<?xml version="1.0"?>
<News hasArchived="false" page="18" pageCount="20" pageSize="10" timestamp="Thu, 30 Apr 2026 08:06:20 -0400" url="https://dev.my.umbc.edu/groups/itsecurity/posts.xml?page=18&amp;tag=notice">
  <NewsItem contentIssues="false" id="93891" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/93891">
    <Title>How to Spot a Scam</Title>
    <Tagline>Follow the Three Golden Rules</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>Scammers are always inventing new ways to exploit people. However, some of the basic tactics don’t change much. The Cybercrime Support Network (CSN), in partnership with Google, has set up the ScamSpotter web site (<a href="https://scamspotter.org/">https://scamspotter.org/</a>) . Scam Spotter lists Three Golden Rules for spotting a scam.</span></p><br><ol><li><p><span><strong>Slow Down</strong>: If any organization is rushing you to act fast, this is a red flag. Take your time to get more information. Do not rush.</span></p></li><li><p><span><strong>Spot check</strong>: Utilize the internet, search for that organization online. If you get unexpected calls, unhang up, then search to verify the phone number.</span></p></li><li><p><span><strong>Stop, Don’t Send</strong>: Scammers are always demanding payment on the spot, A trustworthy organization would not ask you to send your credit card over texts, phone calls or emails. Scammers love gift cards. Do not send any gift cards to anyone, who you have not verified or know.</span></p></li></ol><br><p><span>If you receive email and are not sure whether it’s a scam, please send  the complete headers to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.   The UMBC guide to displaying complete email headers can be found at: <br></span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span> </span></p><br><br><p><span>Source: </span><a href="https://scamspotter.org/scams" rel="nofollow external" class="bo"><span>https://scamspotter.org/scams</span></a></p></div>
      ]]>
    </Body>
    <Summary>Scammers are always inventing new ways to exploit people. However, some of the basic tactics don’t change much. The Cybercrime Support Network (CSN), in partnership with Google, has set up the...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/93891/guest@my.umbc.edu/cbdccb6751f92b391d8803891110e11e/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Fri, 19 Jun 2020 14:07:25 -0400</PostedAt>
    <EditAt>Fri, 19 Jun 2020 14:12:38 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="93877" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/93877">
  <Title>IRS Warning of COVID-19 Scams</Title>
  <Tagline>Financial Scammers Taking Advantage Of COVID-19 Uncertainty</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span>With COVID-19 present in our day to day lives, malicious actors are taking this opportunity to scam people out of their personal and financial information. Recently the IRS Criminal Investigation Division (IRS-CI) has noticed various campaigns targeting Economic Impact Payments as well as other COVID-19 related scams.</span></p><br><p><span>The IRS-CI warns that some of these scams will offer more money from the government or even faster check delivery if the reader shares personal information and pays a small “processing fee.”  The IRS warns that there are no shortcuts for stimulus checks. Malicious actors have also been trying to convince people to “apply” for a second stimulus check. According to a Forbes article, as of right now, there is currently no second stimulus check in the works. </span></p><p><span><br></span><span>Malicious actors are also setting up fake charities soliciting donations for individuals, groups and areas affected by COVID-19. Some malicious actors are even offering the chance to invest in companies working on a vaccine, promising that the “company” will dramatically increase in value as a result. Some are even selling fake products like at-home test kits, fake cures, vaccines, pills and giving advice on unproven treatments. </span><span><br><br></span></p><p><span>They also warn of phishing campaigns being sent out either through text or emails. These campaigns are using keywords like “Corona Virus,” “COVID-19,” and “Stimulus.” For these campaigns the IRS-CI says the malicious actors' targets are people's personal and financial information.</span></p><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to <a href="mailto:security@umbc.edu">security@umbc.edu</a>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>For more information, please check out: </span></p><p><a href="https://www.irs.gov/newsroom/irs-warns-against-covid-19-fraud-other-financial-schemes" rel="nofollow external" class="bo"><span>https://www.irs.gov/newsroom/irs-warns-against-covid-19-fraud-other-financial-schemes</span></a></p><p><a href="https://www.forbes.com/sites/kellyphillipserb/2020/06/08/irs-warns-on-covid-19-scams-involving-stimulus-checks-fake-cures--more/#67cdbd937a98" rel="nofollow external" class="bo"><span>https://www.forbes.com/sites/kellyphillipserb/2020/06/08/irs-warns-on-covid-19-scams-involving-stimulus-checks-fake-cures--more/#67cdbd937a98</span></a></p></div>
]]>
  </Body>
  <Summary>With COVID-19 present in our day to day lives, malicious actors are taking this opportunity to scam people out of their personal and financial information. Recently the IRS Criminal Investigation...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/93877/guest@my.umbc.edu/1ab03c667e38e69440aee5210dae2cc9/api/pixel</TrackingUrl>
  <Tag>covid19</Tag>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Fri, 19 Jun 2020 10:22:15 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="93808" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/93808">
  <Title>Fake Virus Alert Scam</Title>
  <Tagline>Scareware doesn&#8217;t just exploit panic, it creates panic</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span>You are working from home, web browser open to whatever resources you need to write a paper, prepare a class, review a budget, or whatever else you need to get your job done.  Suddenly a window you didn’t ask for appears on your screen.  It may look sort of like a normal security product or perhaps it is flashing red and yellow.  There may even be - no kidding - sirens.   The message seared into your eyes tells you that your computer is </span><span>infected</span><span>with viruses, possibly hundreds of them.  The message says your data may be stolen, or erased, or both.  The message tells you that it is </span><span>urgent </span><span>that you click a link to buy and download an antivirus product and/or call a phone number where you will be able to buy a support contract (they just need your bank’s routing number and your account number and they will take care of the details).  If you try to close this window, it wither won’t close or gets replaced by more such windows.  In any case, the message is telling you that the most important thing for you to do immediately is to </span><span>panic</span><span>.  The pop-up window is doing it’s very best to get you to act without asking any questions.</span></p><br><p><span>This type of malware has become quite common and falls into a class called ‘scareware’.  The goal is to get you to act without thinking about what you’re doing.  If the window won’t go away, turn your computer off and then back on.  Some scareware is attached to your browser and will only reappear when you start whichever browser you were using before.  Other scareware is installed as a program and may reappear when your computer restarts.  It can be extremely annoying, but the real threat is the link and/or phone number that you are asked to use to fix the problem. DO NOT CLICK THE LINK AND/OR DO NOT CALL THE NUMBER.  </span></p><br><p><span>General Rule:  </span><span>Anything, windows, email, articles, etc. that you see on your computer that seems to be trying to induce panic, is probably trying to do just that.  Stay calm and think, don’t click!</span></p><br><br><br><p><span>Here are some references where you can find out more:</span></p><br><ul><li><p><a href="https://www.aarp.org/money/scams-fraud/info-2019/tech-support.html" rel="nofollow external" class="bo"><span>https://www.aarp.org/money/scams-fraud/info-2019/tech-support.html</span></a></p></li><li><p><u><a href="You%20are%20working%20from%20home,%20your%20web%20browser%20open%20to%20whatever%20resources%20you%20need%20to%20write%20a%20paper,%20prepare%20a%20class,%20review%20a%20budget,%20or%20whatever%20else%20you%20need%20to%20get%20your%20job%20done.%20%20Suddenly%20a%20window%20you%20didn%E2%80%99t%20ask%20for%20appears%20on%20your%20screen.%20%20It%20may%20look%20sort%20of%20like%20a%20normal%20security%20product%20or%20perhaps%20it%20is%20flashing%20red%20and%20yellow.%20%20There%20may%20even%20be%20-%20no%20kidding%20-%20sirens.%20%20%20The%20message%20seared%20into%20your%20eyes%20tells%20you%20that%20your%20computer%20is%20infected%20with%20viruses.%20%20Possibly%20hundreds%20of%20them.%20%20The%20message%20says%20your%20data%20may%20be%20stolen,%20or%20erased,%20or%20both.%20%20The%20message%20tells%20you%20that%20it%20is%20urgent%20that%20you%20click%20a%20link%20to%20buy%20and%20download%20an%20antivirus%20product%20and/or%20call%20a%20phone%20number%20where%20you%20will%20be%20able%20to%20buy%20a%20support%20contract%20(they%20just%20need%20your%20bank%E2%80%99s%20routing%20number%20and%20your%20account%20number%20and%20they%20will%20take%20care%20of%20the%20details).%20%20If%20you%20try%20to%20close%20this%20window,%20it%20wither%20won%E2%80%99t%20close%20or%20gets%20replaced%20by%20more%20such%20windows.%20%20In%20any%20case,%20the%20message%20is%20telling%20you%20that%20the%20most%20important%20thing%20for%20you%20to%20do%20immediately%20is%20to%20panic.%20%20The%20pop-up%20window%20is%20doing%20it%E2%80%99s%20very%20best%20to%20get%20you%20to%20act%20without%20asking%20any%20questions.%20%20This%20type%20of%20malware%20has%20become%20quite%20common%20and%20falls%20into%20a%20class%20called%20%E2%80%98scareware%E2%80%99.%20%20The%20goal%20is%20to%20get%20you%20to%20act%20without%20thinking%20about%20what%20you%E2%80%99re%20doing.%20%20If%20the%20window%20won%E2%80%99t%20go%20away,%20turn%20your%20computer%20off%20and%20then%20back%20on.%20%20Some%20scareware%20is%20attached%20to%20your%20browser%20and%20will%20only%20reappear%20when%20you%20start%20whichever%20browser%20you%20were%20using%20before.%20%20Other%20scareware%20is%20installed%20as%20a%20program%20and%20may%20reappear%20when%20your%20computer%20restarts.%20%20It%20can%20be%20extremely%20annoying,%20but%20the%20real%20threat%20is%20the%20link%20and/or%20phone%20number%20that%20you%20are%20asked%20to%20use%20to%20fix%20the%20problem.%20DO%20NOT%20CLICK%20THE%20LINK%20AND/OR%20DO%20NOT%20CALL%20THE%20NUMBER.%20%20%20%20General%20Rule:%20%20Anything,%20windows,%20email,%20articles,%20etc.%20that%20you%20see%20on%20your%20computer%20that%20seems%20to%20be%20trying%20to%20induce%20panic,%20is%20probably%20trying%20to%20do%20just%20that.%20%20Stay%20calm%20and%20think,%20don%E2%80%99t%20click!%20%20%20%20Here%20are%20some%20references%20where%20you%20can%20find%20out%20more:%20%20https://www.aarp.org/money/scams-fraud/info-2019/tech-support.html%20https://www.consumer.ftc.gov/articles/how-spot-avoid-and-report-tech-support-scams%20https://www.businessknowhow.com/security/scareware.htm%20https://computing.which.co.uk/hc/en-gb/articles/207101035-How-to-spot-a-fake-virus-alert" rel="nofollow external" class="bo"><span>https://www.consumer.ftc.gov/articles/how-spot-avoid-and-report-tech-support-scams</span></a></u></p></li><li><p><a href="https://www.businessknowhow.com/security/scareware.htm" rel="nofollow external" class="bo"><span>https://www.businessknowhow.com/security/scareware.htm</span></a></p></li><li><p><a href="https://computing.which.co.uk/hc/en-gb/articles/207101035-How-to-spot-a-fake-virus-alert" rel="nofollow external" class="bo"><span>https://computing.which.co.uk/hc/en-gb/articles/207101035-How-to-spot-a-fake-virus-alert</span></a></p></li></ul></div>
]]>
  </Body>
  <Summary>You are working from home, web browser open to whatever resources you need to write a paper, prepare a class, review a budget, or whatever else you need to get your job done.  Suddenly a window...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/93808/guest@my.umbc.edu/a7505e6af92d587a3543ef14fb368572/api/pixel</TrackingUrl>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 15 Jun 2020 16:25:51 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="93743" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/93743">
    <Title>How to Spot a Job Scam</Title>
    <Tagline>Scammers Are Sill Exploiting The Pandemic</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>With Covid-19 causing many Americans to file for unemployment, many people are looking for jobs.  Some malicious actors are taking advantage of them by creating new job scams. Here is a list of tips from Forbes to help spot potential job scams.</span></p><br><ul><li><p><span>Malicious actors will use keywords when describing a job such as “work-from-home”, “work-at-home”, “quick money”, or even “unlimited earning potential”. A legitimate job will usually use keywords along the lines of “remote work”, “virtual work” or “telecommute job”.</span></p></li><li><p><span>Descriptions and emails for scam jobs will usually have grammatical or spelling errors, while legitimate jobs will not have major errors.</span></p></li><li><p><span>A malicious actor will want to hire very quickly, they may include keywords like “immediate hire” in the description and any communication will feel urgent. A legitimate job will usually take some time as they want to hire the right people.</span></p></li><li><p><span>If the job description seems “too good to be true” then it probably is.</span></p></li><li><p><span>Scam jobs are known for asking for an upfront fee for things like applications, background checks, employee processing or even uniforms. They could also request personal information prior to completing the hiring process. A legitimate job will only request information like tax documents after agreeing to the terms of hire.</span></p></li><li><p><span>A malicious actor will request to communicate through email or even chat rooms like Google Hangout. Their emails might even try to mimic the real company’s emails. Even if a legitimate job will contact you through websites like LinkedIn.  They will not hire someone without having a phone or video conference interview.</span></p></li></ul><br><p><span>The key to quick scams is urgency.  The scammer doesn’t want you to stop and think, and </span><span>certainly</span><span> not to ask questions.  If you are urged to act immediately and told that you will lose a good opportunity or that something bad will happen if you delay, be suspicious.  </span></p><br><p><span>Lack of business details is another warning flag. If someone offers you a job without giving you a phone number, street address, or a link to their business to check out, be suspicious.</span><span><br></span><span><br></span><span>If the message tells you that your name was provided by UMBC, but asks you to reply from your personal email, ask yourself why they don’t want to use the UMBC email address they just used to contact you.  If you see something inconsistent, be suspicious.</span></p><p><span><br></span><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> and delete the message.</span></p><br><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span> </span></p><br><br><p><span>For more information, please check out:</span></p><p><a href="https://www.forbes.com/sites/ashleystahl/2020/05/11/job-hunting-scams-amid-covid-19-pandemic/#57724b253c57" rel="nofollow external" class="bo"><span>https://www.forbes.com/sites/ashleystahl/2020/05/11/job-hunting-scams-amid-covid-19-pandemic/#57724b253c57</span></a></p></div>
      ]]>
    </Body>
    <Summary>With Covid-19 causing many Americans to file for unemployment, many people are looking for jobs.  Some malicious actors are taking advantage of them by creating new job scams. Here is a list of...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/93743/guest@my.umbc.edu/887e86dc64d75cf47997e6125abf6b46/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Wed, 10 Jun 2020 19:52:47 -0400</PostedAt>
    <EditAt>Wed, 10 Jun 2020 19:56:52 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="93655" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/93655">
  <Title>Protect UMBC - Ransomware Attacks Still Active</Title>
  <Tagline>Your Own Computer Held Hostage</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span>Many of us lived our lives, at least in part, through computers even before telework and distance learning became the norm.  You may use your computer for writing reports, designing presentations, tracking budgets, email, banking, checking medical records, filing your taxes, and dozens of other necessary work and life-related chores.  Now, suppose someone took your computer and demanded a hundred dollars for its return.  Suppose someone took all the computers in your office or university away and demanded thousands of dollars for their return.  This is what ransomware does.  </span></p><br><p><span>Just to be clear, no one shows up, grabs the computer, and runs out the door.  During a ransomware attack, the computer is still there.  The data on the computer, however, all the email, documents, spreadsheets, bookmarks and whatever else you have stored on it is unusable.  It has been encrypted, and you don’t know the password. The data is, for all intents and purposes, gone.</span></p><br><p><span>Ransomware will leave your computer just functional enough to pop a ransom note up on the screen.  The note directs the victim to pay a specified amount in cryptocurrency in return for the password.  The payment will be effectively untraceable. Like most ransom situations, you have no assurance beyond the word of obvious criminals that you will get that password, or even that they have it.  Two departments at Michigan State University were struck with ransomware around last Memorial Day and have announced the ransom will not be paid. </span></p><br><p><span>Ransomware is delivered in the same way as other malware.  It usually gets a foothold when a computer user opens infected email, clicks on a malicious link, or installs software from an untrusted source.  It is just as likely to strike any computer as any other malicious program.</span></p><br><p><span>Updating your computer regularly with security patches and installing anti-virus protection is always a good idea.  The absolute best defense against ransomware, is to make a backup.  If you have recent copies of your files stored somewhere </span><span>other</span><span> than on your computer, you can restore all your data if ransomware hits.  You don’t need to backup all the information on the computer, just the information that is important and irreproducible.  Documents, pictures, address lists, etc. can all be backed up, either to removable media such as a USB thumb drive or an external drive, or to cloud storage.   Microsoft and Apple have both tried to make automatic backup to cloud storage as easy as possible (see Resources below).  There are other options such as Box storage with Box Sync.</span></p><br><p><span>IMPORTANT</span><span>:  If you are working from home using data belonging to UMBC, there may be restrictions on where that data can be stored.  </span><span>Check with the Division of Information Technology (</span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>) to find out what options are available.  It is essential that backups of sensitive data be protected and not breached.  </span></p><h3><span>Resources</span></h3><br><p><span>Windows Backup to Microsoft OneDrive</span></p><p><a href="https://www.microsoft.com/en-us/microsoft-365/onedrive/pc-cloud-backup" rel="nofollow external" class="bo"><span>https://www.microsoft.com/en-us/microsoft-365/onedrive/pc-cloud-backup</span></a></p><br><p><span>Macintosh Backup to iCloud</span></p><p><a href="https://support.apple.com/en-us/HT204025" rel="nofollow external" class="bo"><span>https://support.apple.com/en-us/HT204025</span></a></p><br><br><br><p><span>For more information:</span></p><br><p><a href="https://www.insidehighered.com/quicktakes/2020/06/04/michigan-state-refuses-pay-ransom-hackers" rel="nofollow external" class="bo"><span>https://www.insidehighered.com/quicktakes/2020/06/04/michigan-state-refuses-pay-ransom-hackers</span></a></p></div>
]]>
  </Body>
  <Summary>Many of us lived our lives, at least in part, through computers even before telework and distance learning became the norm.  You may use your computer for writing reports, designing presentations,...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/93655/guest@my.umbc.edu/bc9ab72cb5b67dc4a73792313df79f1f/api/pixel</TrackingUrl>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 08 Jun 2020 10:28:17 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="93600" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/93600">
    <Title>College Stimulus Check Scam</Title>
    <Tagline>Another Email Scam Riding the Headlines</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>The Federal Trade Commission warns of a phishing email scam aimed at college students. The malicious actor sends emails out claiming to be from the Financial Department of the student’s university. The email tells readers to click on the provided URL to get messages about their economic stimulus check. Once readers click on the URL it will require a university login to proceed.</span></p><br><p><span>These emails are phishing scams and once the URL is clicked on, the reader is either giving the malicious actors their personal information or even allowing malware to be installed onto their devices.</span></p><br><p><span>To help spot and avoid scams similar to the one above:</span></p><ul><li><p><span>If you have concerns about an email, look up a phone number or website of the sender/department that the email is claiming to be from. This helps to confirm you are calling someone who is real and not a malicious actor.  If there is no contact information, it very likely is a scam.</span></p></li><li><p><span>Look out for bad grammar and spelling as this can be a tip-off that the email might be from a malicious actor. </span></p></li><li><p><span>Look out for wrong department names. For example the article found that one version of this phishing email claimed to be from the Financial Dept instead of the Financial Aid Department.  </span></p></li><li><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> and delete the message.</span><span><br><br></span></p></li></ul><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>UMBC’s Office of Financial Aid and Scholarship:</span></p><p><a href="https://financialaid.umbc.edu/" rel="nofollow external" class="bo"><span>https://financialaid.umbc.edu/</span></a></p><br><p><span>For more information, please check out:</span></p><p><a href="https://www.consumer.ftc.gov/blog/2020/05/covid-19-scams-targeting-college-students" rel="nofollow external" class="bo"><span>https://www.consumer.ftc.gov/blog/2020/05/covid-19-scams-targeting-college-students</span></a></p></div>
      ]]>
    </Body>
    <Summary>The Federal Trade Commission warns of a phishing email scam aimed at college students. The malicious actor sends emails out claiming to be from the Financial Department of the student’s...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/93600/guest@my.umbc.edu/5939449d5fd301cdd5d3670426fbea95/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Thu, 04 Jun 2020 11:10:25 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="93375" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/93375">
  <Title>Maryland COVID-19 Contact Tracing</Title>
  <Tagline>Make sure you know who you&#8217;re talking to</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p>May 22, 2020</p>
    
    <p>Next Week, Maryland will begin a state-wide effort to trace
    the spread of COVID-19.<span>  </span>The effort will
    involve health workers making phone calls to Maryland residents.<span>  </span>This is a very important step in identifying
    potential disease clusters and everyone’s help is needed.</p>
    
    <p>At the same time, Maryland in general and UMBC in particular
    have been targets of a wide variety of scams taking advantage of people’s fears
    and uncertainties around this disease.<span>  </span>It
    is very possible that unscrupulous people will take advantage of Maryland’s
    effort as a cover for phone scams.<span>  </span><span>North Carolina, for instance, started a contact tracing effort last
    month and has gotten reports of scammers pretending to be health officials and gathering
    information from residents. </span></p>
    
    <p><span> </span></p>
    
    <h3>Phone Calls</h3>
    
    <p><em><u>When you get a call, your caller ID should read “MD COVID”</u></em>.<span>  </span>You will be asked about your health and about
    your location and interactions within a period of time.<span>  </span>You will be asked for your birth date, contact
    information, and information about any COVID-19 test if you have had one.<span>  </span>You will get guidance about potential symptoms
    to watch for and about self-isolation.</p>
    
    <p><em><u>You will NOT be asked for:</u></em></p>
    
    <ul><li><span><span>·<span>       
    </span></span></span><span>a Social Security number</span></li></ul>
    
    <ul><li><span><span>·<span>       
    </span></span></span><span>financial or bank account
    information</span></li></ul>
    
    <ul><li><span><span>·<span>       
    </span></span></span><span>personal details unrelated to
    COVID-19 </span></li></ul>
    
    <ul><li><span><span>·<span>       
    </span></span></span><span>photographs or videos</span></li></ul>
    
    <ul><li><span><span>·<span>       
    </span></span></span><span>passwords</span></li></ul>
    
    <ul><li><span><span>·<span>       
    </span></span></span><span>payment</span></li></ul>
    
    <p> </p>
    
    <p><span>If anyone asks you for this or other information having nothing
    to do with COVID-19, please do <strong>not</strong> give it to them.<span>  </span></span></p>
    
    <p><span> </span></p>
    
    <h3>Text Messaging</h3>
    
    <p>So far, Maryland has not announced that text messaging will
    be part of the contact tracing effort.<span> 
    </span>If you receive a text message that asks you to click on a link for
    contact tracing, <em><u>do not click it</u></em>. At best, it will take you to a
    scam questionnaire requesting your personal information.<span>  </span>Worse, it could download malware to your
    phone and start harvesting personal information itself.</p>
    
    <p>New Jersey has received reports of text messages pretending
    to be from contact tracers and telling people that they have already had
    contact with a potential COVID-19 carrier.<span> 
    </span>These messages also contain links which will lead to information theft
    and/or malware.<span>  </span><em>Contact tracers don’t
    work like this.</em></p>
    
    <h3><br></h3><div>We encourage the UMBC community to support this important effort to identify and understand the spread of COVID-19.  We also ask you to remain alert to those who try create and exploit fears and confusion for their personal gain.</div><div><br></div><div><br></div><h3>For More Information</h3>
    
    <p><span>Launch of Maryland’s contact tracing effort</span></p>
    
    <ul><li><a href="https://www.baltimoresun.com/coronavirus/bs-md-maryland-contact-tracing-operation-coronavirus-reopening-20200521-jn4wfqgjcjdqbkbu454fhqngim-story.html" rel="nofollow external" class="bo">https://www.baltimoresun.com/coronavirus/bs-md-maryland-contact-tracing-operation-coronavirus-reopening-20200521-jn4wfqgjcjdqbkbu454fhqngim-story.html</a></li></ul>
    
    <ul><li><a href="https://www.wbaltv.com/article/maryland-contact-tracing-ramps-up/32631045#" rel="nofollow external" class="bo">https://www.wbaltv.com/article/maryland-contact-tracing-ramps-up/32631045#</a></li></ul>
    
    <p>FTC Warning
    about COVID-19 contact tracing text message scams</p>
    
    <ul><li><a href="https://www.consumer.ftc.gov/blog/2020/05/covid-19-contact-tracing-text-message-scams" rel="nofollow external" class="bo">https://www.consumer.ftc.gov/blog/2020/05/covid-19-contact-tracing-text-message-scams</a> <br></li></ul><p>Scam
    Warning from North Carolina Attorney General</p>
    
    <ul><li><a href="https://ncdoj.gov/watch-out-for-covid-19-contact-tracing-scams/" rel="nofollow external" class="bo">https://ncdoj.gov/watch-out-for-covid-19-contact-tracing-scams/</a></li></ul>
    
    
    
    <p>Warning
    from New Jersey state officials about text message scams</p>
    
    <ul><li><a href="https://www.nj.com/coronavirus/2020/05/beware-of-coronavirus-contact-tracing-scams-nj-officials-warn-thousands-of-fraud-cases-reported.html" rel="nofollow external" class="bo">https://www.nj.com/coronavirus/2020/05/beware-of-coronavirus-contact-tracing-scams-nj-officials-warn-thousands-of-fraud-cases-reported.html</a></li></ul></div>
]]>
  </Body>
  <Summary>May 22, 2020    Next Week, Maryland will begin a state-wide effort to trace the spread of COVID-19.  The effort will involve health workers making phone calls to Maryland residents.  This is a...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/93375/guest@my.umbc.edu/3d82fc3347444b57cd2f3fd8f44b8077/api/pixel</TrackingUrl>
  <Tag>covid19</Tag>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>2</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Fri, 22 May 2020 15:02:24 -0400</PostedAt>
  <EditAt>Fri, 22 May 2020 15:05:32 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="93247" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/93247">
  <Title>Android Ransomware</Title>
  <Tagline>Malicious Software Pretending  To Provide COVID-19 Info</Tagline>
  <Body>
    <![CDATA[
          <div class="html-content"><h3><span>Android Ransomware</span></h3><br><br><p><span>DomainTools discovered that domain names associated with COVID-19 and Coronavirus have spiked in the past few weeks, and many of those domains are considered malicious. One that caught their eye was a website that offers a real-time coronavirus outbreak tracker as an Android app.</span></p><br><br><p><span>The app says that it offers many features like a heat map and other statistical data about COVID-19, but this app is instead ransomware. When downloading the app, it will ask for administrative access promising that this will allow certain types of information. If the app is given administrative access, it is given the opportunity to lock up all contacts, pictures, videos, and social media accounts unless their ransom is paid in Bitcoin. If the ransom is not paid, the attacker threatens to release all private information publicly and erase the phone's memory.</span></p><br><br><p><span>DomainTools offers tips on how to better protect against ransomware and other malware that tries to capitalize on coronavirus. They first state to be sure to only use trusted information sources from the government and research websites, and not to click on anything health related in your emails. Next they ask Android users to ensure that they download apps from the Google Play store, as third-party stores have a much higher risk of downloading malware.</span></p><br><br><p><span>For more information, please check out: <br><br></span></p><p><a href="https://www.domaintools.com/resources/blog/covidlock-mobile-coronavirus-tracking-app-coughs-up-ransomware" rel="nofollow external" class="bo"><span>https://www.domaintools.com/resources/blog/covidlock-mobile-coronavirus-tracking-app-coughs-up-ransomware</span></a></p><p><a href="https://www.us-cert.gov/Ransomware" rel="nofollow external" class="bo"><span>https://www.us-cert.gov/Ransomware</span></a></p></div>
      ]]>
  </Body>
  <Summary>Android Ransomware    DomainTools discovered that domain names associated with COVID-19 and Coronavirus have spiked in the past few weeks, and many of those domains are considered malicious. One...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/93247/guest@my.umbc.edu/84da75ad259024b2aafd7d464c22f4f9/api/pixel</TrackingUrl>
  <Tag>covid-19</Tag>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 18 May 2020 18:24:13 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="93246" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/93246">
    <Title>COVID-19 Phishing Attacks</Title>
    <Tagline>A review of different attacks exploiting COVID-19 fears</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>Tripwire has released an article warning of these COVID19-related phishing scams. This article can be found at this link: </span><a href="https://www.tripwire.com/state-of-security/security-awareness/covid-19-scam-roundup-may-11-2020/" rel="nofollow external" class="bo"><span>https://www.tripwire.com/state-of-security/security-awareness/covid-19-scam-roundup-may-11-2020/</span></a></p><br><br><p><span>(Fake) Work From Home Offers</span></p><br><p><span>PhishLabs discovered a phishing email attack aiming to entice people laid off due to COVID-19 with a work from home opportunity. The one email they found offered $5000 a month for a fake position. If the reader replies, they are asked for personal and financial information and will be given a more detailed job description involving transfering money through the readers accounts. The malicious actors might not only steal money from the readers account, but also could use the reader as a money mule meaning that they could be held liable for the stolen money that passes through their account. </span></p><br><br><p><span>(Fake) IRS Page</span></p><br><p><span>Researchers at SecureWorks discovered malicious actors targeting readers with a phishing page designed to look like a tax form given by the IRS. The attack is believed to be distributed through email attacks, and the goal of this attack is stealing the readers tax information. Once the malicious actor has the information, they can then impersonate the reader on the official IRS tax form meaning that they will collect not only their tax return but their stimulus checks as well.</span><span><br><br></span></p><p><span><br></span><span>Impersonating Institute of CPAs</span></p><br><p><span>The Microsoft Security Intelligence team discovered that some digital attackers were using COVID-19 themed attack campaigns to distribute malware. One example they found showed a malicious actor impersonating the Institute of CPAs. In their emails they were claiming to be delivering COVID-19 related updates to its members as well as containing a ZIP file. The file is instead an executable that will allow the malicious actor to take control of the affected machine.</span></p></div>
      ]]>
    </Body>
    <Summary>Tripwire has released an article warning of these COVID19-related phishing scams. This article can be found at this link:...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/93246/guest@my.umbc.edu/fd27aef2c212c3511943930f04cf4c82/api/pixel</TrackingUrl>
    <Tag>covid19</Tag>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Mon, 18 May 2020 18:17:39 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="92998" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/92998">
    <Title>Email Attacks</Title>
    <Tagline>A Review Of Recent Email Trying To Infect Your Computer</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>Email Attacks</span></p><br><br><p><span>Tripwire has released an article warning of these COVID-19 related email scams. The article can be found at this link: </span><a href="https://www.tripwire.com/state-of-security/security-awareness/covid-19-scam-roundup-may-4-2020/" rel="nofollow external" class="bo"><span>https://www.tripwire.com/state-of-security/security-awareness/covid-19-scam-roundup-may-4-2020/</span></a></p><br><h3><span>(FAKE) Failed Delivery Notice</span></h3><br><p><span>They report on a finding from Kaspersky Labs, where they warn of a spam email campaign informing recipients that a delivery attempt had failed because their shipment details were incorrect and the reader needs to update their details. An image of a receipt is included in the message.  The receipt is too small to read easily, so the recipient will probably click on it for a better look. Clicking on the attachment will load spyware onto the user's device.</span></p><br><br><h3><span>(FAKE) Donation to WHO</span></h3><br><p><span>A malicious actor sent out emails urging recipients to consider donating to the World Health Organization. The email has a from address of “support@covid-19[.]world” and includes a link at the bottom saying “Help Us Fight”.  Clicking the link will take the reader to a malicious domain help-who[.]com. For readers to donate they must click on the embedded link which allows the malicious actors to steal the reader’s payment information.</span></p><br><br><h3><span>(FAKE) Update to Family and Medical Leave Act</span></h3><br><p><span>Finally the article reports that IBM X-Force discovered a phishing email campaign that seemed to be from the US Department of Labor. The email states they have made changes to the “Family and Medical Leave of Act” as a result of COVID-19. This email then asks readers to review the attached word document. The attachment will install malware which puts the reader’s computer under the control of a botnet.</span></p></div>
      ]]>
    </Body>
    <Summary>Email Attacks    Tripwire has released an article warning of these COVID-19 related email scams. The article can be found at this link:...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/92998/guest@my.umbc.edu/912d4576f63daa6d0f96033f10a9d408/api/pixel</TrackingUrl>
    <Tag>covid19</Tag>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Fri, 08 May 2020 12:31:45 -0400</PostedAt>
    <EditAt>Fri, 08 May 2020 12:32:40 -0400</EditAt>
  </NewsItem>
</News>
