<?xml version="1.0"?>
<News hasArchived="false" page="2" pageCount="4" pageSize="10" timestamp="Tue, 28 Apr 2026 01:35:44 -0400" url="https://dev.my.umbc.edu/groups/itsecurity/posts.xml?page=2&amp;tag=covid19">
  <NewsItem contentIssues="true" id="94833" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/94833">
    <Title>New "Economic Relief" Phishing Email</Title>
    <Tagline>Fake Small Business Administration (SBA) Loan Offer</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>The Cybersecurity and Infrastructure Security Agency (CISA)</span><span> announced a new phishing email campaign spoofing the Small Business Administration (SBA). This email has the subject “SBA Application – Review and Proceed”</span><span> and contains a link to a fake SBA website login page, allowing scammers to harvest credentials from unsuspecting victims. Here is an image of the malicious site, provided in CISA’s alert.</span></p><p><span><span><img src="https://lh5.googleusercontent.com/fjNX2V0c4NEzzoOfZuahWZRy9h-zftQKmvoXPU0mNbrJrTe3HarTbxeIWkLyuSvgqqxAJAKg5NAKKhmjxurBuSW0Mk5wjnvQWS5D7Z74Aj4sLSOaJ_909-UCzDbZpZCUsVXwEt8L" width="624" height="362" style="max-width: 100%; height: auto;"></span></span></p><p><span>For more information, including a list of known sender addresses and URLs, please see the original alert at</span><a href="https://us-cert.cisa.gov/ncas/alerts/aa20-225a" rel="nofollow external" class="bo"><span>https://us-cert.cisa.gov/ncas/alerts/aa20-225a</span></a><span>.</span></p><p><span>If you receive any suspicious email, please do not respond or click any links. Instead, forward the message and full headers to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><p><span> </span></p><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
      ]]>
    </Body>
    <Summary>The Cybersecurity and Infrastructure Security Agency (CISA) announced a new phishing email campaign spoofing the Small Business Administration (SBA). This email has the subject “SBA Application –...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/94833/guest@my.umbc.edu/6228f4ab21e5d55dd49980b0cd7d9757/api/pixel</TrackingUrl>
    <Tag>covid19</Tag>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Thu, 13 Aug 2020 11:47:33 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="94779" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/94779">
    <Title>Powerball Scam Emails</Title>
    <Tagline>A New Example Of An Old Scam</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>DoIT Security has received a new variation of a classic get-rich-quick scam, this time claiming to be from a Powerball winner who wishes to distribute millions of dollars, supposedly to lessen the impact of COVID-19. Over 5000 UMBC addresses received emails from this sender, most likely containing the same message.</span></p><p><span>From: "Bill and Helene" &lt;<a href="mailto:kkt-co@beige.plala.or.jp">kkt-co@beige.plala.or.jp</a>&gt;</span></p><p><span>Subject: We Have Private For Donation</span></p><p><span>Date: Tue, 11 Aug 2020 14:26:21 +0900</span></p><p><span> </span></p><p><span>--</span></p><p><span>The Corona Virus (COVID-19) Outbreak isn't just a major health</span></p><p><span>crisis -- It's also a large economic disruption leading to people</span></p><p><span>Losing their Jobs and making it harder to take care of their</span></p><p><span>Families.</span></p><p><span> </span></p><p><span>We know that a little financial support can go a Long Way.</span></p><p><span> </span></p><p><span>I'm Bill Lawrence from Sacramento California the Winner of 150 million</span></p><p><span>United State Dollars Jackpot from the Power ball lottery held on</span></p><p><span>December 16, 2019. My Jackpot was a gift from God to me.</span></p><p><span>Hence my entire Family has agreed to do this.</span></p><p><span>We are donating $75 million to Help individuals and Small Scale</span></p><p><span>Businesses around the world.</span></p><p><span>I write to inform you that Google in alliance with Microsoft and Yahoo has submitted your</span></p><p><span>"Email" to my request to receive a donation amount of $5,000,000</span></p><p><span>Please accept this Token as a Gift From me and My Family.</span></p><p><span>We await your urgent response Via email <a href="mailto:heleneandbill97@gmail.com">heleneandbill97@gmail.com</a></span></p><p><span> </span></p><p><span>Bill and Helene Lawrence</span></p><p><span><a href="https://www.powerball.com/winner-story/150-million-powerball-ticket-claimed">https://www.powerball.com/winner-story/150-million-powerball-ticket-claimed</a></span></p><p><span> </span></p><p><span>Messages like these, which promise large amounts of money, are most likely advance-fee scams. Also known as Nigerian Prince scams, or 419 scams, advance-fee scams promise a large amount of money that can be claimed after paying a comparatively small fee. After a victim pays the fee, the scammer may claim to need another fee, or may vanish. Either way, victims will never receive any money in return.</span></p><p><span>In addition to the irregular grammar and capitalization, note the From address with a .jp domain, and the time zone, UTC+0900. Both of these indicate that the message originated in Japan, not California. Although the URL provided appears to be legitimate, it does not indicate that the message is really from the Powerball winner. It is always best not to click links in suspicious emails, as they may contain malware, steal personal information, or, as in this case, simply provide misleading information when used in the context of a scam email.</span></p><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to <a href="mailto:security@umbc.edu">security@umbc.edu</a>.</span></p><p><span> </span></p><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><p><span> </span></p><p><span>To read more articles published by DoIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. <br></span></p></div>
      ]]>
    </Body>
    <Summary>DoIT Security has received a new variation of a classic get-rich-quick scam, this time claiming to be from a Powerball winner who wishes to distribute millions of dollars, supposedly to lessen the...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/94779/guest@my.umbc.edu/fc85e5da18b9dd15ed396330d7c8776a/api/pixel</TrackingUrl>
    <Tag>covid19</Tag>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Tue, 11 Aug 2020 22:18:23 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="94778" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/94778">
  <Title>Government Imposter Scams</Title>
  <Tagline>Scammers Pretend To Be From Government Agencies</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span>In  the article linked below, the Better Business Bureau is warning of government imposter scams. In these scams, a malicious actor will call or even message the victim claiming to be from a government agency. Their goals are usually to steal the victim’s personal and financial information, to steal the victim’s  money or or to persuade the victim to install malware. </span></p><br><p><span>According to the article, most Americans have encountered this scam before. Research done by the Better Business Bureau found that the Social Security Administration, Service Canada, the Internal Revenue Service (IRS) and the Canada Revenue Agency are among the most impersonated. </span><span><br></span><span><br></span><span>Some examples of Social Security-related impersonation scams:</span><span><br><br></span></p><ul><li><p><span>Increase a benefit</span><span>: In this scam the malicious actor will claim that the victim is eligible for increased benefits, typically due to a cost of living increase. The malicious actor will request bank account details so that the money can be deposited into the victim’s account. Once the malicious actor has the banking information they are able to steal money from the account.</span></p></li><li><p><span>Restoring Social Security Number</span><span>: Some malicious actors will claim the victim's Social Security Number has been suspended. The malicious actor will ask the victim to pay for it to be restored. They may also ask for the victim's Social Security account information, which allows them to apply for benefits under the victims name.</span></p></li><li><p><span>Social Security Number used in a crime</span><span>, in this scam the malicious actor will threaten arrest if the victim does not respond immediately.</span><span><br><br></span></p></li></ul><p><span>When the IRS is used as a cover instead of the Social Security Agency the scams vary, though they have many similarities to the Social Security scams.  For instance,  the malicious actor may claim to be an IRS agent and threaten the victim with arrest for unpaid taxes or even fraud. </span></p><br><p><span>The only way to avoid being arrested, the victim is told,  is by paying a fine (or the unpaid taxes) immediately.  Victims are told to buy gift cards and to provide the caller with the number on the back of each card. But of course these threats are fake, and these are just scammers trying to use fear to get the victims money or information. </span></p><br><p><span>Just as with phishing scams, the malicious actors follow the headlines and change their scams with thet latest news. During the Covid-19 pandemic and after the passage of the Coronavirus Aid, Relief, and Economic Security (CARES) Act, scammers started to claim to be from the CDC or the United States Treasury Department in order to manipulate and steal personal and financial information from victims.</span></p><br><p><span>Some examples of Covid-19 related impersonation scams are: </span></p><br><ul><li><p><span>Relief benefits</span><span>: Malicious actors claiming to be from the IRS and offering to expedite benefits under the CARES Act.</span></p></li><li><p><span>Fake donations</span><span>: Malicious actors claiming to be from the CDC requesting donations. Email and text messages making these claims may arrive with malware or URLs that could cause harm to the victim's device.</span></p></li><li><p><span>Contact tracing scams</span><span>: Email, texts, or messages on social media claiming to be from contact tracers informing the victim that they have come in contact with someone who has tested positive for Covid-19. These scammers seek personal information and/or send messages that may contain malware. For official information on contact tracing efforts in Maryland please visit </span><a href="https://coronavirus.maryland.gov/pages/contact-tracing" rel="nofollow external" class="bo"><span>https://coronavirus.maryland.gov/pages/contact-tracing</span></a><span>.</span></p></li></ul><br><p><span>Scammers have also threatened arrest for missing jury duty, impersonated immigration officials threatening to deport the victim, and offered free money in the form of government grants.</span></p><br><p><span>Some red flags to watch for to see if the person claiming to be from a government agency is actually a malicious actor:</span></p><br><ul><li><p><span>The IRS generally first contacts people by the postal mail. Never provide your bank account or other personal information to anyone who calls you.</span></p></li><li><p><span>Don’t pay by gift cards. The IRS and other government agencies will not idemand or even accept payment using iTunes cards, gift cards, prepaid debit cards, money order, bitcoin or cash.</span></p></li><li><p><span>The IRS will never request personal or financial information by email, text, or any social media platform. Do not click on any links in unsolicited emails or text messages.</span></p></li><li><p><span>Social Security numbers are never “suspended”.</span></p></li><li><p><span>Caller ID cannot be trusted to confirm that the source is from a government agency. Look up the phone number for the agency and call to see if they are really trying to contact you.</span></p></li><li><p><span>The Social Security Administration will never threaten to arrest you because of an identity theft problem. </span></p></li></ul><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>For more information, please check out: </span></p><p><a href="https://www.bbb.org/article/news-releases/22775-government-impostors-study" rel="nofollow external" class="bo"><span>https://www.bbb.org/article/news-releases/22775-government-impostors-study</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
  </Body>
  <Summary>In  the article linked below, the Better Business Bureau is warning of government imposter scams. In these scams, a malicious actor will call or even message the victim claiming to be from a...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/94778/guest@my.umbc.edu/0f76579417510b4e52653664556d6502/api/pixel</TrackingUrl>
  <Tag>covid19</Tag>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 11 Aug 2020 21:35:32 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="94676" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/94676">
  <Title>Be Wary Of These Covid-19 Scams</Title>
  <Tagline>Some Of The Scams Coming Over Email, Phone, and Text</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span>In the article linked below, BBC News warns of different Covid-19 themed frauds and scams. Many malicious actors follow the headlines just like the rest of us, and when they see a crisis like Covid-19, they take the opportunity to jump on the fear and try to scam as many people as they can. </span></p><br><p><span>The article warns of these scams to be wary of:</span></p><br><ul><li><p><span>Covid-19 Financial Support Scams</span></p></li><ul><li><p><span>Fake government emails, which look to be from a government department and offer financial grants. The emails contain a link which can steal both personal and financial information.</span></p></li><li><p><span>Scam emails offering access to a “Covid-19 relief fund”, and encouraging users to fill in a form and hand over personal information.</span></p></li><li><p><span>Official-looking emails offering “tax reductions.” The email is reported to contain a link that takes users to a fake government website which can harvest users personal and financial information.</span></p></li><li><p><span>E-mails offering to help Benefit recipients in applying for universal credit, but which fraudsters will grab some of the payment as an advance for their "services".</span></p></li><li><p><span>Email about claiming fake school meal funds and fake government grants.</span><span><br><br></span></p></li></ul><li><p><span>Health Related Scams</span></p></li><ul><li><p><span>Phishing emails claiming that the user has been in contact with someone who has been diagnosed with Covid-19. The links lead to fake websites that are used to steal personal and financial information or even infect the device with malware. </span><span><br></span><span>For official information on contact tracing efforts in Maryland please visit </span><a href="https://coronavirus.maryland.gov/pages/contact-tracing" rel="nofollow external" class="bo"><span>https://coronavirus.maryland.gov/pages/contact-tracing</span></a><span>.</span></p></li><li><p><span>Fake ads for non-existent Covid-19 related products, such as hand sanitizer and face masks. They simply will take the users’ money and send them nothing.</span></p></li><li><p><span>Offers of fake Covid-19 test kits and hand sanitizer, or even products claiming to treat or prevent Covid-19.</span><span><br><br></span></p></li></ul><li><p><span>Social Distancing Related Scams</span></p></li><ul><li><p><span>Fake emails and texts claiming to be from “TV Licensing”, telling people they are eligible for six months of free TV because of Covid-19. Users are then told there has been a problem with their card and are asked to click on a link that takes them to a fake website designed to steal users persona and financial information.</span></p></li><li><p><span>Emails asking people to update their TV subscription services payment details by clicking on a link which is designed to steal credit card information.</span></p></li><li><p><span>Fake profiles on social media sites designed to try and manipulate users into giving them their money. </span></p></li><li><p><span>Fake investment advertisements on social media sites encouraging users to “take advantage of the financial downturn.” Bitcoin platforms are using emails and adverts on social media platforms to encourage users to put money into fake companies using fake websites.</span></p></li><li><p><span>Malicious actors cold-calling home residents offering to do shopping errands.</span></p></li><li><p><span>Messages telling the user that they have been fined for leaving their home more than once a day. Links in these messages are designed to steal a victim’s personal and financial information or to install malicious software onto the user’s device.</span><span><br><br></span></p></li></ul><li><p><span>What We See at UMBC</span></p></li><ul><li><p><span>At UMBC, DoIT is getting reports of work-from-home phishing emails. These phishing emails follow a similar pattern of offering a work-from-home opportunity and ask for personal information like personal email and home address. They will then send a fraudulent check to the user which should not be cashed. </span></p></li><li><p><span>Recently DoIT has also seen phishing emails attempting to impersonate UMBC staff and asking for gift cards or phone numbers.</span></p></li></ul></ul><br><p><span>For more information on these and other phishing attempts at UMBC please visit the DoIT Security page which can be found here </span><a href="https://itsecurity.umbc.edu/" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/</span></a><span>.</span></p><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>For more information, please visit: </span></p><p><a href="https://www.bbc.com/news/business-53573408" rel="nofollow external" class="bo"><span>https://www.bbc.com/news/business-53573408</span></a></p><br><p><span>To read more articles published by DoIT Security please visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
  </Body>
  <Summary>In the article linked below, BBC News warns of different Covid-19 themed frauds and scams. Many malicious actors follow the headlines just like the rest of us, and when they see a crisis like...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/94676/guest@my.umbc.edu/236ccbcd1893176b192d2ab2f0ea31f7/api/pixel</TrackingUrl>
  <Tag>covid19</Tag>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Wed, 05 Aug 2020 18:12:32 -0400</PostedAt>
  <EditAt>Wed, 05 Aug 2020 18:14:26 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="94419" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/94419">
    <Title>Fake Covid-19 Fund Scam</Title>
    <Tagline>No.  The FTC Is NOT Offering You Any Money</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>Fake Covid-19 Fund Scam</span></p><br><br><p><span>The FTC posted an article warning of a phishing scam that they recently discovered. In this scam, the malicious actor is sending email claiming to be from the FTC and saying that users could get money from a Covid-19 “Global Empowerment Fund.” All that is required of the user is to respond with their bank account information.</span><span><br></span><span><br></span><span>This email is a scam.</span><span>  It is </span><span>not </span><span>from the FTC, there is </span><span>no </span><span>money and there is </span><span>no </span><span>fund. The FTC says that they will never contact you by phone, email, text message, or by social media to ask for financial information, this includes your social security number. They also state that any stimulus checks will be from the IRS , not the FTC.</span></p><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> and delete the message.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>For more information, please check out: </span></p><p><a href="https://www.consumer.ftc.gov/blog/2020/06/fake-emails-about-fake-money-fake-covid-19-fund" rel="nofollow external" class="bo"><span>https://www.consumer.ftc.gov/blog/2020/06/fake-emails-about-fake-money-fake-covid-19-fund</span></a></p></div>
      ]]>
    </Body>
    <Summary>Fake Covid-19 Fund Scam    The FTC posted an article warning of a phishing scam that they recently discovered. In this scam, the malicious actor is sending email claiming to be from the FTC and...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/94419/guest@my.umbc.edu/18d39ec7d1971003e8881366aa63b703/api/pixel</TrackingUrl>
    <Tag>covid19</Tag>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Wed, 22 Jul 2020 14:49:56 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="94418" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/94418">
  <Title>Phishing Email Subject Lines</Title>
  <Tagline>A Guide To Common Phishing Email Subjects</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span>With COVID-19 and associated restrictions remaining prevalent, many malicious actors have used the opportunity to update their phishing email campaigns. The article linked below explains some of the ways malicious actors try and trick people into giving up their information or even into installing malware.</span></p><br><p><span>The article states that many of the emails will use subject lines like coronavirus, work reopening, rescheduled meetings, stimulus payments, and new vacation policies. Malicious actors also craft themed emails to look like popular social media sites like Facebook and LinkedIn.</span></p><br><p><span>For LinkedIn they noticed subject lines "You appeared in new searches this week," "People are looking at your LinkedIn profile," "Please add me to your LinkedIn Network," and "LinkedIn Password Reset."</span></p><br><p><span> Facebook sees phishing emails using subject lines like "Your Friend Tagged a Photo of You" and "Your friend tagged you in photos on Facebook." Phishing campaigns from Twitter were said to try and entice people with subject lines similar to "Someone has sent you a Direct Message on Twitter."</span></p><br><p><span>Other subjects included "A login alert for Chrome on Motorola Moto X," "New voice message at 1:23AM," and "55th Anniversary and Free Pizza". The article also describes some general subjects to look out for:</span></p><br><ul><li><p><span>Password Check Required Immediately</span></p></li><li><p><span>Vacation Policy Update</span></p></li><li><p><span>Branch/Corporate Reopening Schedule</span></p></li><li><p><span>COVID-19 Awareness</span></p></li><li><p><span>Coronavirus Stimulus Checks</span></p></li><li><p><span>List of Rescheduled Meetings Due to COVID-19</span></p></li><li><p><span>Confidential Information on COVID-19</span></p></li><li><p><span>COVID-19 - Now airborne, Increased community transmission</span></p></li><li><p><span>Fedex Tracking</span></p></li><li><p><span>Your meeting attendees are waiting</span><span><br><br></span></p></li></ul><p><span>According to the article, the most common subject lines within phishing emails found “in-the-wild” in the last quarter were:</span></p><br><ul><li><p><span>Microsoft: Abnormal log in activity on Microsoft account</span></p></li><li><p><span>Chase: Stimulus Funds</span></p></li><li><p><span>HR: Company Policy Notification: COVID-19 - Test &amp; Trace Guidelines</span></p></li><li><p><span>Zoom: Restriction Notice Alert</span></p></li><li><p><span>Jira: [JIRA] A task was assigned to you</span></p></li><li><p><span>HR: Vacation Policy Update</span></p></li><li><p><span>Ring: Karen has shared a Ring Video with you</span></p></li><li><p><span>Workplace: [company_name] invited you to use Workplace</span></p></li><li><p><span>IT: ATTENTION: Security Violation</span></p></li><li><p><span>Earn money working from home</span><span><br><br></span></p></li></ul><p><span>At UMBC some of the most common subject lines for phishing emails seen recently have been “UMBC JOB OPPORTUNITY”, “CORNERSTONE STUDENT JOB OFFER”, “CORNERSTONE JOB OFFER”, “UMBC COVID-19 INFORMATION”, “UMBC COVID-19 PART TIME JOB OFFER” and “WORK FROM HOME.”</span><span><br></span><span><br></span><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> and delete the message.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>For more information, please check out: </span></p><p><a href="https://www.techrepublic.com/article/watch-out-for-these-subject-lines-in-email-phishing-attacks/" rel="nofollow external" class="bo"><span>https://www.techrepublic.com/article/watch-out-for-these-subject-lines-in-email-phishing-attacks/</span></a><span> <br></span></p></div>
]]>
  </Body>
  <Summary>With COVID-19 and associated restrictions remaining prevalent, many malicious actors have used the opportunity to update their phishing email campaigns. The article linked below explains some of...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/94418/guest@my.umbc.edu/f495c17d1f174c06aa6488841c31760d/api/pixel</TrackingUrl>
  <Tag>covid19</Tag>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Wed, 22 Jul 2020 14:45:53 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="94260" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/94260">
    <Title>Work-From-Home Scams Targeting College Students</Title>
    <Tagline>"To Good To Be True"</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>According to the article linked below, a recent work-from-home scam has been targeting college students. These malicious actors are targeting students via emails that appear to be sent from a college or company advertising fake work-from-home job opportunities.</span></p><br><p><span>The malicious actor will use these emails to obtain the students personal information. Once the malicious actor has the students information, they will send a counterfeit check instructing the students to deposit the check into their personal checking account. The malicious actor will then ask the student to withdraw the money and make a payment necessary for the job.</span></p><br><p><span>The article states that students who do fall victim to this scam can experience bank accounts being closed due to fraudulent activity and a report filed by the bank with a credit bureau or even law enforcement. The student would also be responsible for reimbursing the bank.</span></p><br><p><span>Tips to help spot and avoid these type of scams:</span></p><br><ul><li><p><span>Research the company first, look for a legitimate website and contact information. Try to find what others are saying about the company as well.</span></p></li><li><p><span>If they are contacting you and claiming to be from the University, locate the sender’s information through the school website and confirm whether the offer is real or not.</span></p></li><li><p><span>Look for bad grammar and spelling.</span></p></li><li><p><span>Offers of employment or pay without an interview are red flags. Legitimate jobs usually want to see who they are hiring.</span></p></li><li><p><span>Never send funds in the form of cash, check, gift cards or wire transfer to secure a job.</span></p></li><li><p><span>If you do receive a check from a scam similar to the one above, please do not cash the check.</span></p></li><li><p><span>If you have provided any banking or financial information to the suspected scammers, please notify your bank or financial institution immediately.</span></p></li></ul><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. </span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>  </span></p><br><p><span>For more information, please check out:</span></p><p><a href="https://www.winknews.com/2020/06/17/work-from-home-scam-targets-florida-college-students/" rel="nofollow external" class="bo"><span>https://www.winknews.com/2020/06/17/work-from-home-scam-targets-florida-college-students/</span></a></p></div>
      ]]>
    </Body>
    <Summary>According to the article linked below, a recent work-from-home scam has been targeting college students. These malicious actors are targeting students via emails that appear to be sent from a...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/94260/guest@my.umbc.edu/c9348fcd16b6cc05899fd6cfc75cc4e1/api/pixel</TrackingUrl>
    <Tag>covid19</Tag>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Mon, 13 Jul 2020 16:08:20 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="94257" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/94257">
  <Title>Avoiding COVID-19 Contact Tracing Scams</Title>
  <Tagline>How To Spot The Scammers</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span>Contact tracing is an integral part of the fight against COVID-19.  It speeds response, identifies potential hot spots, and focuses testing efforts.  Unfortunately, it also creates an opportunity for scammers to deploy two of their most powerful tools, impersonating authority and a sense of urgency.</span></p><br><p><span>A North Carolina news station conducted an information test by calling a producer's friends and using a script based on CDC recommendations.  </span></p><br><p><span>After the initial greeting and confirmation of the subject's name and birth date, the script abandoned the CDC guidelines and started asking for the subject's Social Security number, home address and other personal information.  These questions are presented as necessary to 'confirm' the subject's identity.  In fact, they are the basic elements of identity theft.  Several of the attempts were successful in getting a complete picture of the subject's personal information.</span></p><br><p><span>In another part of the same segment, the station interviewed an IT Security professional who demonstrated how a simple, professionally-worded message (from a fictitious contact tracing company) could get recipients to click on a link that could install malware on their computer.  The malware could be leveraged to give  an attacker complete access to all information on the system.</span></p><br><p><span>Contact tracing gives scammers a chance to represent themselves as providing a legitimate and authoritative service in combating a pandemic, and to take advantage of the stress their victim may feel on being informed that they have been identified as at-risk for infection.</span></p><br><p><span>If you get a text message or email telling you that you will be called by a contact tracer, then just wait for the call.  If you get a message telling you to click a link, DO NOT CLICK THE LINK!</span></p><br><p><span>If you live in Maryland, please visit <a href="https://coronavirus.maryland.gov/pages/contact-tracing">https://coronavirus.maryland.gov/pages/contact-tracing</a> .  If you are called by a legitimate contact tracer, your caller ID will tag the call as <strong>MD COVID</strong>.  If you do not have caller ID, the calling number should be (240) 466-4488.  You can also call back on (240) 466-4488 if you receive voice mail.  A legitimate contact tracer will not ask you for your Social Security number, bank account number or credit card information, nor will they ask for money.</span></p><br><p><u><span>References:</span></u></p><br><p><em><span>Rossen Reports: Feds warn of new contact tracing scam</span></em></p><p><span><a href="https://www.wxii12.com/article/rossen-reports-scammers-posing-as-contract-tracers/33251285">https://www.wxii12.com/article/rossen-reports-scammers-posing-as-contract-tracers/33251285</a></span></p><br><p><em><span>Notification of Exposure: A Contact Tracer's Guide for COVID-19</span></em></p><p><span><a href="https://www.cdc.gov/coronavirus/2019-ncov/php/notification-of-exposure.html">https://www.cdc.gov/coronavirus/2019-ncov/php/notification-of-exposure.html</a></span></p><br><p><em><span>Welcome to covidLINK - Maryland,giv</span></em></p><p><span><a href="https://coronavirus.maryland.gov/pages/contact-tracing">https://coronavirus.maryland.gov/pages/contact-tracing</a></span></p><br><p><em><span>Maryland COVID Contact Tracing</span></em></p><p><span><a href="https://www.norc.org/Research/Projects/Pages/maryland-covid-contact-tracing-.aspx">https://www.norc.org/Research/Projects/Pages/maryland-covid-contact-tracing-.aspx</a></span></p></div>
]]>
  </Body>
  <Summary>Contact tracing is an integral part of the fight against COVID-19.  It speeds response, identifies potential hot spots, and focuses testing efforts.  Unfortunately, it also creates an opportunity...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/94257/guest@my.umbc.edu/302be7370b0aff46b51df57fd98e7e17/api/pixel</TrackingUrl>
  <Tag>covid19</Tag>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 13 Jul 2020 15:42:21 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="93877" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/93877">
  <Title>IRS Warning of COVID-19 Scams</Title>
  <Tagline>Financial Scammers Taking Advantage Of COVID-19 Uncertainty</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span>With COVID-19 present in our day to day lives, malicious actors are taking this opportunity to scam people out of their personal and financial information. Recently the IRS Criminal Investigation Division (IRS-CI) has noticed various campaigns targeting Economic Impact Payments as well as other COVID-19 related scams.</span></p><br><p><span>The IRS-CI warns that some of these scams will offer more money from the government or even faster check delivery if the reader shares personal information and pays a small “processing fee.”  The IRS warns that there are no shortcuts for stimulus checks. Malicious actors have also been trying to convince people to “apply” for a second stimulus check. According to a Forbes article, as of right now, there is currently no second stimulus check in the works. </span></p><p><span><br></span><span>Malicious actors are also setting up fake charities soliciting donations for individuals, groups and areas affected by COVID-19. Some malicious actors are even offering the chance to invest in companies working on a vaccine, promising that the “company” will dramatically increase in value as a result. Some are even selling fake products like at-home test kits, fake cures, vaccines, pills and giving advice on unproven treatments. </span><span><br><br></span></p><p><span>They also warn of phishing campaigns being sent out either through text or emails. These campaigns are using keywords like “Corona Virus,” “COVID-19,” and “Stimulus.” For these campaigns the IRS-CI says the malicious actors' targets are people's personal and financial information.</span></p><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to <a href="mailto:security@umbc.edu">security@umbc.edu</a>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>For more information, please check out: </span></p><p><a href="https://www.irs.gov/newsroom/irs-warns-against-covid-19-fraud-other-financial-schemes" rel="nofollow external" class="bo"><span>https://www.irs.gov/newsroom/irs-warns-against-covid-19-fraud-other-financial-schemes</span></a></p><p><a href="https://www.forbes.com/sites/kellyphillipserb/2020/06/08/irs-warns-on-covid-19-scams-involving-stimulus-checks-fake-cures--more/#67cdbd937a98" rel="nofollow external" class="bo"><span>https://www.forbes.com/sites/kellyphillipserb/2020/06/08/irs-warns-on-covid-19-scams-involving-stimulus-checks-fake-cures--more/#67cdbd937a98</span></a></p></div>
]]>
  </Body>
  <Summary>With COVID-19 present in our day to day lives, malicious actors are taking this opportunity to scam people out of their personal and financial information. Recently the IRS Criminal Investigation...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/93877/guest@my.umbc.edu/1ab03c667e38e69440aee5210dae2cc9/api/pixel</TrackingUrl>
  <Tag>covid19</Tag>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Fri, 19 Jun 2020 10:22:15 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="93375" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/93375">
  <Title>Maryland COVID-19 Contact Tracing</Title>
  <Tagline>Make sure you know who you&#8217;re talking to</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p>May 22, 2020</p>
    
    <p>Next Week, Maryland will begin a state-wide effort to trace
    the spread of COVID-19.<span>  </span>The effort will
    involve health workers making phone calls to Maryland residents.<span>  </span>This is a very important step in identifying
    potential disease clusters and everyone’s help is needed.</p>
    
    <p>At the same time, Maryland in general and UMBC in particular
    have been targets of a wide variety of scams taking advantage of people’s fears
    and uncertainties around this disease.<span>  </span>It
    is very possible that unscrupulous people will take advantage of Maryland’s
    effort as a cover for phone scams.<span>  </span><span>North Carolina, for instance, started a contact tracing effort last
    month and has gotten reports of scammers pretending to be health officials and gathering
    information from residents. </span></p>
    
    <p><span> </span></p>
    
    <h3>Phone Calls</h3>
    
    <p><em><u>When you get a call, your caller ID should read “MD COVID”</u></em>.<span>  </span>You will be asked about your health and about
    your location and interactions within a period of time.<span>  </span>You will be asked for your birth date, contact
    information, and information about any COVID-19 test if you have had one.<span>  </span>You will get guidance about potential symptoms
    to watch for and about self-isolation.</p>
    
    <p><em><u>You will NOT be asked for:</u></em></p>
    
    <ul><li><span><span>·<span>       
    </span></span></span><span>a Social Security number</span></li></ul>
    
    <ul><li><span><span>·<span>       
    </span></span></span><span>financial or bank account
    information</span></li></ul>
    
    <ul><li><span><span>·<span>       
    </span></span></span><span>personal details unrelated to
    COVID-19 </span></li></ul>
    
    <ul><li><span><span>·<span>       
    </span></span></span><span>photographs or videos</span></li></ul>
    
    <ul><li><span><span>·<span>       
    </span></span></span><span>passwords</span></li></ul>
    
    <ul><li><span><span>·<span>       
    </span></span></span><span>payment</span></li></ul>
    
    <p> </p>
    
    <p><span>If anyone asks you for this or other information having nothing
    to do with COVID-19, please do <strong>not</strong> give it to them.<span>  </span></span></p>
    
    <p><span> </span></p>
    
    <h3>Text Messaging</h3>
    
    <p>So far, Maryland has not announced that text messaging will
    be part of the contact tracing effort.<span> 
    </span>If you receive a text message that asks you to click on a link for
    contact tracing, <em><u>do not click it</u></em>. At best, it will take you to a
    scam questionnaire requesting your personal information.<span>  </span>Worse, it could download malware to your
    phone and start harvesting personal information itself.</p>
    
    <p>New Jersey has received reports of text messages pretending
    to be from contact tracers and telling people that they have already had
    contact with a potential COVID-19 carrier.<span> 
    </span>These messages also contain links which will lead to information theft
    and/or malware.<span>  </span><em>Contact tracers don’t
    work like this.</em></p>
    
    <h3><br></h3><div>We encourage the UMBC community to support this important effort to identify and understand the spread of COVID-19.  We also ask you to remain alert to those who try create and exploit fears and confusion for their personal gain.</div><div><br></div><div><br></div><h3>For More Information</h3>
    
    <p><span>Launch of Maryland’s contact tracing effort</span></p>
    
    <ul><li><a href="https://www.baltimoresun.com/coronavirus/bs-md-maryland-contact-tracing-operation-coronavirus-reopening-20200521-jn4wfqgjcjdqbkbu454fhqngim-story.html" rel="nofollow external" class="bo">https://www.baltimoresun.com/coronavirus/bs-md-maryland-contact-tracing-operation-coronavirus-reopening-20200521-jn4wfqgjcjdqbkbu454fhqngim-story.html</a></li></ul>
    
    <ul><li><a href="https://www.wbaltv.com/article/maryland-contact-tracing-ramps-up/32631045#" rel="nofollow external" class="bo">https://www.wbaltv.com/article/maryland-contact-tracing-ramps-up/32631045#</a></li></ul>
    
    <p>FTC Warning
    about COVID-19 contact tracing text message scams</p>
    
    <ul><li><a href="https://www.consumer.ftc.gov/blog/2020/05/covid-19-contact-tracing-text-message-scams" rel="nofollow external" class="bo">https://www.consumer.ftc.gov/blog/2020/05/covid-19-contact-tracing-text-message-scams</a> <br></li></ul><p>Scam
    Warning from North Carolina Attorney General</p>
    
    <ul><li><a href="https://ncdoj.gov/watch-out-for-covid-19-contact-tracing-scams/" rel="nofollow external" class="bo">https://ncdoj.gov/watch-out-for-covid-19-contact-tracing-scams/</a></li></ul>
    
    
    
    <p>Warning
    from New Jersey state officials about text message scams</p>
    
    <ul><li><a href="https://www.nj.com/coronavirus/2020/05/beware-of-coronavirus-contact-tracing-scams-nj-officials-warn-thousands-of-fraud-cases-reported.html" rel="nofollow external" class="bo">https://www.nj.com/coronavirus/2020/05/beware-of-coronavirus-contact-tracing-scams-nj-officials-warn-thousands-of-fraud-cases-reported.html</a></li></ul></div>
]]>
  </Body>
  <Summary>May 22, 2020    Next Week, Maryland will begin a state-wide effort to trace the spread of COVID-19.  The effort will involve health workers making phone calls to Maryland residents.  This is a...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/93375/guest@my.umbc.edu/3d82fc3347444b57cd2f3fd8f44b8077/api/pixel</TrackingUrl>
  <Tag>covid19</Tag>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>2</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Fri, 22 May 2020 15:02:24 -0400</PostedAt>
  <EditAt>Fri, 22 May 2020 15:05:32 -0400</EditAt>
</NewsItem>
</News>
