Closed / Update /
Dear customers,
We would like to inform you about a spamwave that identifies itself as info@edpnet.net aimed at both customers and non-customers. The source seems to be a botnet.
The mail contains the subject “Uw edpnet factuur 2015xxxxxx” and an attachment. We advice our customers to verify any open invoices via my.edpnet.be.
Please do not inform invoices in the .doc format. All of our invoices are sent using .pdf. We advice those that have opened the .doc file to scan their computer for malware.
Update: Our mailservers are running on a delay as the spam is being processed. It can take several hours for the processing time to normalize. No mail will be lost.
Update: Our mailservers have processed the last of the backlog and are returning to normal functionality.
If you have any questions left, please do not hesitate to contact us.
Best regards
The edpnet team
Security /
Beste klanten,
Recent werd er een lek gevonden in bijna alle Linux distributies via de “Name Service Switch (nss) library”. Deze bug staat mensen toe om toegang te krijgen tot deze systemen en hierop code uit te voeren.
U kan onderaan dit bericht verdere informatie terugvinden, alsook de uitleg hoe u dit lek kan sluiten. Edpnet heeft haar systemen reeds geüpdatet, we raden onze klanten aan om hetzelfde te doen.
A heap-based buffer overflow was found in glibc’s __nss_hostname_digits_dots() function, which is used by the gethostbyname() and gethostbyname2() glibc function calls. A remote attacker able to make an application call either of these functions could use this flaw to execute arbitrary code with the permissions of the user running the application.
Bron en info: http://ma.ttias.be
Met vriendelijke groeten, Het edpnet team
Security /
Dear customers,
Recently a critical security bug has been found with the Name Service Switch (nss) library in almost all Linux distributions. This bug can allow attackers to gain access to affected systems remotely by possibility to remotely execute arbitrary machine code without permissions.
Information on this bug and how it can be resolved can be found below. Edpnet has already patched this vulnerability on all of its servers, and we strongly advice our customers to do the same.
A heap-based buffer overflow was found in glibc’s __nss_hostname_digits_dots() function, which is used by the gethostbyname() and gethostbyname2() glibc function calls. A remote attacker able to make an application call either of these functions could use this flaw to execute arbitrary code with the permissions of the user running the application.
Source and info: http://ma.ttias.be
Best regards,The edpnet team
*All times are listed in CET, Central European Time
Dear customers,Some customers have received the
phishing e-mail below.
We would like to inform you that this message can be disregarded and is
not coming from edpnet.
What is Phishing? Phishing emails are fraudulent messages made to look like they were sent by reputable companies in an attempt to gather your personal and financial details.
Example:
From: INFO SERVICE TELENET [mailto:<removed>]
Sent: woensdag 3 december 2014 16:30
Subject: *Chers (es) clients (es) de EDPNET,*
*Chers (es) clients (es) de EDPNET,*
Le service technique chargé de la maintenance des comptes de messagerie a détecté des accès illégaux à votre messagerie à travers différentes adresses IP. Au risque que votre compte ne soit suspendu dans les prochains jours, notre service de maintenance vous demande de confirmer vos accès de connexion. Au cas où les informations ne seront pas fournies, votre accès à la messagerie serait suspendu définitivement. Pour des raisons de sécurité, veuillez fournir l’intégralité des informations demandées.
Complétez les informations suivantes pour la confirmation à votre accès
* Nom d’utilisateur:………………………………….
* Mot de passe:……………………………………….
* Adresse e-mail :……………………………………
* Mot de passe :………………………………………
* E-mail secondaire :…………………………………
* Mot de passe :……………………………………….
* Date de naissance:…………………………………
* Pays ou territoire:…………………………………..
* Profession:………………………………………………
* Tel:…………………………………………………………
Dès la réception de ces informations, votre messagerie serait suivie contre les accès illégaux. Merci de votre collaboration.
Webmail EDPNET*
*Cordialement,*
*L’équipe EDPNET*
Dear customers,
Because of a change on our core infrastructure, customers without a fixed IP may have had issues with their connection. Rebooting the modem solved the issue. Professional customers with a fixed IP did not have any impact.
We apologize for the inconvenience
The edpnet team
*All times are listed in CET, Central European Time
Dear customers,
Due to suspected vandalism on the Proximus network, 2 LEX’s have been disconnected. Multiple copper and fiber cables were cut, causing a large impact on ADSL and VDSL customers.
Update: According to Proximus, the last connections should be up by tomorrow evening.
The affected customers are in zones 071, Gosselies and Montigny-le-Tilleul.
More info: standaard.be (Dutch Article)
Description: Cables cut in LEX’s Wallonia
Start: 2014-11-08
Expected End: 2014-11-11 PM
Duration: /
Impacted services: All edpnet services for the affected customers
We apologize for the inconvenience
The edpnet team
*All times are listed in CET, Central European Time
Phishing /
Dear customers,
Some customers have received the phishing e-mail below.
We would like to inform you that this message can be disregarded and is not coming from edpnet.
—–Original Message—–
Van: edpnet.be [mailto:l.barbier@edpnet.org]
Verzonden: donderdag 2 oktober 2014 10:31
Aan: undisclosed-recipients:
Onderwerp: Belangrijke Post Notice
Οur securιty systeem υnυsυal actιvιty οn yουr edpnet.be mailaccount gedetecteerd, om te terug te krijgen ιt yοu’ll nodig hebt om uw accοunt ιnfοrmatιοn updaten. door te klikken op de link hieronder en aanmelden.
<Link removed for security reasons>
Regards,
Edpnet Support
—–Original Message—–
De : edpnet.be admin update [mailto:wealthjonah@gmail.com]
Envoyé : samedi 30 août 2014 01:05
Objet : (c)edpnet.be Webmail IT Help Desk.
Attention:
An Attempt has been made to Your Account from a new computer. For the security of your account, we are poised to open a query or update your account. Kindly Click,
<Link removed for security reasons>
for secure security and instant online account upgrade.
©edpnet.be Webmail IT Help Desk.
Closed / Scheduled /
Update: 2014-10-02: The migration is now complete. We had some receiving issues yesterday evening which are resolved.
Dear customers,
Edpnet will start migrating its customers’ e-mail accounts to a new and improved server farm.
The webmail on https://webmail.edpnet.net now supports SSL encryption for better security between the customer and our servers.
During this migration, customers may not get any incoming e-mail during 5-15 minutes whilst their account is being migrated. Once done, those e-mails will be delivered.
Description: Email migration
Start: 2014-09-22
End: 2014-10-01
Impacted services: Edpnet Email
We apologize for the inconvenience
The edpnet team