<?xml version="1.0"?>
<News hasArchived="false" page="5" pageCount="21" pageSize="10" timestamp="Sun, 26 Apr 2026 10:05:36 -0400" url="https://dev.my.umbc.edu/groups/doit/posts.xml?page=5&amp;tag=notice">
  <NewsItem contentIssues="false" id="115555" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/115555">
    <Title>Job Phishing Alert: Department of Biological Sciences</Title>
    <Tagline>An Example of Red Flags In A Phishing Message</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>Recently, the Division of Information Technology(DoIT) received multiple reports of a job phishing email. The scammers sending these emails are impersonating Professor Mendelson of the Department of Biological Sciences. Below is an example of such an email. For privacy purposes, we removed the To field.</span></p><p> </p><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: Majoro Diarra Stanley &lt;<a href="mailto:majorodstanley@gmail.com">majorodstanley@gmail.com</a>&gt;</span></p><p><span>Date: Wed, Oct 27, 2021 at 6:07 PM</span></p><p><span>Subject: REMOTE JOB OFFER</span></p><p><span>To:</span></p><br><br><p><span>The services of a student administrative assistant is urgently required to work part-time in Mendelson Laboratory and get paid $300 weekly. Tasks will be carried out remotely and work time is 7 hours/week.</span></p><p><span>If interested, send a copy of your updated resume and a functional whatsapp number to Mendelson Laboratory via this email address to proceed with the job description/responsibilities.</span></p><p> </p><p><span>Sincerely</span></p><p><span>Tamra Mendelson</span></p><p><span>Professor, Biological Sciences</span></p><p><span>Department of Biological Sciences</span></p><p><span>University of Maryland, Baltimore County</span></p><p><span>Office: Biological Sciences 426</span></p><p><span>Lab: Mendelson Lab BS 402/427/428</span></p><br></td></tr></tbody></table></div><br><p><span>Please note that the Biological Sciences Department or Professor Mendelson did not send this message. Three visible red flags in this email are:</span></p><ol><li><p><span>The From address is not a UMBC email. If the Biological Sciences Department or Prof. Mendelson were sending this email, the From address would have been a UMBC email address. However, it was sent from &lt;</span><span><a href="mailto:majorodstanley@gmail.com">majorodstanley@gmail.com</a></span><span>&gt;, which is not a UMBC affiliate. Please note that it could have been spoofed, even if it appears to originate from a UMBC email. Therefore, always check with DoIT(</span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span>) or email/contact the impersonated person on a completely different email when you see a conflict in the address.</span></p></li><li><p><span>Whatsapp number.  A lot of scammers will ask for your WhatsApp number. If their number gets reported, they could easily create a new one. The same can be said for an email address; however, if their email is blocked, they will lose responses from other phishing email recipients. If you ever receive a job offer asking for a WhatsApp number or a phone number in general,  BE SUSPICIOUS!</span></p></li><li><p><span>The email template. This template is very common. After a quick Google search, we found a few Job scams articles with the same template. So if you are ever in doubt, Google it! UMBC will not use a known phishing template to offer you a job opportunity.</span></p></li></ol><br><p><span>For more information about phishing, visit:</span><a href="https://itsecurity.umbc.edu/critical/?id=98136" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?id=98136</span></a><span>.</span></p><br><p><span>If you have received any message similar to the one listed above, please forward it with its headers to</span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span>. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>______________________________________________________________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></p><br><br><br></div>
      ]]>
    </Body>
    <Summary>Recently, the Division of Information Technology(DoIT) received multiple reports of a job phishing email. The scammers sending these emails are impersonating Professor Mendelson of the Department...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/115555/guest@my.umbc.edu/79db6b5e7e5828bb7eda3580d6639140/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>1</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Tue, 07 Dec 2021 14:53:07 -0500</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="113398" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/113398">
    <Title>Account data breach: Thingiverse</Title>
    <Tagline>Another Breach Of An Online Service</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>In 2020, the </span><span>3D model sharing service Thingiverse suffered a data breach. </span><span><span>On October 13, 2021, the data compromised in the breach was posted in various hacker forums.</span> This breach contained data for approximately 228 thousand </span><span>customers. The information included usernames, </span><span>email addresses, names, passwords, IP addresses, and geographical addresses.</span></p><br><p><span>The compromised data was shared in an online hacking forum. Four UMBC accounts were victims of this breach. The victims are being notified via their UMBC emails and/or their alternate emails. If you have a Thingiverse account, please contact them to see if you have been affected by this breach.</span></p><br><p><span>To see if you were involved in any other breach, visit: </span><a href="https://haveibeenpwned.com/" rel="nofollow external" class="bo"><span>https://haveibeenpwned.com/</span></a><span>.</span></p><br><br><p><span>More about Thingiverse data breach:</span></p><p><span><a href="https://www.databreachtoday.com/thingiverse-data-leak-affects-25-million-subscribers-a-17729">https://www.databreachtoday.com/thingiverse-data-leak-affects-25-million-subscribers-a-17729</a></span></p><br><br><p><span>If you have any questions or concerns, email us at: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>Information about this breach was provided to us by Have I Been Pwned(HIBP). </span></p><p> </p><p><span>______________________________________________________________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></p><br><br><br><br></div>
      ]]>
    </Body>
    <Summary>In 2020, the 3D model sharing service Thingiverse suffered a data breach. On October 13, 2021, the data compromised in the breach was posted in various hacker forums. This breach contained data...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/113398/guest@my.umbc.edu/c9fc8cf28cf8646c6eb6eeb9c24dcdde/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Mon, 18 Oct 2021 16:53:55 -0400</PostedAt>
    <EditAt>Tue, 19 Oct 2021 11:20:04 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="113146" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/113146">
  <Title>Commemorative Coin Spam</Title>
  <Tagline>Spam Claiming Celebrity Endorsement For Trump Coin</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><br><p><span>The UMBC Department of Information Technology (DoIT) received a report of spam invoking former President Trump, collectible coins, and the security-focused Telegram messaging system.  See  the example below:</span></p><br><br><p><span>Excerpt:</span></p><div><table><colgroup></colgroup><tbody><tr><td><p><span>Telegram just announced that TRUMP COIN will be added as their official payment method starting from 31th of January, 2022!</span></p><br><p><span>The skyrocket to 10.000$ will happen in the beginning of the next year!</span></p><br><p><span>They are running of of stock and here are the last few coins, almost 14 million coins were sold in the US these previous days.</span></p><br><p><span>We are honored that our President Trump’s face will be on the most powerful coin that will change the world.</span></p><br><p><span>The Trump Coin has been approved as the ONLY COIN that will change the HISTORY and all you need to do is to TRUST THE PLAN.</span></p><br><p><span>Get at least 25 coins for you and your family and be ready for new beginnings, claim them today because these are the last free stocks available!</span></p><br><p><span>Check availability and get yours here:</span></p><p><span></span></p></td></tr></tbody></table></div></div>
]]>
  </Body>
  <Summary>The UMBC Department of Information Technology (DoIT) received a report of spam invoking former President Trump, collectible coins, and the security-focused Telegram messaging system.  See  the...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/113146/guest@my.umbc.edu/35d631b8cd598571bdd2f508ddd12ac5/api/pixel</TrackingUrl>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 11 Oct 2021 12:17:52 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="113139" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/113139">
    <Title>Account data breach: LinkedIn</Title>
    <Tagline>Time To Change Your LinkedIn Password</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>Account data breach: LinkedIn </span></p><br><p><span>In April 2021, an employment-oriented online service, LinkedIn, was targeted by attackers who scraped data from hundreds of millions of public profiles and later sold them online. Whilst the scraping did not constitute a data breach, nor did it access any personal data not intended to be publicly accessible, the data was still monetized and later broadly circulated in hacking circles. The information included education levels, email addresses, genders, geographic locations, job titles, names, social media profiles. No financial information was leaked.</span></p><br><p><span>2029 UMBC accounts were victims of this scrape. The victims are being notified via their UMBC emails and/or their alternate emails. If you have a LinkedIn account, we suggest changing your password there and anywhere else that you used the same password.</span></p><br><p><span>To see if you were involved in any other breach, visit: </span><a href="https://haveibeenpwned.com/" rel="nofollow external" class="bo"><span>https://haveibeenpwned.com/</span></a><span>.</span></p><br><br><p><span>More about LinkedIn  data breach:</span></p><p><span><a href="https://www.businessinsider.com.au/linkedin-data-scraped-500-million-users-for-sale-online-2021-4">https://www.businessinsider.com.au/linkedin-data-scraped-500-million-users-for-sale-online-2021-4</a></span></p><p><span><a href="https://news.linkedin.com/2021/june/an-update-from-linkedin">https://news.linkedin.com/2021/june/an-update-from-linkedin</a></span></p><br><br><p><span>If you have any questions or concerns, email us at: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>Information about this scraped was provided to us by Have I Been Pwned(HIBP). </span></p><p> </p><p><span>______________________________________________________________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></p></div>
      ]]>
    </Body>
    <Summary>Account data breach: LinkedIn    In April 2021, an employment-oriented online service, LinkedIn, was targeted by attackers who scraped data from hundreds of millions of public profiles and later...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/113139/guest@my.umbc.edu/59b3d75390a08e7a3dab411a4eb26b79/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Mon, 11 Oct 2021 10:29:06 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="113138" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/113138">
  <Title>Phishing Alert: I need your quick response</Title>
  <Tagline>Tip: This Isn't Dr. Hrabowski</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span><br></span></p><br><p><span>The Division of Information Technology( DoIT) recently received reports about a phishing email impersonating Dr. Hrabowski. Below is an example of such an email. We removed the recipient’s information for privacy reasons.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: President Freeman A. Hrabowski, III &lt;<a href="mailto:msgrenaway7511@gmail.com">msgrenaway7511@gmail.com</a>&gt;</span></p><p><span>Date: Thu, Oct 7, 2021 at 3:04 PM</span></p><p><span>Subject: I need your quick response</span></p><p><span>To:</span></p><br><br><p><span>Hi &lt;Your Name&gt;, How’s your day going? Do you have time to chat now? If yes please send me your text phone number now.</span></p><br><p><span>Thanks.</span></p><br><p><span>President Freeman A. Hrabowski, III</span></p></td></tr></tbody></table></div><br><p><span>This email originated from &lt;</span><a href="mailto:msgrenaway7511@gmail.com" rel="nofollow external" class="bo"><span>msgrenaway7511@gmail.com</span></a><span>&gt;, which is not Dr. Hrabrowski’s email nor a UMBC email. So even though we would all love to have a chat with Dr. Hrabrowski, this is too good to be true.</span></p><br><p><span>If you have received any message similar to the one listed above, </span><span>DO NOT RESPOND</span><span>. Instead, please forward it with its headers to</span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><p><span>______________________________________________________________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></p><br><br></div>
]]>
  </Body>
  <Summary>The Division of Information Technology( DoIT) recently received reports about a phishing email impersonating Dr. Hrabowski. Below is an example of such an email. We removed the recipient’s...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/113138/guest@my.umbc.edu/948628d2adb4bf893b8c7aa5e3230846/api/pixel</TrackingUrl>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 11 Oct 2021 10:26:08 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="113136" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/113136">
  <Title>Phishing Alert: You have (#) new pending incoming emails</Title>
  <Tagline>A New Twist On Phishing</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span>The Division of Information Technology (DoIT) recently received reports of a new form of phishing campaign. This campaign informs recipients that they have “# new pending incoming emails” where # represents some actual number.  Below are examples of the different kinds of emails that we received. We removed the recipients’ information for privacy purposes.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: Email Administrator &lt;<a href="mailto:noreply-mailbox@umbc.edu">noreply-mailbox@umbc.edu</a>&gt;</span></p><p><span>Date: Sat, Sep 11, 2021 at 7:52 AM</span></p><p><span>Subject: You have (4) new pending incoming emails</span></p><p><span>To: &lt;<a href="mailto:CampusID@umbc.edu">CampusID@umbc.edu</a>&gt;</span></p><br><br><div><table><colgroup></colgroup><tbody><tr><td><p><span> </span></p></td></tr><tr><td><br><div><table><colgroup></colgroup><tbody><tr><td><br><div><table><colgroup></colgroup><tbody><tr><td><h2><span>You have (4) new pending incoming emails </span></h2></td><td><br></td></tr><tr><td><p><span>Your allowed Email Quota usage has been exceeded on your account.</span></p><p><span>&lt;CampusID&gt;</span><a href="mailto:jack@umbc.edu" rel="nofollow external" class="bo"><span>@umbc.edu</span></a></p><br><p><span>Please kindly verify your Human and not a robot by following the below link, so we can get your account running normal again. </span></p><p><span> </span></p></td><td><br></td></tr><tr><td colspan="2"><p><a href="https://sign-in-verification-929bb.web.app/#jack@umbc.edu" rel="nofollow external" class="bo"><span>Verify Email Account</span></a></p></td></tr></tbody></table></div><br></td></tr><tr><td><p><span> </span></p><p><span>If no action is taken, you may cease to receive incoming emails</span></p><p><span> </span></p><p><span>This Email was sent to &lt;CampusID&gt;@umbc.edu as a User from </span><a href="http://umbc.edu/" rel="nofollow external" class="bo"><span>umbc.edu</span></a><span> Mail Box Admin</span></p></td></tr></tbody></table></div><br></td></tr></tbody></table></div><br></td></tr></tbody></table></div><br><p><span>This example originated from </span><span>&lt;</span><a href="mailto:noreply-mailbox@umbc.edu" rel="nofollow external" class="bo"><span>noreply-mailbox@umbc.edu</span></a><span>&gt;, which looks like a UMBC account; however, this account was spoofed. An outside person created this @umbc.edu email for phishing purposes. </span></p><br><p><span>Below is another similar email that is spoofed. It originated from &lt;</span><a href="mailto:cpanel@umbc.edu" rel="nofollow external" class="bo"><span>cpanel@umbc.edu</span></a><span>&gt;, which is also not a UMBC account.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: Mail Delivery System &lt;<a href="mailto:cpanel@umbc.edu">cpanel@umbc.edu</a>&gt;</span></p><p><span>Date: Fri, Sep 10, 2021 at 9:09 AM</span></p><p><span>Subject: Mail delivery failed: &lt;CampusID&gt;@umbc.edu have 6 Pending incoming messages.</span></p><p><span>To: &lt;<a href="mailto:CampusID@umbc.edu">CampusID@umbc.edu</a>&gt;</span></p><br><br><p><span>You have Incoming Pending Messages</span></p><p><span>The following messages have been blocked by your mail-server due to validation error.</span></p><p><span>You have six pending messages .</span></p><p><span> </span></p><div><table><colgroup></colgroup><tbody><tr><td colspan="4"><br></td></tr><tr><td colspan="4"><p><span>Incoming  Messages:</span></p></td></tr><tr><td><p><span>Status :</span></p></td><td><p><span>Subject:</span></p></td><td><p><span>Time:</span></p></td><td><br></td></tr><tr><td><p><span> pending</span></p></td><td><p><a href="https://firebasestorage.googleapis.com/v0/b/lttt-b59d4.appspot.com/o/update%2FLight%20mail.html?alt=media&amp;token=61b2fbfd-c1ee-43c0-af51-26ac54a6c607#jack@umbc.edu" rel="nofollow external" class="bo"><span>Fwd: Payment </span><span> ------ </span><span>forwarded message</span><span> ---- </span></a><span> </span></p></td><td><p><span>07:17 am</span></p></td><td><br></td></tr><tr><td><p><span> pending</span></p></td><td><p><a href="https://firebasestorage.googleapis.com/v0/b/lttt-b59d4.appspot.com/o/update%2FLight%20mail.html?alt=media&amp;token=61b2fbfd-c1ee-43c0-af51-26ac54a6c607#jack@umbc.edu" rel="nofollow external" class="bo"><span>We didn't receive any reply from you CALL ME </span></a></p></td><td><p><span>07:21 am</span></p></td><td><br></td></tr><tr><td><p><span> pending</span></p></td><td><p><a href="https://firebasestorage.googleapis.com/v0/b/lttt-b59d4.appspot.com/o/update%2FLight%20mail.html?alt=media&amp;token=61b2fbfd-c1ee-43c0-af51-26ac54a6c607#jack@umbc.edu" rel="nofollow external" class="bo"><span>RE: Updated PI</span></a></p></td><td><p><span>08:19 am</span></p></td><td><br></td></tr><tr><td><p><span> pending</span></p></td><td><p><a href="https://firebasestorage.googleapis.com/v0/b/lttt-b59d4.appspot.com/o/update%2FLight%20mail.html?alt=media&amp;token=61b2fbfd-c1ee-43c0-af51-26ac54a6c607#jack@umbc.edu" rel="nofollow external" class="bo"><span>Zoom meeting request tomorrow</span></a></p></td><td><p><span>08:29 am</span></p></td><td><br></td></tr><tr><td><p><span> pending</span></p></td><td><p><a href="https://firebasestorage.googleapis.com/v0/b/lttt-b59d4.appspot.com/o/update%2FLight%20mail.html?alt=media&amp;token=61b2fbfd-c1ee-43c0-af51-26ac54a6c607#jack@umbc.edu" rel="nofollow external" class="bo"><span>NEW ORDER</span></a></p></td><td><p><span>10:27  am</span></p></td><td><br></td></tr><tr><td><p><span> pending  </span></p></td><td><p><a href="https://firebasestorage.googleapis.com/v0/b/lttt-b59d4.appspot.com/o/update%2FLight%20mail.html?alt=media&amp;token=61b2fbfd-c1ee-43c0-af51-26ac54a6c607#jack@umbc.edu" rel="nofollow external" class="bo"><span>FedEx Shipment</span></a></p></td><td><p><span>11:02 am</span></p></td><td><br></td></tr><tr><td colspan="4"><p><a href="https://firebasestorage.googleapis.com/v0/b/lttt-b59d4.appspot.com/o/update%2FLight%20mail.html?alt=media&amp;token=61b2fbfd-c1ee-43c0-af51-26ac54a6c607#jack@umbc.edu" rel="nofollow external" class="bo"><span>DELIVER ALL MAILS </span></a></p></td></tr></tbody></table></div><br><br><p><span>Note: The messages will be delivered within 1-2 hours after you receive a confirmation mail notice.</span></p><p><span>This message was sent by the MailDaemon server </span><a href="http://umbc.edu/" rel="nofollow external" class="bo"><span>umbc.edu</span></a><span> notification.</span></p><br><br><p><span>Thank you!</span></p><p><span> </span></p><p><span> </span></p><p><span>Copyright© 2021 Webmail, Inc.</span></p><br><br><br></td></tr></tbody></table></div><br><p><span>The links in both of these emails will take you to separate domains </span><span><a href="https://sign-in-verification-929bb.web.app">https://sign-in-verification-929bb.web.app</a></span><span> and </span><span><a href="https://firebasestorage.googleapis.com">https://firebasestorage.googleapis.com</a> </span><span>respectively. The links in these emails will ask you to sign in. By signing in, they will be able to steal your passwords. </span></p><br><p><span>Below is a copy of the </span><a href="https://sign-in-verification-929bb.web.app" rel="nofollow external" class="bo"><span>https://sign-in-verification-929bb.web.app</span></a><span>website. The Firebase page has been removed.</span></p><br><br><p><span><span><img src="https://lh3.googleusercontent.com/OvaQR2zbEmOa2WHS0GgYnTJtW2SWa_MKNdrKa8MR8U2TmVw0xZEZ0u9pZEG0hiV6w3q17QAN1IlOHeOl4dxXWnPImZNKc-6CjnLG5J7gEpivgZZR28K2oq3o-xvKZ3kn_DvOYggY=s0" width="687" height="317" style="max-width: 100%; height: auto;"></span></span></p><br><br><p><span>If you have received this email, please </span><span>DO NOT CLICK </span><span>on the link. However, if you have clicked on the link, </span><span>DO NOT ENTER </span><span>your password. If you entered your UMBC password, immediately</span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867939" rel="nofollow external" class="bo"><span>CHANGE YOUR PASSWORD.</span></a></p><br><br><p><span>If you have received any message similar to the one listed above, please forward it with its </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970." rel="nofollow external" class="bo"><span>headers</span></a><span> to</span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. </span></p><br><p><span>______________________________________________________________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></p><br><br></div>
]]>
  </Body>
  <Summary>The Division of Information Technology (DoIT) recently received reports of a new form of phishing campaign. This campaign informs recipients that they have “# new pending incoming emails” where #...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/113136/guest@my.umbc.edu/7cd8f1d1c5a4c20269788f7508d32901/api/pixel</TrackingUrl>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 11 Oct 2021 10:21:59 -0400</PostedAt>
  <EditAt>Mon, 11 Oct 2021 13:24:53 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="112745" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/112745">
  <Title>Phishing Alert: "Received AWB Documents via WeTransfer"</Title>
  <Tagline>A "File Transfer" Phishing Campaign</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span>The Division of Information Technology( DOIT) recently received reports of a ‘file transfer’ phishing campaign. Below is an example of this phishing email. We removed the To field for privacy purposes.</span></p><div><table><colgroup></colgroup><tbody><tr><td><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>To: &lt;CampusID&gt;@umbc.edu</span></p><p><span>Date:21 Sep 2021 03:43:00 -0400</span></p><p><span>From:"Wetransfer" </span><span>&lt;<a href="mailto:offices@mekre-net.uno">offices@mekre-net.uno</a>&gt;</span></p><p><span>Subject: &lt;CampusID&gt;@umbc.edu Received PO-20210921GL via WeTransfer</span></p><br><br><div><table><colgroup></colgroup><tbody><tr><td><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>&lt;CampusID&gt;@umbc.edu</span></p><p><span>You have received a PO-20210921GL  files via Wetransfer</span></p></td></tr><tr><td><p><span>1 files, 1.74 MB in total · Will be deleted on 22 Sept  2021</span></p></td></tr><tr><td><br><div><table><colgroup></colgroup><tbody><tr><td><p><a href="https://firebasestorage.googleapis.com/v0/b/updates-f0a89.appspot.com/o/PROFILE%2Findex.html?alt=media&amp;token=c93a3930-fda2-484a-9581-c38a9f84a9d8#phishing@umbc.edu" rel="nofollow external" class="bo"><span>Get your files</span></a></p></td></tr></tbody></table></div><br><br></td></tr></tbody></table></div><br><p><span>Download link </span></p><p><span>https:/wetranster,com/ downloads/ 7fa32f92e5e6536721c0c454c64efb520180304192959/ 6c03cb9a8f23fd6c89dac4d8c16a09220180304193000/184ee46</span></p><br><br><p><span>1 file</span></p><p><span>PO-20210921GL.pdf</span></p><p><span>1.74MB</span></p><br><br><br></td></tr></tbody></table></div><br></td></tr></tbody></table></div><p><span>To make sure our emails arrive, please add <a href="mailto:noreply@wetransfer.com">noreply@wetransfer.com</a> to </span><span>your contacts.</span></p><p> </p><p><span>sent by </span><span>wetransfersupport.wetransfer.com</span></p><p> </p><p><span>About WeTransfer</span><span>    -   </span><span>Help</span><span>   -    </span><span>Legal</span><span>   -   </span><span>Report this transfer as spam</span></p><br></td></tr></tbody></table></div><br><p><span>This example originated from </span><span>&lt;<a href="mailto:offices@mekre-net.uno">offices@mekre-net.uno</a>&gt;; however, there are several more senders: </span></p><br><ul><li><p><span>&lt;<a href="mailto:noreply@wetransfer.com">noreply@wetransfer.com</a>&gt;</span></p></li><li><p><span>&lt;<a href="mailto:revor@secaipl.club">revor@secaipl.club</a>&gt;</span></p></li><li><p><span>&lt;<a href="mailto:pombhurna.de@mahapwd.com">pombhurna.de@mahapwd.com</a>&gt;</span></p></li></ul><p><span>If you receive a similar email, please forward it immediately to: </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970." rel="nofollow external" class="bo"><span>headers</span></a><span>.</span></p><br><p><span>At first glance, the download link seems to originate from </span><span>Wetransfer.com, however if you look closely, there is a comma between Wetransfer and com: </span></p><div><table><colgroup></colgroup><tbody><tr><td><p><span>https:/wetranster</span><span>,</span><span>com/ downloads/ 7fa32f92e5e6536721c0c454c64efb520180304192959/ 6c03cb9a8f23fd6c89dac4d8c16a09220180304193000/184ee46</span></p></td></tr></tbody></table></div><br><p><span>Another flaw in the link is that copying the link address will take you to a completely different domain, </span><span><a href="https://firebasestorage.googleapis.com">https://firebasestorage.googleapis.com</a></span><span>. Below is the full link and its website.</span></p><div><table><colgroup></colgroup><tbody><tr><td><p><span><a href="https://firebasestorage.googleapis.com/v0/b/updates-f0a89.appspot.com/o/PROFILE%2Findex.html?alt=media&amp;token=c93a3930-fda2-484a-9581-c38a9f84a9d8#&lt;CampusID&gt;@umbc.edu">https://firebasestorage.googleapis.com/v0/b/updates-f0a89.appspot.com/o/PROFILE%2Findex.html?alt=media&amp;token=c93a3930-fda2-484a-9581-c38a9f84a9d8#&lt;CampusID&gt;@umbc.edu</a></span></p></td></tr></tbody></table></div><br><p><span><span><img src="https://lh4.googleusercontent.com/xI6QHJFBh89tegqPAQIMm_YUGQF-_eR5ym53KNb72igJt0ZevIObNoDI9-ibMUd5uC-oWsnSAM4U3lCoKb61GLdHi6l0w06Q-1Yw9bIIWCwu1Dv7pXjG-s3CP-mSZN_8CapC1cfT=s0" width="624" height="268" style="max-width: 100%; height: auto;"></span></span></p><br><br><p><span>This format is similar to a </span><a href="https://my3.my.umbc.edu/groups/itsecurity/posts/112660" rel="nofollow external" class="bo"><span>previous phishing email</span></a><span>. However, the background is different, and the link takes you directly to</span><span> <a href="https://firebasestorage.googleapis.com">https://firebasestorage.googleapis.com</a></span><span> and asks you to log in.</span></p><br><p><span>If you have received this email, please </span><span>DO NOT CLICK </span><span>on the link. However, if you have clicked on the link, </span><span>DO NOT ENTER </span><span>your password. If you entered your UMBC password, immediately</span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867939" rel="nofollow external" class="bo"><span>CHANGE your password</span></a><span>.</span></p><br><br><p><span>If you have received any message similar to the one listed above, please forward it with its headers to</span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>______________________________________________________________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></p></div>
]]>
  </Body>
  <Summary>The Division of Information Technology( DOIT) recently received reports of a ‘file transfer’ phishing campaign. Below is an example of this phishing email. We removed the To field for privacy...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/112745/guest@my.umbc.edu/96f5663d5d9e92c50b43e07071f4583b/api/pixel</TrackingUrl>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 28 Sep 2021 19:19:04 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="112698" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/112698">
    <Title>Account data breach: Ajarn</Title>
    <Tagline>Why You Should Not Use Your UMBC Password At Any Other Site</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>In September 2021, Thai-based English language teaching website, Ajarn, learnt that they suffered a data breach back in September 2018. This breach contained data for approximately 266 thousand Ajarn customers. The information included email addresses, names, genders, phone numbers, dates of birth, education levels, genders, geographic locations, job applications, marital statuses, nationalities, passwords, and profile photos. No financial information was leaked.</span></p><br><p><span>Two UMBC accounts were victims of this breach. The victims are being notified via their UMBC emails and/or their alternate emails. If you have an Ajarn account, please contact them to see if you have been affected by this breach.</span></p><br><p><span>To see if you were involved in any other breach, visit: </span><a href="https://haveibeenpwned.com/" rel="nofollow external" class="bo"><span>https://haveibeenpwned.com/</span></a><span>.</span></p><br><br><p><span>More about Ajarn data breach:</span></p><p><span><a href="https://www.ajarn.com/data-breach">https://www.ajarn.com/data-breach</a></span></p><br><br><p><span>If you have any questions or concerns, email us at: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>Information about this breach was provided to us by Have I Been Pwned(HIBP). </span></p><p> </p><p><span>______________________________________________________________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></p><br><br><br></div>
      ]]>
    </Body>
    <Summary>In September 2021, Thai-based English language teaching website, Ajarn, learnt that they suffered a data breach back in September 2018. This breach contained data for approximately 266 thousand...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/112698/guest@my.umbc.edu/073a69a5101e6e970cae12c37302b55b/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Mon, 27 Sep 2021 17:34:02 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="112696" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/112696">
  <Title>Notice of a LEGITIMATE E-mail Survey!</Title>
  <Tagline>"Your UMBC Feedback is Requested" Is A VALID Survey Request</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span>Normally, these posts warn of various types of fraud and misdirection that try to mislead victims into giving up personal information and/or money.  The Division of Information Technology (DoIT) encourages and appreciates vigilance and caution among members of the UMBC community.</span></p><br><p><span>That said, there are occasions when messages are sent out to account holders asking them to click on a link or fill in a form are legitimate.  DoIT received a report about a message that appears to be a legitimate request to participate in a survey about intercultural development at UMBC.  </span><span>After investigation, we have established that the message is exactly that!</span><span>  If you receive such a message (see excerpt below), please feel free to respond.  The survey is overseen by Dr. Irina Golubeva and Dr. Jasmine A. Lee of the Division of Students Affairs.</span></p><br><br><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>Good afternoon,</span></p><br><p><span>We are reaching out to you today as a part of a Hrabowski Innovation Fund (HIF) grant project. One overall goal of the project is to develop the intercultural communication skills of undergraduate and graduate students through intercultural dialogues on campus and to enhance their  preparedness for working in a culturally diverse world. By completing this survey, you will assist us in this endeavor by sharing your perspectives on campus climate and sharing your insights on where you engage in intercultural development at UMBC. This survey should take about 15 minutes to complete. As an incentive, your name will be entered into a drawing to win a $25 UMBC Bookstore Gift Card. The survey will be available from September 16, 2021 through October 2, 2021.</span></p></td></tr></tbody></table></div><br><br><p><span>We appreciate your mindfulness and ask you to continue taking care in the future.  E-mail and text message scams surged at the start of the COVID-19 lockdown and show no sign of abating.  As always, if you have a question about the validity of any message you receive at your UMBC email address, please contact us at </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>For more information about phishing, visit:</span><span><a href="https://itsecurity.umbc.edu/critical/?id=98136">https://itsecurity.umbc.edu/critical/?id=98136</a>.</span></p><br><p><span>If you have received any message similar to the one listed above, please forward it with its headers to</span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>_________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></p><br><br></div>
]]>
  </Body>
  <Summary>Normally, these posts warn of various types of fraud and misdirection that try to mislead victims into giving up personal information and/or money.  The Division of Information Technology (DoIT)...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/112696/guest@my.umbc.edu/0958fa3c814495248a0cb44c6cd997a1/api/pixel</TrackingUrl>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 27 Sep 2021 16:50:49 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="112661" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/112661">
    <Title>Job Phishing Alert: Department of Psychology</Title>
    <Tagline>Another Day, Another Job Scam.</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>Recently, the Division of Information Technology(DOIT) received multiple reports of a job phishing email. The scammers sending these emails are impersonating Professor Cheah of the Department of Psychology. Below is an example of such an email. For privacy purposes, we removed the To field.</span></p><br><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: Department of Psychology &lt;<a href="mailto:timothyj.sloan2@gmail.com">timothyj.sloan2@gmail.com</a>&gt;</span></p><p><span>Date: Tue, Sep 14, 2021 at 12:38 PM</span></p><p><span>Subject: Fall 2021 Campus Job Offer</span></p><p><span>To: &lt;YOUR CAMPUS <a href="mailto:ID@umbc.edu">ID@umbc.edu</a>&gt;</span></p><p> </p><br><p><span>&lt;YOUR CAMPUS ID&gt;@umbc.edu</span></p><p><span>The services of a student administrative assistant is urgently required to work part-time and get paid $300 weekly. Tasks will be carried out remotely and work time is 7hrs/week.</span></p><p><span>If interested, send a copy of your updated resume and a functional whatsapp number to our Department of Psychology via this email address to proceed.</span></p><p><span>Sincerely</span></p><p><span>Charissa Cheah</span></p><p><span>Professor</span></p><p><span>Department of Psychology</span></p><p><span>Office: Math/Psychology 330</span></p><p><span>Lab: Sondheim 404</span></p><br></td></tr></tbody></table></div><br><p><span>Please note that the Psychology Department or Professor Cheah did not send this message. Three visible red flags in this email are:</span></p><ol><li><p><span>The From address is not a UMBC email. If the Psychology Department or Prof. Cheah were sending this email, the From address would have been a UMBC email address. However, it was sent from &lt;</span><a href="mailto:timothyj.sloan2@gmail.com" rel="nofollow external" class="bo"><span>timothyj.sloan2@gmail.com</span></a><span>&gt;, which is not a UMBC affiliate. Please note that it could have been spoofed, even if it appears to originate from a UMBC email. Therefore, always check with DoIT(</span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>) or email/contact the impersonated person on a completely different email when you see a conflict in the address.</span></p></li><li><p><span>Whatsapp number.  A lot of scammers will ask for your WhatsApp number. If their number gets reported, they could easily create a new one. The same can be said for an email address; however, if their email is blocked, they will lose responses from other phishing email recipients. If you ever receive a job offer asking for a WhatsApp number or a phone number in general,  </span><span>BE SUSPICIOUS</span><span>!</span></p></li><li><p><span>The email template. This template is very common. After a quick Google search, we found three Job scams articles with the same template. So if you are ever in doubt, Google it! UMBC will not use a known phishing template to offer you a job opportunity.</span></p></li></ol><br><p><span>For more information about phishing, visit:</span><span><a href="https://itsecurity.umbc.edu/critical/?id=98136">https://itsecurity.umbc.edu/critical/?id=98136</a>.</span></p><br><p><span>If you have received any message similar to the one listed above, please forward it with its headers to</span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>______________________________________________________________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></p></div>
      ]]>
    </Body>
    <Summary>Recently, the Division of Information Technology(DOIT) received multiple reports of a job phishing email. The scammers sending these emails are impersonating Professor Cheah of the Department of...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/112661/guest@my.umbc.edu/5988209a4398f746f32066abad48bb68/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Sun, 26 Sep 2021 21:25:43 -0400</PostedAt>
  </NewsItem>
</News>
