<?xml version="1.0"?>
<News hasArchived="true" page="111" pageCount="243" pageSize="10" timestamp="Tue, 05 May 2026 13:19:14 -0400" url="https://my3.my.umbc.edu/groups/doit/posts.xml?page=111">
<NewsItem contentIssues="true" id="94857" important="false" status="posted" url="https://my3.my.umbc.edu/groups/doit/posts/94857">
<Title>Panopto downtime and security update</Title>
<Tagline>August 15: unavailable for 3 hours</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><strong><span>Downtime</span></strong></p><p><span>On Saturday, August 15, Panopto will be making a number of updates to their Cloud infrastructure to improve performance and scalability. These updates will require up to 3 hours of downtime, with a target start time of 9:00 PM EDT.</span></p><br><p><span>During the downtime, users will not be able to access videos on our Panopto site, and any attempts to upload from recording clients will result in a "Server unable to connect" message.</span></p><br><p><strong><span>TLS 1.0/1.1 support end of life</span></strong></p><p><span>TLS is the cryptographic protocol. Older versions of TLS, specifically 1.0 and 1.1 are no longer considered to be secure and Panopto will discontinue support of them on August 19th, 2020.</span></p><p><span><br></span></p><p><span>Please submit an <a href="https://rt.umbc.edu/" rel="nofollow external" class="bo">RT ticket</a> if you have any questions or concerns.<br></span></p></div>
]]>
</Body>
<Summary>Downtime  On Saturday, August 15, Panopto will be making a number of updates to their Cloud infrastructure to improve performance and scalability. These updates will require up to 3 hours of...</Summary>
<Website>https://doit.umbc.edu/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/94857/guest@my.umbc.edu/0bec36b35b97598c11146d870bb91d89/api/pixel</TrackingUrl>
<Tag>downtime</Tag>
<Tag>panopto</Tag>
<Tag>screencasting</Tag>
<Tag>upgrade</Tag>
<Group token="instructional-technology">Instructional Technology</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/instructional-technology</GroupUrl>
<AvatarUrl>https://assets2-my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/original.png?1446126703</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="large">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/large.png?1446126703</AvatarUrl>
<AvatarUrl size="medium">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/medium.png?1446126703</AvatarUrl>
<AvatarUrl size="small">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/small.png?1446126703</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxsmall.png?1446126703</AvatarUrl>
<Sponsor>Instructional Technology</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/094/857/d8f0c27f57ef5c118ae2cb1b49ce657b/xxlarge.jpg?1597357764</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/094/857/d8f0c27f57ef5c118ae2cb1b49ce657b/xlarge.jpg?1597357764</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/094/857/d8f0c27f57ef5c118ae2cb1b49ce657b/large.jpg?1597357764</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/094/857/d8f0c27f57ef5c118ae2cb1b49ce657b/medium.jpg?1597357764</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/094/857/d8f0c27f57ef5c118ae2cb1b49ce657b/small.jpg?1597357764</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/094/857/d8f0c27f57ef5c118ae2cb1b49ce657b/xsmall.jpg?1597357764</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/094/857/d8f0c27f57ef5c118ae2cb1b49ce657b/xxsmall.jpg?1597357764</ThumbnailUrl>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 13 Aug 2020 18:34:21 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94854" important="false" status="posted" url="https://my3.my.umbc.edu/groups/doit/posts/94854">
<Title>Fake "Corestaff Job-Offer" Phishing Attempt</Title>
<Tagline>Yet Another Job Scam, (Pretending To Be From Corestaff)</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Below is another example of a phishing email campaign in which the malicious actor is claiming to be from Corestaff Services. The email below is the initial message sent out to victims to try and get to to respond with an alternate (non-UMBC) email address.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: </span><span>charlie putt</span><span> &lt;</span><span><a href="mailto:puttc10@gmail.com">puttc10@gmail.com</a></span><span>&gt;</span></p><p><span>Date: Mon, Aug 3, 2020 at 2:03 PM</span></p><p><span>Subject: UMBC COVID-19 PART TIME JOB OFFER</span></p><p><span>To: &lt;@umbc.edu&gt;</span></p><br><p><span>Dear students,</span></p><p><span> </span></p><p><span>University of Maryland health professionals have been closely monitoring the spread of COVID 19 over the past few months. Therefore the university is organizing an online part time job to sustain the students during the period of this pandemic. I'm happy to inform you that our reputable company CORESTAFF SERVICES Inc® is currently running a student empowerment program.</span></p><p><span>    KINDLY EMAIL BACK WITH YOUR  PERSONAL EMAIL ADDRESS IF INTERESTED IN THIS JOB POSITION.</span></p><p> </p><p><span>Kind Regards</span></p><p><span>Charlie Putt</span></p><p><span>HR Manager/Consultant</span></p><p><span>CORESTAFF SERVICES Inc®</span><span>    </span></p><br></td></tr></tbody></table></div><br><p><span>Once the victim responds with their alternate email address, the scammer will then email that address claiming that the victim got the job and asking for more information. An example of what type of information and how it is formatted in the email is shown below.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>NAME:</span></p><p><span>PHYSICAL CONTACT ADDRESS (NOT PO BOX)</span></p><p><span>CITY:</span></p><p><span>STATE:</span></p><p><span>ZIP CODE:</span></p><p><span>BANK NAME:</span></p><p><span>D.O.B:</span></p><p><span>GENDER:</span></p><p><span>MOBILE (Must be able to receive text) :</span></p><p><span>PERSONAL EMAIL:</span></p><p><span>CURRENT JOB:</span></p></td></tr></tbody></table></div><br><p><span>If the victim responds with their personal information, the scammer could start messaging the victim over text message and may send a fraudulent check to the victim’s postal address. If this happens to you, please do </span><span>not </span><span>try to deposit the check. A very similar scam is described here: </span><a href="https://itsecurity.umbc.edu/critical/?id=94549" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?id=94549</span></a><span>.</span></p><br><p><span>If you do receive this or a similar scam, please DO NOT respond any further or click on any URLs. If you have provided any banking or financial information, please notify your bank or financial institution immediately. If you have been sent a check, you should not attempt to cash or deposit it. If you have deposited a check already, please contact your bank and tell them that it may be part of a scam.</span></p><br><p><span>Whether or not you responded to the scam or not, please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.  We will also keep track of any other information you submit about the scammers, such as their phone numbers if you receive a text message from the scammer.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>Below is another example of a phishing email campaign in which the malicious actor is claiming to be from Corestaff Services. The email below is the initial message sent out to victims to try and...</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/94854/guest@my.umbc.edu/ee38fb660da3d2e148ca5ba2a4fdc532/api/pixel</TrackingUrl>
<Tag>covid19</Tag>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="original">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 13 Aug 2020 17:06:44 -0400</PostedAt>
<EditAt>Thu, 13 Aug 2020 17:08:26 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="94853" important="false" status="posted" url="https://my3.my.umbc.edu/groups/doit/posts/94853">
<Title>UMBC Staff Impersonation Phishing Scam</Title>
<Tagline>A Persistent Scam</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>DoIT has been notified of a phishing scam where the malicious actor was trying to impersonate a UMBC staffer. Below is an example of the email with the name, the email address of the sender, and the signature of the email removed for privacy reasons.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>Date: Wed, 12 Aug 2020</span></p><p><span>From: FORGED NAME &lt;<a href="mailto:.edu@gmail.com">.edu@gmail.com</a>&gt;</span></p><p><span>To: @umbc.edu</span></p><p><span>Subject: QUICK REQUEST</span></p><br><p><span>Are You Available??</span></p><br><p><span> --</span></p></td></tr></tbody></table></div><br><p><span>This and other similar phishing attempts seem to target certain departments of UMBC by trying to impersonate one of the staffers in that department. In previous cases of similar scams, if the user responds, the malicious actor could ask the user to send them money in the form of iTunes cards, gift cards, prepaid debit cards, money order, or even bitcoin.</span></p><br><p><span>In the case above, note that the scammer sent their email from a gmail and not a UMBC email. The email also tries to trick users by having “.edu” before the @gmail. </span></p><br><p><span>The scammer also tried to make the email look as legitimate as possible by putting an email signature that was meant to look similar to those the persons they were impersonating. The scammer also created a sense of urgency by having the email subject be in all caps and say “QUICK REQUEST.”</span></p><br><p><span>If you do receive this or a similar email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>DoIT has been notified of a phishing scam where the malicious actor was trying to impersonate a UMBC staffer. Below is an example of the email with the name, the email address of the sender, and...</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/94853/guest@my.umbc.edu/47af87135d2cc9f7ba8a0b7a101fbc00/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="original">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 13 Aug 2020 16:44:56 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="94833" important="false" status="posted" url="https://my3.my.umbc.edu/groups/doit/posts/94833">
<Title>New "Economic Relief" Phishing Email</Title>
<Tagline>Fake Small Business Administration (SBA) Loan Offer</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>The Cybersecurity and Infrastructure Security Agency (CISA)</span><span> announced a new phishing email campaign spoofing the Small Business Administration (SBA). This email has the subject “SBA Application – Review and Proceed”</span><span> and contains a link to a fake SBA website login page, allowing scammers to harvest credentials from unsuspecting victims. Here is an image of the malicious site, provided in CISA’s alert.</span></p><p><span><span><img src="https://lh5.googleusercontent.com/fjNX2V0c4NEzzoOfZuahWZRy9h-zftQKmvoXPU0mNbrJrTe3HarTbxeIWkLyuSvgqqxAJAKg5NAKKhmjxurBuSW0Mk5wjnvQWS5D7Z74Aj4sLSOaJ_909-UCzDbZpZCUsVXwEt8L" width="624" height="362" style="max-width: 100%; height: auto;"></span></span></p><p><span>For more information, including a list of known sender addresses and URLs, please see the original alert at</span><a href="https://us-cert.cisa.gov/ncas/alerts/aa20-225a" rel="nofollow external" class="bo"><span>https://us-cert.cisa.gov/ncas/alerts/aa20-225a</span></a><span>.</span></p><p><span>If you receive any suspicious email, please do not respond or click any links. Instead, forward the message and full headers to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><p><span> </span></p><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>The Cybersecurity and Infrastructure Security Agency (CISA) announced a new phishing email campaign spoofing the Small Business Administration (SBA). This email has the subject “SBA Application –...</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/94833/guest@my.umbc.edu/6228f4ab21e5d55dd49980b0cd7d9757/api/pixel</TrackingUrl>
<Tag>covid19</Tag>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="original">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 13 Aug 2020 11:47:33 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="94812" important="false" status="posted" url="https://my3.my.umbc.edu/groups/doit/posts/94812">
<Title>DoIT Offers Start of Semester Student Technology Sprints</Title>
<Tagline>Make sure you're tech "self-sufficient" to learn online</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><p>The start of semester is always busy, but especially during a global pandemic. We got through Spring 20, but since every student will likely have at least one online or hybrid Fall 20 course, the Division of Information Technology (DoIT) strongly recommends that all students check they have the necessary technology setup to be successful. To help, DoIT is hosting 12 Sprint sessions for 10-minute, virtual walk-in consults or pop-up support groups on key topics that include the following:</p><ol><li><span><p><a href="https://doit.umbc.edu/getting-online/" rel="nofollow external" class="bo">Getting Online</a>*</p></span></li><li><p><a href="https://doit.umbc.edu/getting-a-computer/" rel="nofollow external" class="bo">Getting A Computer</a>*</p></li><li><p><a href="https://wiki.umbc.edu/x/CRPSAQ" rel="nofollow external" class="bo">Checking Your Blackboard Collaborate Audio Connection</a> (essential)</p></li><li><p><a href="http://virtual.umbc.edu" rel="nofollow external" class="bo">Using Virtual Computing Lab</a> &amp; <a href="https://umbc.edu/go/software" rel="nofollow external" class="bo">Software</a> (recommended)</p></li><li><p><a href="https://wiki.umbc.edu/x/2Y0MBg" rel="nofollow external" class="bo">Using <em>my</em>UMBC Groups &amp; Webex Teams for Student Clubs &amp; Organizations</a> (8/26, 8/31, 9/2 and 9/9 only).</p></li></ol><p>The Sprints will occur across four weeks from <strong>11 a.m. to 1 p.m.</strong> on the following dates:</p><ul><li><span><p><strong><a href="https://my3.my.umbc.edu/groups/doit/events/84888" rel="nofollow external" class="bo">Tues., 8/18</a> &amp; <a href="https://my3.my.umbc.edu/groups/doit/events/84889" rel="nofollow external" class="bo">Thurs., 8/20</a></strong></p></span></li><li><p><strong><a href="https://my3.my.umbc.edu/groups/doit/events/84890" rel="nofollow external" class="bo">Tues. 8/25</a>, <a href="https://my3.my.umbc.edu/groups/doit/events/84891" rel="nofollow external" class="bo">Wed., 8/26</a>, <a href="https://my3.my.umbc.edu/groups/doit/events/84892" rel="nofollow external" class="bo">Thurs., 8/27</a> (1st day of classes)</strong></p></li></ul><div>And from <strong>11 a.m. to noon </strong>on the following dates<strong>:
    
    </strong></div><ul><li><p><strong><a href="https://my3.my.umbc.edu/groups/doit/events/84894" rel="nofollow external" class="bo">Mon., 8/31</a>, <a href="https://my3.my.umbc.edu/groups/doit/events/84895" rel="nofollow external" class="bo">Tues., 9/1</a>, <a href="https://my3.my.umbc.edu/groups/doit/events/84896" rel="nofollow external" class="bo">Wed., 9/2</a>, <a href="https://my3.my.umbc.edu/groups/doit/events/84897" rel="nofollow external" class="bo">Thurs., 9/3</a>, <a href="https://my3.my.umbc.edu/groups/doit/events/84898" rel="nofollow external" class="bo">Fri., 9/4</a></strong></p></li><li><p><strong><a href="https://my3.my.umbc.edu/groups/doit/events/84899" rel="nofollow external" class="bo">Tues., 9/8</a> &amp; <a href="https://my3.my.umbc.edu/groups/doit/events/84900" rel="nofollow external" class="bo">Wed., 9/9</a></strong></p></li></ul><p>Due to the short format, these virtual support sessions are designed for quick consults, not deep dives or customized training sessions. Also, you will likely be in a virtual room with several people who also are interested in the same topic, and being helped by a DoIT support staff member. Often, you can learn by listening to this Q&amp;A, but if you want a personalized consult, please use <a href="http://my.umbc.edu/help" rel="nofollow external" class="bo">my.umbc.edu/help</a> to open a Request Tracker (RT) ticket.</p><p><strong>About the Sprint</strong></p><p>The sprints will take place in a Blackboard Collaborate virtual conference room. Use the link for each event up to 15 minutes before the start time. While you can just “show up,” advance registration -- by indicating you are “Going” through the myUMBC event link above -- is appreciated and can help DoIT gauge how many support staff are needed in each breakout room. However, if you require live closed captioning, advance registration is required.</p><p><strong>Prior to the session</strong></p><p>If this is your first time joining one of our live sessions, please review the <a href="https://help.blackboard.com/Collaborate/Ultra/Participant/Get_Started" rel="nofollow external" class="bo">Getting Started Guide</a>. You will also find additional helpful information for using Blackboard Collaborate at our extensive <a href="https://wiki.umbc.edu/x/CxPSAQ" rel="nofollow external" class="bo">FAQs</a>. </p><p>For the best experience, we recommend using Google Chrome or a recent browser update. Closing any unnecessary browser tabs will help conserve your bandwidth. After joining the session, please <a href="https://wiki.umbc.edu/x/CRPSAQ" rel="nofollow external" class="bo">configure your audio</a>. </p><p>* Note: As <a href="https://my3.my.umbc.edu/groups/doit/posts/94812/attachments/36656" rel="nofollow external" class="bo">announced</a> to all incoming students on 7/22/20, since UMBC requires all students to have a computer and Internet access, financial aid may be used to meet this requirement. To learn more, students should contact their financial aid counselor at <a href="https://financialaid.umbc.edu/contact/" rel="nofollow external" class="bo">financialaid.umbc.edu/contact</a>. </p></span></div>
]]>
</Body>
<Summary>The start of semester is always busy, but especially during a global pandemic. We got through Spring 20, but since every student will likely have at least one online or hybrid Fall 20 course, the...</Summary>
<Website>https://doit.umbc.edu/students</Website>
<AttachmentKind>Document</AttachmentKind>
<AttachmentUrl>https://assets1-my.umbc.edu/system/shared/attachments/aa5cc63ca51b91709dcce41f5af594c0/69fa2692/news/000/094/812/b937a56ac2082006f7b0a40ab60fe958/UMBC Student Laptop Requirement.pdf?1633440641</AttachmentUrl>
<Attachments>
<Attachment kind="Document" url="https://my3.my.umbc.edu/groups/doit/posts/94812/attachments/40838"></Attachment>
</Attachments>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/94812/guest@my.umbc.edu/3a0d9c0d9a9eb19cc43551d5da62bdcb/api/pixel</TrackingUrl>
<Tag>doit-students</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology (DoIT)</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/094/812/8afc49cdf45c74ef46d1651ca071a1a3/xxlarge.jpg?1597276445</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/094/812/8afc49cdf45c74ef46d1651ca071a1a3/xlarge.jpg?1597276445</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/094/812/8afc49cdf45c74ef46d1651ca071a1a3/large.jpg?1597276445</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/094/812/8afc49cdf45c74ef46d1651ca071a1a3/medium.jpg?1597276445</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/094/812/8afc49cdf45c74ef46d1651ca071a1a3/small.jpg?1597276445</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/094/812/8afc49cdf45c74ef46d1651ca071a1a3/xsmall.jpg?1597276445</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/094/812/8afc49cdf45c74ef46d1651ca071a1a3/xxsmall.jpg?1597276445</ThumbnailUrl>
<PawCount>6</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 12 Aug 2020 21:05:39 -0400</PostedAt>
<EditAt>Tue, 05 Oct 2021 09:30:59 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="94800" important="true" status="posted" url="https://my3.my.umbc.edu/groups/doit/posts/94800">
<Title>DocuSign Hourly Limit issue</Title>
<Body>
<![CDATA[
    <div class="html-content">Please be aware that the DocuSign system use had exceeded our vendor enforced limit of a 1,000 transactions per hour. It stopped creating envelope transactions for approximately 10 minutes from 11:46 am - 11:56 am today.<div><br></div><div>If you got the message below you will need to try again as your request did not get submitted.</div><div><br></div><div><p><span>HOURLY_APIINVOCATION_LIMIT_EXCEEDED</span></p><div>I have escalated a case with DocuSign to get this limit increased asap.</div><div><br></div><div>Until they respond it will be necessary to wait until the next hour whenever this message is displayed at which time a fresh allotment of 1,000 transactions is granted.</div></div><div><br></div><div>I apologize for this inconvenience and will provide an update as soon as I hear back from the DocuSign.</div><div><br></div><div>Thank you</div><div><br></div><div>Joe Kirby</div><div>AVP, Business Systems, DoIT </div></div>
]]>
</Body>
<Summary>Please be aware that the DocuSign system use had exceeded our vendor enforced limit of a 1,000 transactions per hour. It stopped creating envelope transactions for approximately 10 minutes from...</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/94800/guest@my.umbc.edu/4157bc9ef4cd910f0971e0efed646b90/api/pixel</TrackingUrl>
<Tag>docusign</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology (DoIT)</Sponsor>
<PawCount>0</PawCount>
<CommentCount>1</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 12 Aug 2020 12:15:10 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94783" important="false" status="posted" url="https://my3.my.umbc.edu/groups/doit/posts/94783">
<Title>Another Fake Cisco Job Scam</Title>
<Tagline>The Scam That Keeps On Taking</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Similar to other work from home phishing attempts targeting the UMBC community, this one follows the pattern. A malicious actor who claims to be from a company, in this case Cisco, offers the victim a job. This email also shows the subject line of “WORK FROM HOME” in all caps. An example of this phishing email can be seen below:</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: </span><span>steve mendez</span><span> &lt;</span><span><a href="mailto:stevemendez044@gmail.com">stevemendez044@gmail.com</a></span><span>&gt;</span></p><p><span>Date: Fri, Aug 7, 2020 at 2:18 PM</span></p><p><span>Subject: WORK FROM HOME</span></p><p><span>To: &lt;</span><span>@umbc.edu</span><span>&gt;</span></p><br><p><span>Cisco Systems Inc® is offering you a chance to secure a part time job. Kindly reply back with your alternate email address for more information.</span></p><p> </p><p><span>Kind Regards,</span></p><h3><span>steve mendez</span></h3><p><span> HR Manager/Consultant</span></p><p><span>Cisco Systems Inc®   </span></p></td></tr></tbody></table></div><p><span><br></span><span>Past phishing emails attempts like this one ask the victim to reply with their personal (non-UMBC) email. Then the malicious actor would ask for more personal information such as the phone number, address, current job, and even the birthdate of the victim.</span></p><br><p><span>After the victim responds, they would receive another email. This email would be confirming that the victim got the job and that the scammer would be sending the first paycheck. In scams similar to this one the scammer has been known to text victims too.</span></p><br><p><span>If you do receive this or a similar scam, please DO NOT respond any further or click on any URLs. If you have provided any banking or financial information, please notify your bank or financial institution immediately. If you have been sent a check, you should not attempt to cash or deposit it. If you have deposited a check already, please contact your bank and tell them that it may be part of a scam.</span></p><br><p><span>Whether or not you responded to the scam or not, please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.  We will also keep track of any other information you submit about the scammers, such as their phone numbers if you receive a text message from the malicious actor.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>Similar to other work from home phishing attempts targeting the UMBC community, this one follows the pattern. A malicious actor who claims to be from a company, in this case Cisco, offers the...</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/94783/guest@my.umbc.edu/633cbb8e38dfe6ee4cc86f3fcfd8eeeb/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="original">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 11 Aug 2020 22:27:51 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94781" important="false" status="posted" url="https://my3.my.umbc.edu/groups/doit/posts/94781">
<Title>Account Data Breach: Chatbooks</Title>
<Tagline>A Data Breach Report</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>In March 2020, Chatbook, a photo print service, suffered a data breach. Approximately 15 million user records were put up for sale on a dark web marketplace. This information includes email address, names, phone numbers, social media profiles and password. </span></p><br><p><span>19 UMBC accounts were affected by this breach. The affected individuals have been notified via their UMBC emails and/or their alternate emails. If you have a Chatbooks account, please contact them to see if you have been affected by this breach.</span></p><br><p><span>This information was provided to Have I Been Pwned(HIBP) by </span><a href="https://dehashed.com/" rel="nofollow external" class="bo"><span>dehashed.com</span></a><span>.</span></p><br><br><p><span>For more information about the Chatbooks breach visit:</span></p><p><a href="https://www.bleepingcomputer.com/news/security/chatbooks-discloses-data-breach-after-data-sold-on-dark-web/" rel="nofollow external" class="bo"><span>https://www.bleepingcomputer.com/news/security/chatbooks-discloses-data-breach-after-data-sold-on-dark-web/</span></a></p><br><br><p><span>To setup a recovery email for your UMBC account follow the instructions here:</span></p><p><a href="https://my3.my.umbc.edu/groups/itsecurity/posts/94776" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity/posts/94776</span></a></p><br><br><p><span>If you have any questions or concerns email us: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>_________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><p><span>Forward it to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></p><br></div>
]]>
</Body>
<Summary>In March 2020, Chatbook, a photo print service, suffered a data breach. Approximately 15 million user records were put up for sale on a dark web marketplace. This information includes email...</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/94781/guest@my.umbc.edu/6df63f1fcda8fcd12fbbc2ddc84c7ddd/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="original">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 11 Aug 2020 22:21:52 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94779" important="false" status="posted" url="https://my3.my.umbc.edu/groups/doit/posts/94779">
<Title>Powerball Scam Emails</Title>
<Tagline>A New Example Of An Old Scam</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>DoIT Security has received a new variation of a classic get-rich-quick scam, this time claiming to be from a Powerball winner who wishes to distribute millions of dollars, supposedly to lessen the impact of COVID-19. Over 5000 UMBC addresses received emails from this sender, most likely containing the same message.</span></p><p><span>From: "Bill and Helene" &lt;<a href="mailto:kkt-co@beige.plala.or.jp">kkt-co@beige.plala.or.jp</a>&gt;</span></p><p><span>Subject: We Have Private For Donation</span></p><p><span>Date: Tue, 11 Aug 2020 14:26:21 +0900</span></p><p><span> </span></p><p><span>--</span></p><p><span>The Corona Virus (COVID-19) Outbreak isn't just a major health</span></p><p><span>crisis -- It's also a large economic disruption leading to people</span></p><p><span>Losing their Jobs and making it harder to take care of their</span></p><p><span>Families.</span></p><p><span> </span></p><p><span>We know that a little financial support can go a Long Way.</span></p><p><span> </span></p><p><span>I'm Bill Lawrence from Sacramento California the Winner of 150 million</span></p><p><span>United State Dollars Jackpot from the Power ball lottery held on</span></p><p><span>December 16, 2019. My Jackpot was a gift from God to me.</span></p><p><span>Hence my entire Family has agreed to do this.</span></p><p><span>We are donating $75 million to Help individuals and Small Scale</span></p><p><span>Businesses around the world.</span></p><p><span>I write to inform you that Google in alliance with Microsoft and Yahoo has submitted your</span></p><p><span>"Email" to my request to receive a donation amount of $5,000,000</span></p><p><span>Please accept this Token as a Gift From me and My Family.</span></p><p><span>We await your urgent response Via email <a href="mailto:heleneandbill97@gmail.com">heleneandbill97@gmail.com</a></span></p><p><span> </span></p><p><span>Bill and Helene Lawrence</span></p><p><span><a href="https://www.powerball.com/winner-story/150-million-powerball-ticket-claimed">https://www.powerball.com/winner-story/150-million-powerball-ticket-claimed</a></span></p><p><span> </span></p><p><span>Messages like these, which promise large amounts of money, are most likely advance-fee scams. Also known as Nigerian Prince scams, or 419 scams, advance-fee scams promise a large amount of money that can be claimed after paying a comparatively small fee. After a victim pays the fee, the scammer may claim to need another fee, or may vanish. Either way, victims will never receive any money in return.</span></p><p><span>In addition to the irregular grammar and capitalization, note the From address with a .jp domain, and the time zone, UTC+0900. Both of these indicate that the message originated in Japan, not California. Although the URL provided appears to be legitimate, it does not indicate that the message is really from the Powerball winner. It is always best not to click links in suspicious emails, as they may contain malware, steal personal information, or, as in this case, simply provide misleading information when used in the context of a scam email.</span></p><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to <a href="mailto:security@umbc.edu">security@umbc.edu</a>.</span></p><p><span> </span></p><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><p><span> </span></p><p><span>To read more articles published by DoIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. <br></span></p></div>
]]>
</Body>
<Summary>DoIT Security has received a new variation of a classic get-rich-quick scam, this time claiming to be from a Powerball winner who wishes to distribute millions of dollars, supposedly to lessen the...</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/94779/guest@my.umbc.edu/fc85e5da18b9dd15ed396330d7c8776a/api/pixel</TrackingUrl>
<Tag>covid19</Tag>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="original">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 11 Aug 2020 22:18:23 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94778" important="false" status="posted" url="https://my3.my.umbc.edu/groups/doit/posts/94778">
<Title>Government Imposter Scams</Title>
<Tagline>Scammers Pretend To Be From Government Agencies</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>In  the article linked below, the Better Business Bureau is warning of government imposter scams. In these scams, a malicious actor will call or even message the victim claiming to be from a government agency. Their goals are usually to steal the victim’s personal and financial information, to steal the victim’s  money or or to persuade the victim to install malware. </span></p><br><p><span>According to the article, most Americans have encountered this scam before. Research done by the Better Business Bureau found that the Social Security Administration, Service Canada, the Internal Revenue Service (IRS) and the Canada Revenue Agency are among the most impersonated. </span><span><br></span><span><br></span><span>Some examples of Social Security-related impersonation scams:</span><span><br><br></span></p><ul><li><p><span>Increase a benefit</span><span>: In this scam the malicious actor will claim that the victim is eligible for increased benefits, typically due to a cost of living increase. The malicious actor will request bank account details so that the money can be deposited into the victim’s account. Once the malicious actor has the banking information they are able to steal money from the account.</span></p></li><li><p><span>Restoring Social Security Number</span><span>: Some malicious actors will claim the victim's Social Security Number has been suspended. The malicious actor will ask the victim to pay for it to be restored. They may also ask for the victim's Social Security account information, which allows them to apply for benefits under the victims name.</span></p></li><li><p><span>Social Security Number used in a crime</span><span>, in this scam the malicious actor will threaten arrest if the victim does not respond immediately.</span><span><br><br></span></p></li></ul><p><span>When the IRS is used as a cover instead of the Social Security Agency the scams vary, though they have many similarities to the Social Security scams.  For instance,  the malicious actor may claim to be an IRS agent and threaten the victim with arrest for unpaid taxes or even fraud. </span></p><br><p><span>The only way to avoid being arrested, the victim is told,  is by paying a fine (or the unpaid taxes) immediately.  Victims are told to buy gift cards and to provide the caller with the number on the back of each card. But of course these threats are fake, and these are just scammers trying to use fear to get the victims money or information. </span></p><br><p><span>Just as with phishing scams, the malicious actors follow the headlines and change their scams with thet latest news. During the Covid-19 pandemic and after the passage of the Coronavirus Aid, Relief, and Economic Security (CARES) Act, scammers started to claim to be from the CDC or the United States Treasury Department in order to manipulate and steal personal and financial information from victims.</span></p><br><p><span>Some examples of Covid-19 related impersonation scams are: </span></p><br><ul><li><p><span>Relief benefits</span><span>: Malicious actors claiming to be from the IRS and offering to expedite benefits under the CARES Act.</span></p></li><li><p><span>Fake donations</span><span>: Malicious actors claiming to be from the CDC requesting donations. Email and text messages making these claims may arrive with malware or URLs that could cause harm to the victim's device.</span></p></li><li><p><span>Contact tracing scams</span><span>: Email, texts, or messages on social media claiming to be from contact tracers informing the victim that they have come in contact with someone who has tested positive for Covid-19. These scammers seek personal information and/or send messages that may contain malware. For official information on contact tracing efforts in Maryland please visit </span><a href="https://coronavirus.maryland.gov/pages/contact-tracing" rel="nofollow external" class="bo"><span>https://coronavirus.maryland.gov/pages/contact-tracing</span></a><span>.</span></p></li></ul><br><p><span>Scammers have also threatened arrest for missing jury duty, impersonated immigration officials threatening to deport the victim, and offered free money in the form of government grants.</span></p><br><p><span>Some red flags to watch for to see if the person claiming to be from a government agency is actually a malicious actor:</span></p><br><ul><li><p><span>The IRS generally first contacts people by the postal mail. Never provide your bank account or other personal information to anyone who calls you.</span></p></li><li><p><span>Don’t pay by gift cards. The IRS and other government agencies will not idemand or even accept payment using iTunes cards, gift cards, prepaid debit cards, money order, bitcoin or cash.</span></p></li><li><p><span>The IRS will never request personal or financial information by email, text, or any social media platform. Do not click on any links in unsolicited emails or text messages.</span></p></li><li><p><span>Social Security numbers are never “suspended”.</span></p></li><li><p><span>Caller ID cannot be trusted to confirm that the source is from a government agency. Look up the phone number for the agency and call to see if they are really trying to contact you.</span></p></li><li><p><span>The Social Security Administration will never threaten to arrest you because of an identity theft problem. </span></p></li></ul><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>For more information, please check out: </span></p><p><a href="https://www.bbb.org/article/news-releases/22775-government-impostors-study" rel="nofollow external" class="bo"><span>https://www.bbb.org/article/news-releases/22775-government-impostors-study</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>In  the article linked below, the Better Business Bureau is warning of government imposter scams. In these scams, a malicious actor will call or even message the victim claiming to be from a...</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/94778/guest@my.umbc.edu/0f76579417510b4e52653664556d6502/api/pixel</TrackingUrl>
<Tag>covid19</Tag>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="original">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 11 Aug 2020 21:35:32 -0400</PostedAt>
</NewsItem>

</News>
