DoIT) will require that all students be enrolled in the campus’ Duo multi-factor authentication (MFA) account security service by the end of the 2022-23 academic year. All employees have been required to use Duo </span><a href="https://doit.umbc.edu/news/post/84789/" rel="nofollow external" class="bo"><span>since 2019</span></a><span>, as part of their </span><a href="https://doit.umbc.edu/news/?id=61700" rel="nofollow external" class="bo"><span>obligation</span></a><span> to protect sensitive, personally identifiable information.</span></p><br><p><span>While any student can enroll now, </span><span>DoIT will be working to enroll students, in phases, with expected completion by the end of the academic year. </span><span>DoIT’s Technology Support Center (TSC) will also send reminders via </span><span>my</span><span>UMBC.</span></p><br><p><span>Duo multi-factor authentication (MFA) greatly increases the security of your account by adding an extra layer of protection to the login procedure. With Duo MFA, your account will require you to have a second-factor device physically unique to you, such as a smartphone or even a tablet in your possession to log in. When you log in, your second-factor device will prompt you to approve your online login. Without approval through your second-factor device, any fraudulent attempts to log into your account are denied, thus preventing unauthorized access to your account and data.</span></p><br><p><span>To learn how to activate Duo today, visit </span><a href="http://my.umbc.edu/go/duo" rel="nofollow external" class="bo"><span>my.umbc.edu/go/duo</span></a><span>.</span></p><br><p><span>If you have further questions, please contact the TSC by either submitting a support request at </span><a href="http://my.umbc.edu/help" rel="nofollow external" class="bo"><span>my.umbc.edu/help</span></a><span> or calling (410) 455-3838.</span></p><div><span><br></span></div></span></div>
]]>
  </Body>
  <Summary>As part UMBC’s ongoing efforts to keep the campus safe online, the Division of Information Technology (DoIT) will require that all students be enrolled in the campus’ Duo multi-factor...</Summary>
  <Website>https://itsecurity.umbc.edu</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/126949/guest@my.umbc.edu/c50c6e63ce9403a012705f0acf5d9e11/api/pixel</TrackingUrl>
  <Tag>duo</Tag>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>4</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 22 Aug 2022 10:34:31 -0400</PostedAt>
  <EditAt>Tue, 14 Feb 2023 14:04:23 -0500</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="126892" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/126892">
    <Title>Potential Account Data Breach: QuestionPro</Title>
    <Tagline>Hackers attempt extortion with unverified database</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><div>In May 2022, the survey website QuestionPro was the target of an extortion attempt relating to an alleged data breach. Over 100GB of data containing 22 million unique email addresses (some of which appear to be generated by the platform) are alleged to have been extracted from the service, along with IP addresses, browser user agents, and results relating to surveys. QuestionPro would not confirm whether a breach had occurred (although they did confirm they were the target of an extortion attempt), so the data has been flagged as "unverified" and may have been sourced from another location.</div><div><br></div><div>Of the accounts listed, approximately 150 UMBC accounts were indicated in this potential breach. The victims are being notified via their UMBC emails. If you have an account with QuestionPro, please contact them to see if you have been affected by this breach.</div><div><br></div><div>More information on the QuestionPro potential breach (and subsequent extortion attempts) can be seen at an article from Bleeping Computer: <a href="https://www.bleepingcomputer.com/news/security/hackers-try-to-extort-survey-firm-questionpro-after-alleged-data-theft/">https://www.bleepingcomputer.com/news/security/hackers-try-to-extort-survey-firm-questionpro-after-alleged-data-theft/</a></div><div><br></div><div>If you have any questions or concerns, please email us at <a href="mailto:security@umbc.edu">security@umbc.edu</a>. Information about this potential breach was provided to us by Have I Been Pwned (HIBP): <a href="https://haveibeenpwned.com">https://haveibeenpwned.com</a>.</div><div><br></div><div><hr><span>Follow us on myUMBC: </span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></div></div>
      ]]>
    </Body>
    <Summary>In May 2022, the survey website QuestionPro was the target of an extortion attempt relating to an alleged data breach. Over 100GB of data containing 22 million unique email addresses (some of...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/126892/guest@my.umbc.edu/cc64bc604676fef6869b0e3eacd4b38c/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <ThumbnailUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/126/892/49455e554a0c391b9b24bda967d795da/xxlarge.jpg?1660756586</ThumbnailUrl>
    <ThumbnailUrl size="xlarge">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/126/892/49455e554a0c391b9b24bda967d795da/xlarge.jpg?1660756586</ThumbnailUrl>
    <ThumbnailUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/126/892/49455e554a0c391b9b24bda967d795da/large.jpg?1660756586</ThumbnailUrl>
    <ThumbnailUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/126/892/49455e554a0c391b9b24bda967d795da/medium.jpg?1660756586</ThumbnailUrl>
    <ThumbnailUrl size="small">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/126/892/49455e554a0c391b9b24bda967d795da/small.jpg?1660756586</ThumbnailUrl>
    <ThumbnailUrl size="xsmall">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/126/892/49455e554a0c391b9b24bda967d795da/xsmall.jpg?1660756586</ThumbnailUrl>
    <ThumbnailUrl size="xxsmall">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/126/892/49455e554a0c391b9b24bda967d795da/xxsmall.jpg?1660756586</ThumbnailUrl>
    <PawCount>1</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Wed, 17 Aug 2022 13:19:51 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="126772" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/126772">
  <Title>Phishing Alert:  Fake Announcement from &#8216;Admin Server&#8217;</Title>
  <Tagline>Don't Click The Button!</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span>Recently, the Division of Information Technology(DoIT) received reports of a phishing email. The scammers sending these emails are using a forged From address of:</span></p><blockquote><blockquote><p><span>'Admin Server &lt;<a href="mailto:security@umbc.edu">security@umbc.edu</a>&gt;'. </span></p></blockquote></blockquote><p><span><br></span></p><p><span>Below is an example of such an email. For privacy reasons, we removed the recipient’s information..</span></p><br><hr><p><span>Please confirm your email account with umbc.edu    </span></p><p><span>@umbc.edu </span></p><p><span>  </span></p><p><span>Attention:  </span></p><p><span>Due to the latest regulations concerning online safety and KYC </span></p><p><span>procedure ( Know your Customer ), we are sending this urgent notice to all </span></p><p><span>Email Administrator users, in order to filter real and active accounts. </span></p><p><span>In order to avoid your @umbc.edu address from being shut down, </span></p><p><span>please confirm you are still using your account now: </span></p><p><span>  </span></p><p><span>Confirm email account </span></p><p><span>  </span></p><p><span>  </span></p><p><span>By logging in, you are confirming that you are still using our services and that the person registered is the person using them.</span></p><br><hr><p><span>Here is a screenshot of the same message:</span></p><hr><p><span><span><img src="https://lh3.googleusercontent.com/jNzzTta2l28GfVaOCwx4mxbBmODZEm8W4BiIWweK4SBwTvj-yYpjoJEhMUHT3iswBXDskBQHQ0_EoaW1K3iMYO3_aOAA_V8Lc9oVL0xloHxFgNR5mRmVvZuokK3EIMDOagYoVWhNepoPhhiU6nrsiC8" width="624" height="696" style="max-width: 100%; height: auto;"></span></span></p><hr><br><br><br><br><br><p><span>Please note that the Division of Information Technology did not send this email.</span><span> Visible red flags in this email:</span></p><ol><li><p><span>The wording.  </span><span>The message is being sent to ‘Email Administrator Users’.  That does not really make sense.  There is such a thing as an Email Administrator (UMBC has several of them) and such a thing as an Email User (UMBC has a </span><span>lot</span><span> of these), but no  ‘Email Administrator Users’.</span></p></li><li><p><span>The link.  </span><span>If you move your mouse over the button that says ‘Confirm email account’ </span><span>without clicking</span><span>, and look at the bottom left of your email window, you will see a link to ‘</span><a href="https://ipfs.fleek.co/ipfs/QmVTaVBV6f4fVDqvviHL8CBuqpX5ZJX37YVwdNWxC5FDBG/index0000.html#@umbc.edu" rel="nofollow external" class="bo"><span>https://ipfs.fleek.co/ipfs/QmVTaVBV6f4fVDqvviHL8CBuqpX5ZJX37YVwdNWxC5FDBG/index0000.html#@umbc.edu</span></a><span>’.  Use this ‘mouse hover and peek trick before clicking on anything.  This link goes to a website at ipfs.fleek.co.  That </span><span>.co</span><span> at the end is not the same as a </span><span>.com</span><span>.  Two-letter endings are generally codes for specific countries (</span><a href="https://en.wikipedia.org/wiki/Country_code_top-level_domain" rel="nofollow external" class="bo"><span>https://en.wikipedia.org/wiki/Country_code_top-level_domain</span></a><span>)  The country code ‘</span><span>.co</span><span>’ is assigned to Columbia.  If you can’t think of a good reason for UMBC’s DoIT to refer you to a server registered out of Columbia to ‘confirm’ your email account,  BE SUSPICIOUS!</span></p></li></ol><p><span>When you become suspicious, send an email to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.  (Don’t worry, when <em>you </em>send it, it will go to the </span><span>real </span><span>UMBC IT security group!</span><span>) or call the Technology Support Center at 410-455-3838.  </span><span>DO NOT CLICK ON THE LINK!</span></p><br><p><span>For more information about phishing, visit:</span><a href="https://itsecurity.umbc.edu/critical/?id=98136" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?id=98136</span></a><span>.</span></p><br><p><span>If you have received any message similar to the one listed above, please forward it with its headers to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span>. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>______________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></p><br><br><br></div>
]]>
  </Body>
  <Summary>Recently, the Division of Information Technology(DoIT) received reports of a phishing email. The scammers sending these emails are using a forged From address of:    'Admin Server...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/126772/guest@my.umbc.edu/d78116fb321ef3a12ba0cbe51fe4e576/api/pixel</TrackingUrl>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 09 Aug 2022 15:21:30 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="126611" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/126611">
    <Title>Likely Phishing Website Found</Title>
    <Tagline>It Looks Designed To Attack UMBC</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><div><span>The UMBC Division of Information Technology (DoIT) has been notified of a website that appears to have been set up for future phishing attacks on UMBC account holders.  If you see a link or any reference to this site, </span><span>DO NOT CLICK ON IT!</span></div><div><span><br></span></div><p><span>The site is: </span><span>umbc. edu. sunward-travel. com</span><span>  (Spaces are inserted here in the site’s address to ensure that it will not show up as a link in your browser.)</span></p><br><p><span>The site’s SSL certificate, the thing responsible for the lock icon in your browser’s navigation bar, is valid through this summer until </span><span>Sep 13, 2022</span><span>. The time span suggests that it could be used for phishing attacks towards the end of the summer when people often take vacations, or during the start of classes when people are getting lots of email as the academic schedules get sorted out.  </span></p><br><p><span>The site name contains the text ‘umbc.edu’, though not as part of the UMBC domain.  If someone receives an email referencing this site, a quick glance can pick up on the ‘umbc’ and make the site seem legitimate.  </span><span>It is not a UMBC site!</span></p><br><p><span>If you receive a message with a link to this site, please forward it to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. </span></p><p><span>DO NOT CLICK ON IT!</span></p><br><br><p><span>References:</span></p><br><p><span>Understanding Padlocks on Browsers</span></p><p><span><a href="https://medium.com/xebia-engineering/understanding-padlocks-on-browsers-ba411e5b826">https://medium.com/xebia-engineering/understanding-padlocks-on-browsers-ba411e5b826</a></span></p><p><span>HTTPS and the Lock Icon</span></p><p><span><a href="https://crypto.stanford.edu/cs142/lectures/24-https.pdf">https://crypto.stanford.edu/cs142/lectures/24-https.pdf</a></span></p></div>
      ]]>
    </Body>
    <Summary>The UMBC Division of Information Technology (DoIT) has been notified of a website that appears to have been set up for future phishing attacks on UMBC account holders.  If you see a link or any...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/126611/guest@my.umbc.edu/4d4f28b853694c7d0244a95923c8d648/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>7</PawCount>
    <CommentCount>1</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Fri, 29 Jul 2022 16:58:18 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="126360" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/126360">
    <Title>Job Scam:  JOB OFFER -- Department of Biological Sciences</Title>
    <Tagline>Same Fake Job Offer - Different Fake Sender</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><span>Recently, the Division of Information Technology(DoIT) received multiple reports of a job phishing email. The scammers sending these emails are impersonating Professor Hoffman of the Department of Biological Sciences. Below is an example of such an email. For privacy purposes, we removed the To field.</span><br><hr><p><span>From: CAMPUS JOBS &lt;<a href="mailto:roger.nicholson911@gmail.com">roger.nicholson911@gmail.com</a>&gt;</span></p><p><span>Date: Wed, Jul 20, 2022 at 5:05 PM</span></p><p><span>Subject: JOB OFFER</span></p><p><span>To:</span></p><p> </p><p> </p><p><span>The service of a student administrative assistant is urgently required to work part-time and get paid $315 weekly. Tasks will be carried out remotely and work time is 14 hours per week.</span></p><p><span>If interested, submit your updated resume, a google hangouts email address, and a functional whatsapp number to our Department of Biological Sciences via this email address to proceed.</span></p><p> </p><p><span>Sincerely</span></p><p><span>Kathleen Hoffman, Ph.D.</span></p><p><span>Affiliate Professor, Biological Sciences</span></p><p><span>Professor, Mathematics and Statistics</span></p><p><span>Department of Biological Science</span></p><p><span>Office: MP434    </span></p><br><hr><br><p><strong><span>Please note that neither the Biological Sciences Department nor Professor Hoffman sent this message.</span></strong><span> Three visible red flags in this email are:</span></p><ol><li><p><strong><span>The From address is not a UMBC email address</span></strong><span><strong>.</strong> If the Biological Sciences Department or Prof. Hoffman were sending this email, the From address would have been a UMBC email address. However, it was sent from &lt;</span><span><a href="mailto:roger.nicholson911@gmail.com">roger.nicholson911@gmail.com</a></span><span>&gt;, which is not a UMBC affiliate. Also, “roger.nicholson” is not the same as “Kathleen Hoffman”.  Please note that the From address can be spoofed, even if it appears to originate from a UMBC email. Therefore, always check with DoIT (</span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span>) or email/contact the impersonated person on a completely different email when you see a conflict in the address.  For reference, use UMBC’s online directory at <a href="https://www2.umbc.edu/search/directory/advanced/">https://www2.umbc.edu/search/directory/advanced/</a></span></p></li><li><p><strong><span>Whatsapp number.</span></strong><span>  A lot of scammers will ask for your WhatsApp number. If their number gets reported, they can easily get a new one. The same can be said for an email address; however, if their email is blocked, they will lose responses from other phishing email recipients. If you ever receive a job offer asking for a WhatsApp number or a phone number in general,  BE SUSPICIOUS!</span></p></li><li><p><strong><span>The email template.</span></strong><span> This template is very common. After a quick Google search, we found a few Job scams articles with the same template. So if you are ever in doubt, Google it! Just copy-and-paste several sentences of the text into Google.  </span><em><strong><span>UMBC will not use a known phishing template to offer you a job opportunity.</span></strong></em></p></li></ol><br><p><span>For more information about phishing, visit:</span><a href="https://itsecurity.umbc.edu/critical/?id=98136" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?id=98136</span></a><span>.</span></p><br><p><span>If you have received any message similar to the one listed above, please forward it with its headers to</span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span>. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>______________________________________________________________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></p><br><br><br></div>
      ]]>
    </Body>
    <Summary>Recently, the Division of Information Technology(DoIT) received multiple reports of a job phishing email. The scammers sending these emails are impersonating Professor Hoffman of the Department of...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/126360/guest@my.umbc.edu/94ed9f2e9e425466091517f6d2e64314/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Wed, 20 Jul 2022 18:08:42 -0400</PostedAt>
    <EditAt>Wed, 20 Jul 2022 18:11:05 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="126345" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/126345">
  <Title>Phishing Alert: Item shared with you</Title>
  <Tagline>Beware Of Unexpected Attachments!</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span>Recently, the Division of Information Technology(DoIT) has seen an increase in phishing attacks where items(docs, pdf, spreadsheets) are shared with the UMBC community. An example of such messages can be found below. For privacy purposes, the To field was removed.</span></p><hr><p><span>From: Christine Bourne (via Google Drive) &lt;<a href="mailto:drive-shares-dm-noreply@google.com">drive-shares-dm-noreply@google.com</a>&gt;</span></p><p><span>Date: Tue, Jul 19, 2022 at 6:39 PM</span></p><p><span>Subject: Item shared with you: "2022resource.pdf"</span></p><p><span>To: </span></p><p><span>Christine Bourne shared an item Christine Bourne (<a href="mailto:bournec@mpsct.org">bournec@mpsct.org</a>) has shared the following item: </span><span>2022resource.pdf</span></p><p> </p><div><table><colgroup></colgroup><tbody><tr><td><p><span>Christine Bourne is outside your organization. </span><a href="https://drive.google.com/file/d/110lb4Xb4S3HdOgQDqPLPV9XTmh4VVSEu/view?usp=sharing_eip_m&amp;ts=62d732b6" rel="nofollow external" class="bo"><span>Open</span></a><span> If you don't want to receive files from this person, </span><a href="https://drive.google.com/drive/blockuser?blockerEmail=anadah1@umbc.edu&amp;blockeeEmail=bournec@mpsct.org&amp;usp=sharing_eib_m" rel="nofollow external" class="bo"><span>block the sender</span></a><span> from Drive</span></p></td></tr></tbody></table></div><p><span>Google LLC, 1600 Amphitheatre Parkway, Mountain View, CA 94043, USA</span></p><p> </p><div><table><colgroup></colgroup><tbody><tr><td><p><span>You have received this email because <a href="mailto:bournec@mpsct.org">bournec@mpsct.org</a> shared a file or folder located in Google Drive with you.</span></p><p> </p></td></tr></tbody></table></div><p> </p><hr><p><span>There is no ‘Christine Bourne’ in the UMBC directory (</span><a href="https://www2.umbc.edu/search/directory/advanced/" rel="nofollow external" class="bo"><span>https://www2.umbc.edu/search/directory/advanced/</span></a><span>) or otherwise associated with UMBC.  Most individuals who have reported this document do not know the sender. Whenever you receive messages like this, ask yourselves:</span></p><ol><li><p><span>Was I expecting this document?</span><span> Before receiving a document, you were most likely notified by the individual sending the document. If you were not expecting it, check with the sender if you know them personally. If you do not know the sender, report it to &lt;</span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>&gt;.</span></p></li><li><p><span>Do I know this email and name? </span><span>Remember, names can be spoofed, and email addresses too! If you do not recognise the name or email,  forward the message to &lt;</span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>&gt; immediately.</span><span> DO NOT OPEN IT!</span></p></li><li><p><span>Is there any online information about this account?</span><span> By doing a quick Google search, we can see that &lt;</span><span><a href="mailto:bournec@mpsct.org">bournec@mpsct.org</a></span><span>&gt; doesn’t belong to Christine Bourne. If you see a discrepancy like this,  forward the message to &lt;</span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>&gt; immediately, </span><span> DO NOT OPEN IT!</span></p></li></ol><p><span>These are not novel attacks, below are some examples of previously reported campaigns:</span></p><ul><li><p><span>145_001.pdf shared by &lt;</span><a href="mailto:tmusgrave@slusd.us" rel="nofollow external" class="bo"><span>tmusgrave@slusd.us</span></a><span>&gt; </span></p></li><li><p><span>NEW COVID-19 PROTOCOLS.docx shared by &lt;</span><a href="mailto:helptool05@gmail.com" rel="nofollow external" class="bo"><span>helptool05@gmail.com</span></a><span>&gt;</span></p></li><li><p><span>DC.docx shared by &lt;</span><a href="mailto:helpd8708@gmail.com" rel="nofollow external" class="bo"><span>helpd8708@gmail.com</span></a><span>&gt;</span></p></li><li><p><span>Departmental distribution list.docx &lt;</span><a href="mailto:ithelpdesko400@gmail.com" rel="nofollow external" class="bo"><span>ithelpdesko400@gmail.com</span></a><span>&gt;</span></p></li><li><p><span>Departmental distribution list.docx &lt;</span><span><a href="mailto:ithelpdesko4000@gmail.com">ithelpdesko4000@gmail.com</a></span><span>&gt;</span></p></li><li><p><span>Departmental distribution list.docx &lt;</span><span><a href="mailto:ithelppdesk007@gmail.com">ithelppdesk007@gmail.com</a></span><span>&gt;</span></p></li></ul><p><span>If you have any questions, please feel free to contact us at </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a>.</span></p><p><span>______________________________________________________________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></p></div>
]]>
  </Body>
  <Summary>Recently, the Division of Information Technology(DoIT) has seen an increase in phishing attacks where items(docs, pdf, spreadsheets) are shared with the UMBC community. An example of such messages...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/126345/guest@my.umbc.edu/1608a77d3f40e2d6ad18fa8a80e1c421/api/pixel</TrackingUrl>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Wed, 20 Jul 2022 11:30:21 -0400</PostedAt>
</NewsItem>
</News>
