<?xml version="1.0"?>
<News page="1" pageCount="1" pageSize="10" timestamp="Sun, 05 Apr 2026 20:25:49 -0400" url="https://dev.my.umbc.edu/groups/itsecurity/posts.xml?tag=proxy">
  <NewsItem contentIssues="false" id="157619" important="false" url="https://dev.my.umbc.edu/groups/itsecurity/posts/157619">
  <Title>Protecting Your Device from Proxy Hijacking</Title>
  <Tagline>Learn how to spot, avoid, and report</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p>Dear UMBC Community,</p>
    
    <p>Imagine a stranger secretly using your home internet or your
    laptop to hide their tracks. Recently, security experts have found that certain
    apps are doing exactly that! They are secretly turning personal devices into
    "digital masks" for cybercriminals. </p>
    
    <p>When you download a seemingly harmless app, it may contain
    hidden code that shares your internet connection with a global network of
    hackers. This makes their activity look like it is coming from your device and
    our campus.</p>
    
    <p><strong>How to spot strange activity on your device:</strong></p>
    
    <p>Your device might be working for someone else if you
    notice: </p>
    
    <ul>
     <li>Performance
         Issues: Your phone or laptop suddenly runs slowly, gets hot for no reason,
         or has a battery that dies much faster than usual.</li>
     <li>High
         Data Usage: You see a massive spike in your internet data usage that you
         can't explain. </li>
    </ul>
    
    <p><strong>Tips to keep your tech private: </strong></p>
    
    <ul>
     <li>Look
         Before You Click: Even in official app stores, check the reviews. If a
         simple app (like a flashlight or a calculator) asks for permission to
         access your files, contacts, or location, it's a red flag. </li>
     <li>Beware
         of the "Too Good to Be True": Be skeptical of
         "cracked" software or free versions of paid apps. They often
         come with a hidden "tax" on your security. </li>
     <li>Cheap
         Smart Tech: Very inexpensive "Smart Home" or Internet of Things
         (IoT) devices often have weak security, making them easy targets for
         hackers. </li>
    </ul>
    
    <p><strong>What to do if you suspect trouble: </strong></p>
    
    <p>If your device is acting strangely or you receive a
    suspicious email, do not click any links. Please forward any suspicious emails
    to the security team at <a href="https://my3.my.umbc.edu/groups/doit/posts/157504/2f8a9/cc086f72720aec714d0b2c3a5bbec338/web/link?link=mailto%3Asecurity%40umbc.edu" rel="nofollow external" class="bo">security@umbc.edu</a>.  </p>
    
    <p>If you suspect a phishing or cybersecurity attempt, do not
    reply, click any links, or open any attachments. Instead, forward the email
    immediately to the security team at <a href="https://my3.my.umbc.edu/groups/doit/posts/157504/2f8a9/cc086f72720aec714d0b2c3a5bbec338/web/link?link=mailto%3Asecurity%40umbc.edu" rel="nofollow external" class="bo">security@umbc.edu</a>.
    Your report helps protect everyone!</p>
    
    <p>Thank you all for your continued awareness and assistance in
    keeping our community secure.</p>
    
    <p>Cybersecurity Assurance and Digital Trust<br>
    UMBC Division of Information Technology (DoIT)</p>
    
    <p> </p>
    
    </div>
]]>
  </Body>
  <Summary>Dear UMBC Community,    Imagine a stranger secretly using your home internet or your laptop to hide their tracks. Recently, security experts have found that certain apps are doing exactly that!...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/157619/guest@my.umbc.edu/7fee7b3174b2799dafbee2444900d991/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>proxy</Tag>
  <Tag>security</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT Cybersecurity Assurance and Digital Trust</Sponsor>
  <ThumbnailUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/157/619/dfed3fc4107b50b28438cb0684124f93/xxlarge.jpg?1774277006</ThumbnailUrl>
  <ThumbnailUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/157/619/dfed3fc4107b50b28438cb0684124f93/xlarge.jpg?1774277006</ThumbnailUrl>
  <ThumbnailUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/157/619/dfed3fc4107b50b28438cb0684124f93/large.jpg?1774277006</ThumbnailUrl>
  <ThumbnailUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/157/619/dfed3fc4107b50b28438cb0684124f93/medium.jpg?1774277006</ThumbnailUrl>
  <ThumbnailUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/157/619/dfed3fc4107b50b28438cb0684124f93/small.jpg?1774277006</ThumbnailUrl>
  <ThumbnailUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/157/619/dfed3fc4107b50b28438cb0684124f93/xsmall.jpg?1774277006</ThumbnailUrl>
  <ThumbnailUrl size="xxsmall">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/157/619/dfed3fc4107b50b28438cb0684124f93/xxsmall.jpg?1774277006</ThumbnailUrl>
  <ThumbnailAltText>Gold shield outline with a checkmark in the center and the text "UMBC cybersecurity" above the shield</ThumbnailAltText>
  <PawCount>1</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 23 Mar 2026 10:44:22 -0400</PostedAt>
</NewsItem>
</News>
