<?xml version="1.0"?>
<News hasArchived="false" page="19" pageCount="20" pageSize="10" timestamp="Wed, 29 Apr 2026 17:19:41 -0400" url="https://dev.my.umbc.edu/groups/itsecurity/posts.xml?page=19&amp;tag=notice">
  <NewsItem contentIssues="false" id="92997" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/92997">
  <Title>COVID-19 Job Scam in Email</Title>
  <Tagline>New Scam Subject: UMBC COVID-19 INFORMATION</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span>The UMBC Division of Information Technology received notification of a new job scam variant on 08may2020.  The subject is: </span><strong><span>UMBC COVID-19 INFORMATION</span></strong></p><br><br><blockquote><p><strong><span>From: </span><span>Koyepes Michael</span><span> &lt;<a href="mailto:michaelkoyepes199@gmail.com">michaelkoyepes199@gmail.com</a>&gt;</span></strong></p><p><strong><span>Date: Fri, May 8, 2020 at 9:54 AM</span></strong></p><p><strong><span>Subject: UMBC COVID-19 INFORMATION</span></strong></p><strong><br></strong><p><strong><span>Dear students,</span></strong></p><strong><br></strong><p><strong><span>University of Maryland, Baltimore County health professionals have been closely monitoring the spread of COVID-19 over the past two months.Therefore the university is organizing an online part time job to sustain the students living.I'm happy to inform you that our reputable company CORESTAFF SERVICES Inc®,is currently running a student empowerment program.</span></strong></p><p><strong><span>    KINDLY EMAIL BACK WITH YOUR  PERSONAL EMAIL ADDRESS IF INTERESTED IN THIS JOB POSITION.</span></strong></p><strong><br></strong><p><strong><span>Kind Regards</span></strong></p><p><strong><span>Koyepes Michael</span></strong></p><p><strong><span>HR Manager/Consultant</span></strong></p><p><strong><span>CORESTAFF SERVICES Inc®</span></strong></p></blockquote><br><br><h3><strong><em><span>This is a scam!  DO NOT REPLY TO IT!</span></em></strong></h3><br><p><span>A reply confirms that your UMBC email address is active.  That is an invitation to get more spam.  You are also asked to provide your personal address.  That’s two addresses for spamming.   You may then be asked to fill out a form with personal information which can then be added to your email address.  That means, at least, that the spam can be targeted to you.  If you provide information such as your birthdate, address, or social security number, the information can also be used for identity theft.  </span></p><br><br><p><span>Even if you are tempted to send the scammer a hostile, insulting message,</span></p><h3><span>DO NOT REPLY!</span></h3><p><span>You will not hurt the scammer’s feelings.  You will simply provide information about yourself directly or indirectly.</span></p><p><span><br></span></p><p><span>E-mail fraud is in the rise.  The Division of Information Technology is tracking it.  If you get suspicious email, please forward it to <a href="mailto:security@umbc.edu">security@umbc.edu</a>.   If you are not sure whether it is suspicious, forward it anyway.  We will investigate it and get back to you.<br></span></p></div>
]]>
  </Body>
  <Summary>The UMBC Division of Information Technology received notification of a new job scam variant on 08may2020.  The subject is: UMBC COVID-19 INFORMATION     From: Koyepes Michael...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/92997/guest@my.umbc.edu/f645a745d90822bcdf375dcead134bfa/api/pixel</TrackingUrl>
  <Tag>covid19</Tag>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Fri, 08 May 2020 12:12:25 -0400</PostedAt>
  <EditAt>Fri, 08 May 2020 12:15:55 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="92915" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/92915">
  <Title>"Password Notification" Scam</Title>
  <Tagline>Email with bogus link wants to steal your password</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><span><p>This morning DoIT has received several reports of a password change scam that has been going around campus:</p><p><br></p><div><table border="1" width="300"><tbody><tr><td><pre><pre>From:  <a href="mailto:ti93943@wildblue.net">ti93943@wildblue.net</a>&#x000A;    Date: Wednesday, May 6, 2020 9:45 AM&#x000A;    Subject: Password Notification&#x000A;    To: &lt; @umbc.edu&gt;</pre>--
    
    Dear Member,
    
    Your UMBC webmail password will expire today.
    
    Visit the maintenance portal below to automatically renew your
    university password.
    
    <a href="https://forms.office.com/Pages/ResponsePage.aspx?id=xxxxxxxxxxxxxxxxxxxxxxx">https://forms.office.com/Pages/ResponsePage.aspx?id=xxxxxxxxxxxxxxxxxxxxxxx</a>
    
    IT Helpdesk | University of Maryland, Baltimore County.
    </pre>
    </td></tr></tbody></table></div><div><br></div><div><strong><u>If you have received this or a similar email, please do not respond or click on the provided URL.</u></strong> Either one of those actions only shows the malicious actor that they have a valid, active email address. <strong><u>Please forward the message (with the email headers) to <a href="mailto:security@umbc.edu">security@umbc.edu</a>, and delete the message.</u></strong></div><div><br></div><div>For more information on spotting phishing messages and handling spam, please check out our FAQ: <a href="https://wiki.umbc.edu/x/HwMxAg">https://wiki.umbc.edu/x/HwMxAg</a></div></span></div>
]]>
  </Body>
  <Summary>This morning DoIT has received several reports of a password change scam that has been going around campus:       From:  ti93943@wildblue.net Date: Wednesday, May 6, 2020 9:45 AM Subject: Password...</Summary>
  <Website>https://itsecurity.umbc.edu</Website>
  <AttachmentKind>Image</AttachmentKind>
  <AttachmentUrl>https://assets3-dev.my.umbc.edu/system/shared/attachments/a4675b16c58db848d03b79c4d596f699/69f275ed/news/000/092/915/2bfe367f6f040df48462a1a9a684ea43/medium.jpg?1588792899</AttachmentUrl>
  <Attachments>
    <Attachment kind="Image" url="https://dev.my.umbc.edu/groups/itsecurity/posts/92915/attachments/35861"></Attachment>
  </Attachments>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/92915/guest@my.umbc.edu/165851afaec154bbf8b70e452c0dcc34/api/pixel</TrackingUrl>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <ThumbnailUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/092/915/056f70407cf7aa2ee6bd926dadd87e80/xxlarge.jpg?1588780238</ThumbnailUrl>
  <ThumbnailUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/092/915/056f70407cf7aa2ee6bd926dadd87e80/xlarge.jpg?1588780238</ThumbnailUrl>
  <ThumbnailUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/092/915/056f70407cf7aa2ee6bd926dadd87e80/large.jpg?1588780238</ThumbnailUrl>
  <ThumbnailUrl size="medium">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/092/915/056f70407cf7aa2ee6bd926dadd87e80/medium.jpg?1588780238</ThumbnailUrl>
  <ThumbnailUrl size="small">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/092/915/056f70407cf7aa2ee6bd926dadd87e80/small.jpg?1588780238</ThumbnailUrl>
  <ThumbnailUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/092/915/056f70407cf7aa2ee6bd926dadd87e80/xsmall.jpg?1588780238</ThumbnailUrl>
  <ThumbnailUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/092/915/056f70407cf7aa2ee6bd926dadd87e80/xxsmall.jpg?1588780238</ThumbnailUrl>
  <PawCount>1</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Wed, 06 May 2020 12:03:21 -0400</PostedAt>
  <EditAt>Wed, 06 May 2020 15:03:16 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="92403" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/92403">
    <Title>Another Part Time Job Scam...</Title>
    <Body>
      <![CDATA[
          <div class="html-content"><span><p><span>Last week DoIT received several notifications of yet another part-time job scam arriving at email inboxes on our virtual campus.  The To: field has been removed from the example for reasons of privacy.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: </span><span>John Welch</span><span> &lt;<a href="mailto:blueeyedwelch@gmail.com">blueeyedwelch@gmail.com</a>&gt;</span></p><p><span>Date: Fri, Apr 17, 2020, 1:15 PM</span></p><p><span>Subject: UMBC PARTIME JOB</span></p><br><p><span>Corestaff Services is offering you a chance to secure a part time job. Kindly reply back with your alternate email address for more information.</span></p><br><p><span>Kind Regards</span></p><p><span>John Welch</span></p><p><span>HR Manager/Consultant</span></p><p><span>Corestaff Services Inc®</span></p><br></td></tr></tbody></table></div><br><p><span>Over 200 members of the UMBC community received this particular message.  One of the reports also noted that a similar scam naming Corestaff Services appeared in 2018 in accounts at Brown University.  Brown posted a very detailed analysis of the message at: </span><a href="https://it.brown.edu/alerts/read/corestaff-phishing-email-anatomy-scam" rel="nofollow external" class="bo"><span>https://it.brown.edu/alerts/read/corestaff-phishing-email-anatomy-scam</span></a><span>.</span></p><br><p><span>While this message doesn’t share all the issues of the one that went to Brown, it does raise some questions.</span></p><br><ul><li><p><span>Why would the message come from a gmail account rather than a corporate domain like corestaff.com?</span></p></li><li><p><span>What kind of professional HR Manager uses an account called ‘blueeyedwelch’?</span></p></li><li><p><span>Why do they want your alternate email address before they tell you anything else about the job?  They obviously have your UMBC address already.</span></p></li><li><p><span>Why is there no web link or phone number for Corestaff Services anywhere in the message?</span></p></li><li><p><span>“PART-TIME” and “PART TIME” will not set off your spell-checker.  “PARTTIME” is not a word.</span></p></li></ul><br><br><p><span>When you get a message you were not expecting that asks you to provide information, please remember that all information has value. </span><span>Even the simple fact that you are reading the email sent to your UMBC address has value.</span><span>  If you send a response, even an angry or insulting one, you are giving the sender something of value.</span></p><br><p><span>Read once, think twice.  If you are unsure, please forward the message to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.  It always helps if you include the headers, too. </span></p><br><h1><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>How do I forward full email headers?</span></a></h1><p><span>(<a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970">https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</a>)</span></p><div><span><br></span></div></span></div>
      ]]>
    </Body>
    <Summary>Last week DoIT received several notifications of yet another part-time job scam arriving at email inboxes on our virtual campus.  The To: field has been removed from the example for reasons of...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/92403/guest@my.umbc.edu/e8b13b55e9fe43a46feb0839e3421d09/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>1</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Tue, 21 Apr 2020 10:17:18 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="92364" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/92364">
  <Title>Cyberattacks Delivered By Your Mail Carrier</Title>
  <Tagline>Scammers and hackers will use any way to get to you...</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><span><p><span>A group called FIN7 has been using a novel method to target victims.  The attack is delivered through USPS mail, the kind that’s delivered into the </span><span>real</span><span> mailbox. </span></p><br><span><img src="https://lh6.googleusercontent.com/wv3EmwV8ZgiARlfax6RSHCaYsh8S4Ty5r0hnhndtPNQRnDt74eJwwFyiN9VH1Gf09dTaoMiH-8zWoaG_KvJ_Y8Y05bPnVbxdVkruKhmTbwHb7I2Bfyqe6f-ynrFnSVHHeyFYIpSw" width="163" height="110" style="max-width: 100%; height: auto;"></span><p><span><br></span></p><p><span>The target gets a package in the postal mail containing a message that appears to be from Best Buy.  The package contains a letter thanking the victim for being such a good customer, a gift card and/or a teddy bear, and a USB stick supposedly containing a list of special gift items.  When the target inserts the USB into a Windows computer, a message pops up saying that the USB device has malfunctioned.  The target may then take the stick out, throw it away, and play with the teddy bear.  By the time the device has been removed, it’s too late.  This stick actually contains a USB keyboard emulator and has been injecting commands into the system.  The computer has already downloaded a malicious script that is gathering information about the computer to send back through the Internet to its controller.  The script then also downloads more malware. </span></p><br><p><span>This attack, unlike most purely IT-based attacks, costs the attackers some money for postage, USB camouflaged keyboards, gift cards, and teddy bears.  The FIN7 group has historically been attacking the commercial industries, so some investment is worth the chance of success.  </span></p><br><p><span>While it seems unlikely that UMBC will be a target, please do not use any USB stick, or anything that looks like a USB stick, unless you trust the source.  The best source is an unopened package that you bought yourself.</span></p><p><span><br></span></p><p><span>If you receive any USB devices that you are suspicious of or have any questions about </span><span>strange </span><span>computer related activity, please contact us at <a href="mailto:security@umbc.edu">security@umbc.edu</a>.</span></p><br><p><span>Links for more information:</span></p><br><ul><li><p><a href="https://securityaffairs.co/wordpress/100661/cyber-crime/fin7-usb-teddy-bears-attacks.html" rel="nofollow external" class="bo"><span>https://securityaffairs.co/wordpress/100661/cyber-crime/fin7-usb-teddy-bears-attacks.html</span></a></p></li><li><p><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/would-you-exchange-your-security-for-a-gift-card/" rel="nofollow external" class="bo"><span>https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/would-you-exchange-your-security-for-a-gift-card/</span></a></p></li></ul></span></div>
]]>
  </Body>
  <Summary>A group called FIN7 has been using a novel method to target victims.  The attack is delivered through USPS mail, the kind that’s delivered into the real mailbox.       The target gets a package in...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/92364/guest@my.umbc.edu/6d649ee580b79847014070f4184505cf/api/pixel</TrackingUrl>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 20 Apr 2020 12:16:42 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="92360" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/92360">
    <Title>Scam E-mail Spoofing Account of Scott Casper</Title>
    <Tagline>Scammers are impersonating people to get info and money.</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><span><p><span>On Monday, 4/13/2020, DoIT was notified by several members of the UMBC community about an e-mail message impersonating Dr. Scott Casper, Dean of the College of Arts, Humanities, and Social Sciences.  The messages appear to have been sent on 4/12/2020.  </span></p><p><span><br></span></p><p><span>Investigation revealed that this message went to approximately 60 recipients.  Based on the recipients, we suspect that the scammer collected email addresses and identifying information about Dr. Casper (e.g. Title, Photo, etc.) from the CAHSS website.  Then the scammer selected specific departments from that website and collected more addresses.  Since there are still a lot of people in the College who have not received these messages, we request that people be alert when receiving strange-looking messages through e-mail or text.</span></p><br><br><p><span>The message appeared to be from </span><span>Scott E Casper &lt;</span><a href="mailto:casper.umbc@gmail.com" rel="nofollow external" class="bo"><span>casper.umbc@gmail.com</span></a><span>&gt;.</span></p><p><span>This is not actually a UMBC address, since it ends in “@gmail.com”, but a quick glance might not make the distinction.  At least one message had a Date field of </span><span>Date: Sun, 12 Apr 2020 21:12:09 +0100. </span><span>The timezone GMT+0100 is currently in Western and Central Europe and Western Africa, which is also suspicious.</span></p><br><p><span>The subject of the message was: </span><span>Quick Request</span><span> and the message itself was brief and vague: </span></p><br><p><span>Available?</span></p><p><span>--</span></p><p><span>Scott E. Casper</span></p><br><p><span>Dean</span></p><p><span>Professor, History</span></p><p><span>College of Arts, Humanities, and Social Sciences</span></p><br><p><span>In two reported cases in which the recipients responded, they were asked to go to a grocery store and purchase E-bay gift cards.  One recipient received the request as a text message after providing a phone number.  The text was sent from 585-532-5939.</span></p><br><span>We all get terse messages, especially as text messages.  Be careful, however, before responding to them. Please double-check that the sender’s address actually ends in “@umbc.edu”.  Note anything odd about the message headers or the message content.  We are all somewhat disoriented by the current conditions and there are people who will try to take advantage of that.  Please report any suspicious communications to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span>.</span></span></div>
      ]]>
    </Body>
    <Summary>On Monday, 4/13/2020, DoIT was notified by several members of the UMBC community about an e-mail message impersonating Dr. Scott Casper, Dean of the College of Arts, Humanities, and Social...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/92360/guest@my.umbc.edu/4e64d6bc2032a4bce70416c8180b7c07/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Mon, 20 Apr 2020 12:06:50 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="92359" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/92359">
    <Title>Student Work at Home Scam</Title>
    <Tagline>Hackers Offering Jobs at Cisco Systems</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><span><p><span>A scam message (see below) was sent to about 80 UMBC email addresses on 4/15/2020.  It’s a variation of a scam job offer we saw a few months ago.  </span></p><br><p><span>It is </span><span>NOT</span><span> from Cisco Systems.  If you respond positively, you will get forms to fill in with lots of your personal and financial information which can be used to rip you off more effectively later.</span></p><br><p><span>Replying with a hostile response only lets them know they have a valid, active email address.  Don’t try to hurt their feelings. They really don’t care.  This is a business to them. </span></p><br><p><span>Cisco Systems may offer you a job someday, but this isn’t it.</span></p><br><p><span>The Division of Information Technology wants to know about suspicious job offers in order to warn the UMBC community.   Please report any offers like this by forwarding them to: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. </span></p><br><br><br><p><span>From: </span><span>Candice Terrence</span><span> &lt;<a href="mailto:terrencandice@gmail.com">terrencandice@gmail.com</a>&gt;</span></p><p><span>Date: Wed, Apr 15, 2020 at 2:28 PM</span></p><p><span>Subject: WORK FROM HOME</span></p><p><span>To: </span></p><br><p><span>Dear Student,</span></p><br><p><span>   We got your contact through your school database and I'm happy to inform you that our reputable company CISCO Systems® is currently running a student empowerment program. This program is completely school-oriented as it has been designed not to deter you from school and other activities which are before you and this organization. You are selected from your school database to partake in the ongoing program. This offer is a PART-TIME position accompanied by attractive weekly wages among all others and reasonable working hours per week.</span></p><br><p><span>TO PROCEED WITH THIS JOB OFFER, KINDLY REPLY THIS MAIL WITH YOUR PERSONAL E-MAIL ADDRESS TO RECEIVE THE FULL JOB DESCRIPTION/OFFER FOR THIS OPEN JOB POSITION</span></p><br><p><span>Best Regards,</span></p><br><p><span>Candice Terrence</span></p><p><span>HR Recruit Manager/Consultant</span></p><p><span>CISCO Systems®.</span></p><div><span><br></span></div></span></div>
      ]]>
    </Body>
    <Summary>A scam message (see below) was sent to about 80 UMBC email addresses on 4/15/2020.  It’s a variation of a scam job offer we saw a few months ago.     It is NOT from Cisco Systems.  If you respond...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/92359/guest@my.umbc.edu/24e291852f4f0cbb79829df50a384a5b/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Mon, 20 Apr 2020 12:01:09 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="91857" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/91857">
  <Title>Phishing Email Impersonations</Title>
  <Tagline>Several High Profile Administrators Impersonated</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><div>DoIT has been made aware of several new phishing emails from the weekend:</div><div><br></div>
    <div><table border="1" width="350">
    <tbody><tr><td><pre>From: Dean Drake &lt;<a href="mailto:ddrake.umbc.edu@gmail.com">ddrake.umbc.edu@gmail.com</a>&gt;&#x000A;    Date: Sat, Apr 4, 2020, 2:45 PM&#x000A;    Subject: Re: Quick One&#x000A;    To: &lt; @umbc.edu&gt;&#x000A;    &#x000A;    --&#x000A;    Hello,are you available?&#x000A;    &#x000A;    Dean Drake&#x000A;    Associate VP Research&#x000A;    Research Administration&#x000A;    Information Technology &amp; Engineering, Room 219</pre>
    </td></tr></tbody></table><br></div><div>
    
    Messages have also been received from the following addresses:</div><div><ul><li><a href="mailto:dglossner.hilltop.umbc.edu@gmail.com">dglossner.hilltop.umbc.edu@gmail.com</a> (Duane Glossner)</li><li><a href="mailto:johnfox.umbc.edu@gmail.com">johnfox.umbc.edu@gmail.com</a> (John Fox)</li><li><a href="mailto:jrexing.umbc.edu@gmail.com">jrexing.umbc.edu@gmail.com</a> (Joseph Rexing)</li><li><a href="mailto:rous.umbc.edu@gmail.com">rous.umbc.edu@gmail.com</a> (Philip Rous)</li><li><a href="mailto:valeriethoma0@gmail.com">valeriethoma0@gmail.com</a> (Valerie A Thomas)</li></ul></div><div>These are all the same type of scam. If the recipient responds, they will receive another message asking to purchase gift cards, and to send the relevant gift card information back to the scammers. These messages often include publicly available directory information to appear more legitimate, though the From address in this case is actually from <strong>gmail.com</strong>.</div><div><br></div><div><strong><u>If you receive one of these messages, do not respond or reply. Forward the message to <a href="mailto://security@umbc.edu" rel="nofollow external" class="bo">security@umbc.edu</a>, and delete the message.</u></strong></div><div><br></div><div>For more information on spotting phishing messages and handling spam, please check out our FAQ: <a href="https://wiki.umbc.edu/x/HwMxAg" rel="nofollow external" class="bo">https://wiki.umbc.edu/x/HwMxAg</a></div></div>
]]>
  </Body>
  <Summary>DoIT has been made aware of several new phishing emails from the weekend:        From: Dean Drake &lt;ddrake.umbc.edu@gmail.com&gt; Date: Sat, Apr 4, 2020, 2:45 PM Subject: Re: Quick One To: &lt;...</Summary>
  <Website>https://itsecurity.umbc.edu</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/91857/guest@my.umbc.edu/6989ca5b3b159f964fd02054b15986bc/api/pixel</TrackingUrl>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <ThumbnailUrl size="xxlarge">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/091/857/e28fbf78474e81cf5246e15a4097f6ba/xxlarge.jpg?1586185724</ThumbnailUrl>
  <ThumbnailUrl size="xlarge">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/091/857/e28fbf78474e81cf5246e15a4097f6ba/xlarge.jpg?1586185724</ThumbnailUrl>
  <ThumbnailUrl size="large">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/091/857/e28fbf78474e81cf5246e15a4097f6ba/large.jpg?1586185724</ThumbnailUrl>
  <ThumbnailUrl size="medium">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/091/857/e28fbf78474e81cf5246e15a4097f6ba/medium.jpg?1586185724</ThumbnailUrl>
  <ThumbnailUrl size="small">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/091/857/e28fbf78474e81cf5246e15a4097f6ba/small.jpg?1586185724</ThumbnailUrl>
  <ThumbnailUrl size="xsmall">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/091/857/e28fbf78474e81cf5246e15a4097f6ba/xsmall.jpg?1586185724</ThumbnailUrl>
  <ThumbnailUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/091/857/e28fbf78474e81cf5246e15a4097f6ba/xxsmall.jpg?1586185724</ThumbnailUrl>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 06 Apr 2020 11:13:56 -0400</PostedAt>
  <EditAt>Mon, 06 Apr 2020 11:15:43 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="91736" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/91736">
    <Title>Fake DocuSign Phishing Message</Title>
    <Tagline>Look out for fake DocuSign Messages</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><span><p><span>Yesterday morning, between 8:45am and 10:00am, several UMBC users received DocuSign messages offering access to a document called “News Update.pdf” with a button labeled “View Document Now”.  </span></p><br><p><span>The From address of the email “</span><a href="mailto:dse_docusign2@docusign.umbc.edu" rel="nofollow external" class="bo"><span>dse_docusign2@docusign.umbc.edu</span></a><span>” was forged.  This message did not originate from the UMBC’s DocuSign system.  It is, however, an unusually good design for a phishing attack.</span></p><br><p><span>In the current work climate, it is easy to overlook unusual features of messages we get in our UMBC email inboxes.  We are also using tools, like Docusign, more than ever.  There are people who will try to take advantage of that.  While the source of this message is currently under investigation, DoIT wanted to share some of the key features of this message that raise suspicions about its origin.</span></p><br><br><p><span>Example of </span><span>Malicious DocuSign Forgery</span><span>:</span></p><br><br><div><table><colgroup></colgroup><tbody><tr><td><p><span><span><img src="https://lh5.googleusercontent.com/pf7f-GQkMLl5bslm69aYUUHK7qbHgtSnZRhoWsLXkKzvGau2LE7-dnBBujZ9lUThFiX7Zo71l3MWtoAiYcOOMLtxqsJRZ5iUOlhecoApumNy1LXuSds-pD4x30-TbMOvOVWSNWl2" width="610" height="240" style="max-width: 100%; height: auto;"></span></span></p></td></tr></tbody></table></div><br><br><p><span>In the example above there are some tell-tale signs that should raise suspicions.  </span></p><br><ul><li><p><span>The message begins with the salutation “DocuSign,” and is from “The DocuSign Team”.  They seem to be addressing themselves.</span></p></li><li><p><span>There is no “DocuSign Team”.  DocuSign notifications are from UMBC staff.</span></p></li><li><p><span>The From: header in the upper left says “</span><a href="mailto:dse_docusign2@docusign.umbc.edu" rel="nofollow external" class="bo"><span>dse_docusign2@docusign.umbc.edu</span></a><span>”.  In an actual docusign message, that header would be something like “</span><span>Andy Johnston via DocuSign &lt;<a href="mailto:dse_na2@docusign.net">dse_na2@docusign.net</a>&gt;</span><span>”</span></p></li><li><p><span>DocuSign message subjects normally start with the words “Please DocuSign”.  This one does not.</span></p></li><li><p><span>The point of DocuSign is to be able to verify, by signing, that you have received a document.  There is no reason to do that for a news update.  UMBC News is sent out in regular email messages.</span></p></li></ul><h3><span>Did You Click on the Button?</span></h3><p><span>If you are one of the people who got this message and clicked on the button, you should have gotten this message:</span></p><br><p><span><span><img src="https://lh4.googleusercontent.com/Uux4FYix2Ex-T7YqaV8r4CJgGLHzJYc0xmXrg9RHe7i3mLvbRCh2q2bmz4AjlshFYc5YwAflolmofpITX8Q5mnrcpq8CDfRmjoicVp1smOsBxsGVCnhUESo7v6QQEZFYyj-Uusee" width="624" height="484" style="max-width: 100%; height: auto;"></span></span></p><br><span>If you selected ‘Proceed’, you would probably have gotten a message that the page was unreachable or the link was invalid.  If you got anything else, please submit a ticket to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> so that we can contact you.</span></span></div>
      ]]>
    </Body>
    <Summary>Yesterday morning, between 8:45am and 10:00am, several UMBC users received DocuSign messages offering access to a document called “News Update.pdf” with a button labeled “View Document Now”.  ...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/91736/guest@my.umbc.edu/815dcbac850730795560e529bbcf3828/api/pixel</TrackingUrl>
    <Tag>covid19</Tag>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Tue, 31 Mar 2020 16:35:38 -0400</PostedAt>
    <EditAt>Tue, 31 Mar 2020 16:36:06 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="91732" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/91732">
  <Title>Home Network Security</Title>
  <Tagline>As we all work and study at home, we need to stay secure.</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><div>If you are part of the UMBC community and are reading this in the spring of 2020, then you are very likely working and/or teaching and/or learning from home over the Internet.  In most cases, you have an Internet provider such as Comcast or Verizon and you have a router in your home to connect to them.  The router is your gateway to the Internet.  It is also the Internet’s gateway to you. (See links below for information about  recently discovered vulnerabilities in home routers.)</div><div><br></div><div><u>The Basics</u></div><div>For most people, the home router does two things.  </div><div><ol><li>It creates a small network that your devices can access either through WiFi or through a cable physically connected to the router.</li><li>It also connects that little network to your provider and, through them, to the Internet.</li></ol></div><div>Your router comes out of the box pretty much ready to go to work for you, but it’s not usually as secure as it could or should be.  There are a number of settings, especially in older routers, that should be verified or changed to make sure that:</div><div><ul><li>No one joins your small home network without your knowledge and permission.</li><li>No one out on the Internet can tell the router to behave in ways you don’t want it to.</li></ul></div><div>How you view and change these settings will vary with the make and model of your router.  There are some links at the end which may help you, but your best bet is to get the make and model of your router (usually printed on the back or the bottom) and search for them on Google, Bing, or some other search service.  Include terms like “setup”, “manual” and “secure”.  Try to use a site belonging to the router’s manufacturer.  (You will probably be accessing your router through a web browser on your home network.)</div><div><br></div><div>Here is an initial to-do list:</div><div><ul><li>Secure your wireless connection</li><ul><li>This is the connection between your wireless devices (laptop, tablet, etc.) and your router on the “small network” in your house.  Make sure encryption is enabled and set to WPA2 or WPA3.  If there is an option for WPS encryption, disable it if possible.  If not possible, consider getting a new router.</li></ul><li>Change the router’s administrative password</li><ul><li>There are two different passwords associated with your router.  There’s your WiFi password that is entered in every device on your home WiFi network, and there’s that administrative password that you use to go into your router to view and change its settings.  Modern routers often come with pre-set WiFi passwords.</li></ul><li>Update your router’s firmware</li><ul><li>If you’re a Windows user, you have dealt with software updates since you first booted the machine.  This is much the same.   Precisely how you update your router depends on its make and model. If your router has an auto-update feature, you should probably use it.</li></ul><li>MAC filtering</li><ul><li>This is not about Apple computers.  Each wifi device, that connects with your router, no matter what kind of device it is, has a unique MAC address that you normally don’t see but can discover.  This allows you to refuse access to all devices other than those whose MAC addresses you explicitly ‘whitelist’ (allow) in your router.  If you’re comfortable doing this, consider implementing it..  WARNING: There’s a security vs. convenience trade-off here. You will have to whitelist every new device that you want to appear on your home network.  </li></ul><li>If your router has a ‘remote management’ setting, turn it off.</li></ul></div><div><br></div><div>Links for more information:</div><div><ul><li><a href="https://www.wired.com/story/secure-your-wi-fi-router/">https://www.wired.com/story/secure-your-wi-fi-router/</a></li><li><a href="https://lifehacker.com/how-to-make-your-wifi-router-as-secure-as-possible-1827695547">https://lifehacker.com/how-to-make-your-wifi-router-as-secure-as-possible-1827695547</a></li><li><a href="https://www.consumer.ftc.gov/blog/2020/03/online-security-tips-working-home">https://www.consumer.ftc.gov/blog/2020/03/online-security-tips-working-home</a></li><li><a href="https://www.cisecurity.org/white-papers/cis-controls-telework-and-small-office-network-security-guide/">https://www.cisecurity.org/white-papers/cis-controls-telework-and-small-office-network-security-guide/</a></li></ul></div><div>Links for more information about recently discovered vulnerabilities in home routers:</div><div><ul><li><a href="https://arstechnica.com/information-technology/2020/03/new-attack-on-home-routers-sends-users-to-spoofed-sites-that-push-malware/">https://arstechnica.com/information-technology/2020/03/new-attack-on-home-routers-sends-users-to-spoofed-sites-that-push-malware/</a></li><li><a href="https://labs.bitdefender.com/2020/03/new-router-dns-hijacking-attacks-abuse-bitbucket-to-host-infostealer/">https://labs.bitdefender.com/2020/03/new-router-dns-hijacking-attacks-abuse-bitbucket-to-host-infostealer/</a></li><li><a href="https://www.bleepingcomputer.com/news/security/hackers-hijack-routers-dns-to-spread-malicious-covid-19-apps/">https://www.bleepingcomputer.com/news/security/hackers-hijack-routers-dns-to-spread-malicious-covid-19-apps/</a></li></ul></div><div><br></div></div>
]]>
  </Body>
  <Summary>If you are part of the UMBC community and are reading this in the spring of 2020, then you are very likely working and/or teaching and/or learning from home over the Internet.  In most cases, you...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/91732/guest@my.umbc.edu/5359b0cf8623ce3a26a5ae8ef53ac62d/api/pixel</TrackingUrl>
  <Tag>covid19</Tag>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 31 Mar 2020 16:16:36 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="91731" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/91731">
    <Title>Telework Security Resources</Title>
    <Tagline>Here are some good resources for securing your telework...</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content">More people throughout the United States are teleworking now, including many who have never done so before.  The UMBC community is no exception as many of us work, learn and teach from our keyboards.  All this remote work is opening up new avenues of exploitation for unscrupulous scammers.  DoIT will be posting resources and suggestions to help you maintain security as more of your life moves on-line.<div><br></div><div><div>The SANS Institute is offering the SANS Security Awareness Work-from-Home Deployment Kit.</div><div><ul><li><a href="https://www.sans.org/security-awareness-training/sans-security-awareness-work-home-deployment-kit">https://www.sans.org/security-awareness-training/sans-security-awareness-work-home-deployment-kit</a></li></ul></div><div><br></div><div>As part of the kit, SANS has posted a five-step guide to teleworking security.  You can find it (in several languages) here:</div><div><ul><li><a href="https://www.sans.org/security-awareness-training/fact-sheet">https://www.sans.org/security-awareness-training/fact-sheet</a></li></ul></div><div><br></div><div>LinkedIn is offering registered users several LinkedIn Learning courses that focus on being productive while working from home, including tips on using virtual meeting tools to build relationships in a new working environment. </div><div><ul><li><a href="https://www.linkedin.com/learning/paths/remote-working-setting-yourself-and-your-teams-up-for-success">https://www.linkedin.com/learning/paths/remote-working-setting-yourself-and-your-teams-up-for-success</a></li></ul></div><div><br></div><div>NIST has posted a well-designed graphic to help organizations secure conference calls.</div><div><ul><li><a href="https://www.nist.gov/image/conference-call-security-graphic">https://www.nist.gov/image/conference-call-security-graphic</a></li></ul></div><div><br></div><div>INFOSEC has published an article that discusses remote working security, including a brief description of VPN technology.</div><div><ul><li><a href="https://resources.infosecinstitute.com/category/enterprise/securityawareness/security-awareness-roles/security-awareness-issues-for-remote-workers/#gref">https://resources.infosecinstitute.com/category/enterprise/securityawareness/security-awareness-roles/security-awareness-issues-for-remote-workers/#gref</a></li></ul></div><div><br></div><div>The National Cyber Security Alliance (NCSA) has posted the “COVID-19 Security Resource Library” of security links for teleworkers.</div><div><ul><li><a href="https://staysafeonline.org/covid-19-security-resource-library/">https://staysafeonline.org/covid-19-security-resource-library/</a></li></ul></div></div><div><br></div></div>
      ]]>
    </Body>
    <Summary>More people throughout the United States are teleworking now, including many who have never done so before.  The UMBC community is no exception as many of us work, learn and teach from our...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/91731/guest@my.umbc.edu/5953a0b0826f029855bc77da1d65b6e8/api/pixel</TrackingUrl>
    <Tag>covid19</Tag>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Tue, 31 Mar 2020 15:47:52 -0400</PostedAt>
    <EditAt>Tue, 31 Mar 2020 15:48:15 -0400</EditAt>
  </NewsItem>
</News>
