Columbia University Information Technology

Service Alerts

Active Service Alerts

  • Email
    04/19/2014 - 05:17pm to TBD

    UPDATE Wednesday 4/23 13:00

    AOL is accepting mail again.

    UPDATE Wednesday 4/23 9:00

    No response from AOL to our request for assistance yesterday afternoon. We will try again.  The use of stolen accounts here has diminished during the past 24 hours.

    UPDATE Tuesday 4/22 13:00

    AOL is currently blocking mail from columbia.edu.

    UPDATE Tuesday 4/22 11:00

    AOL blocked mail from columbia.edu for several hours last night because of spam sent to AOL from a columbia.edu account. AOL is accepting mail now.

    UPDATE Tuesday 4/22 10:15

    Use of phished passwords continues, including another unsuccessful attempt to send more phishing mail to Columbia users. An email announcement was sent to all faculty, students, staff last evening.

    UPDATE Monday 4/21 10:15

    One of the accounts stolen in the early Friday phish mail was used Friday evening to send more phishing mail to 5,000 Columbia accounts.  Other stolen accounts are being used in attempts to send spam to the world but almost all of those are failing.  We are continuing to disable passwords of accounts as they are identified.  Use of stolen accounts is continuing.

    =====

    Early on Friday morning persons unknown, using a stolen Columbia account password, sent a well-crafted account phishing message to 32,000 addresses at columbia.edu. This message got past our filters. The message told people that IT policies had been consolidated (this really happened a few months ago) and advised users to click to see the changes. The link went to the scammers' page, which was an exact copy of our Wind login page, and after input to that page, it redirected to the real Columbia IT policy page (which does not require login). By this means the scammers collected an unknown number of uni and password pairs. It was easy to miss that the fake login page was a fake.

    We sent a message to all recipients at 09:10 warning them to change password if they had given away the information.

    Still, Friday evening and Saturday we have seen a series of Columbia accounts used to authenticate and send through our outbound gateway thousands of spam messages and further phishing messages, some to Columbia and some to outside domains. Most of these attempts failed to send because our filters caught them. We are disabling accounts as they are identified. Yahoo and AOL were refusing mail from Columbia for a time on Saturday because their accounts were being targeted; this has ended at this writing.

    Chances are the scammers have more stolen accounts, and we will have a busy weekend shutting them down one by one. Although we have monitoring we will also be very grateful for user reports. The sooner we identify each one the better.

     

  • Network - Wireless and NetPhone
    04/30/2014 - 05:00am to 04/30/2014 - 08:00am

    CUIT is performing necessary upgrade at 400 West 119th from 5-8 am  During this maintenance window wired network connectivity will be down. This scheduled maintenance is expected to be completed on-time.

    CUIT apologizes for any inconvenience this may cause, but this action is necessary to ensure a more reliable service.  If clients continue to experience issues after the service-interruption hours, please contact the CUIT Helpdesk at:

    Web:     http://cuit.columbia.edu/support

    Phone:   212-854-1919

    Email:     askcuit@columbia.edu

     

    For a list of active and future Service Alerts, please visit http://cuitalerts.columbia.edu/.

     

  • Email - LionMail
    (Approximate) 04/22/2014 - 11:50am to TBD
    Starting around 11:50am we received reports that opening documents gives the error "502. That’s an error. "  Google has not yet posted this to their dashboard and it may already have been fixed.

  • Subversion
    04/18/2014 - 11:00am to TBD

    Subversion will be unavailable on Friday, April 18th, between 10am and 11am.  This outage is being taken to migrate Subversion from Solaris to linux.

    CUIT apologizes for any inconvenience this may cause, but this action is necessary to ensure a more reliable service.  If clients continue to experience issues after the service-interruption hours, please contact the CUIT Helpdesk at:

    Web:     http://cuit.columbia.edu/support

    Phone:   212-854-1919

    Email:     askcuit@columbia.edu

     

    For a list of active and future Service Alerts, please visit http://cuitalerts.columbia.edu/.

     

  • ARC
    (Approximate) 04/09/2014 - 08:45am to TBD

    UPDATE: As of 9:20am the server and database are back up. Users may experience slowness connecting and starting up reports for the next hour, due to caching and backlog of users.

    ===

    Begining a little before 9am, FDS became unavailable. CUIT administrators have been notified and are currently working to resolve the issue.

    CUIT expects to have a resolution or an update by 9:30am. We apologize for this service interruption.

    For a complete list of recent and upcoming scheduled service changes, please visit http://cuitalerts.columbia.edu/.