Security
Mehr Informationen zu dem Service finden Sie in unserem Dokumentationsportal.
Phishing Email: "Alert: Important Message for ... (E-Mail Adresse)"
A phishing email with the above subject line points to a convincing fake of mail.rwth-aachen.de.
Please do not click, we are monitoring this.
Phishing Email: "Aktion erforderlich ..."
Last night, a phishing email was sent out with today's or yesterday's date in the subject line.
Please do not enter any login information via the link in this email.
The pattern is always the same:
a) it creates pressure to do something IMMEDIATELY.
b) the sender is fake.
These are typical characteristics of a phishing email.
DNS RPZ
Some records have been added to the local RWTH response policy zone with "passthru" policy - so just logging but not blocking DNS requestst to known bad domains.
Routing über neue XWiN-Router
During this period, the routing of the previous XWiN routers (Nexus 7700) will be switched to the new XWiN routers (Catalyst 9600). These routers are essential for RWTH's network connection. This changeover also requires the migration of the DFN connection, which is switched redundantly to Frankfurt and Hannover, and the RWTH firewall to the new systems.
There will be complete or partial outages of the external connection during the maintenance window. All RWTH services (e.g. VPN, email, RWTHonline, RWTHmoodle) will not be available during this period. The accessibility of services within the RWTH network will be temporarily unavailable due to limited DNS functionality.
DFN Timestamp Service Temporarily Unavailable
The DFN timestamp service is temporarily unavailable at the moment. As a result, the digital signature cannot be used as usual.
We are already working on a solution to the problem.
Phishing Warning
We are currently observing a new wave of phishing attacks. This time, the focus is on CEO Fraud:
https:
polizei.nrw/en/article/ceo-fraud-high-risk-of-fraud-for-companies
Usually the name of the correct supervisor is shown as the sender name. The actual sender email address, however, is most often very generic (e.g. office12345@gmail.com or similar). It is therefore strongly recommended to check the actual sender email address.
We advise caution. If you receive one of those emails, please do not reply and never send any gift cards or money. Report the email (as an attachment) to servicedesk@itc.rwth-aachen.de and also to spam@access.ironport.com in Cc.
You can find more information about e-mail phishing here:
https:
help.itc.rwth-aachen.de/en/service/1jefzdccuvuch/article/44343c9765a44f1cad23f0c4cd75f856/#Phishing-Mails
Erneuerung der Vulnerability-Management-Lösungen
As part of a modernization of the vulnerability management solutions used, the license of the old appliance has expired as planned. The reports displayed on [0] therefore do not reflect the current status quo. Information about a new portal, which displays the data of the new scanner, will soon be provided via the usual channels (e.g. e-mail distribution list for the admin round).
[0]
https:
noc-portal.itc.rwth-aachen.de/sec-scan-report/scan_results
Hosts of RWTH Aachen University partly not accessible from networks of other providers
Due to DNS disruption, the name servers of various providers are currently not returning an IP address for hosts under *.rwth-aachen.de.
As a workaround, you can store alternative DNS servers in your connection settings, e.g. the Level3-Nameserver (4.2.2.2 and 4.2.2.1) or Comodo (8.26.56.26 und 8.20.247.20). It may also be possible to reach the RWTH VPN server, in which case please use VPN.
Wartung NOC-portal
wegen einer Wartung des Systems noc-portal werden einige unserer Webdienste zum Steuern der Internet Basisdienste kurzzeitig im Wartungszeitraum nicht zur Verfügung stehen.
Unter anderem sind betroffen:
* DNS-Admin
* DHCP- Admin
* RADIUS-Admin
* Interface-Admin
* Firewall-Admin & -Formular
* WLAN Gastaccounts (anlegen)
Phishing Warning
We are currently observing a new wave of phishing attacks. This time, the following subject is particularly noticeable:
Current subject: "Payment Advice - Ref: [HSBC107741] / RFQ Priority Payment / Customer Ref: [PI10774QT44]" or similar.
We advise caution. If you receive one of those emails, please do not click on the link under any circumstances and report them to servicedesk@itc.rwth-aachen.de and also to spam@access.ironport.com in Cc.
You can find more information about e-mail phishing here:
https:
help.itc.rwth-aachen.de/en/service/1jefzdccuvuch/article/ab86b235c4f5426facd675d623a0365b/
https:
help.itc.rwth-aachen.de/en/service/1jefzdccuvuch/8e226a36638741ddacac573faa95a0e3/faq/#f2b3552a3e6f49d9be25a1ed9ad2ebe7
Phishing Warning
We are currently seeing another wave of phishing attacks using the following email subjects: "Paskyra
pasenusi" and "Kontingentinformationen".
If you receive such an e-mail, please do not click on the link and report it to servicedesk@itc.rwth-aachen.de.
Phishing Warning
We are currently seeing a wave of phishing attacks of various kinds.
E-mails with the subject "??? Voice Mail (00:19secs)" are particularly noticeable.
If you receive this e-mail, please do not click on the link and report it to servicedesk@itc.rwth-aachen.de.
Hohe Anzahl verschlüsselter Archive
Wir sehen gerade eine hohe Anzahl verschlüsselter Anhänge hereinkommen.
Muster des Dateinamens: "Zahl"-BST-SH.zip
Wir gehen von Malware aus
Hohe Anzahl E-Mails mit verschlüsselten ZIP Files
Wir sehen seit ca. 13:00 E-Mails mit Anhängen in Form verschlüsselter ZIP Files.
Die Filenamen haben das Muster "in_lange Zahl".
Wir gehen von einer Malware Attacke aus.