Real Time Updates About Different Issues at ZNetLive

Real Time Updates About Different Issues at ZNetLive

Live update on service issues and scheduled maintenances at ZNetLive
Resolved Issues
Jul 11 2017

Emergency: PRI Lines Down

We are facing issue with our PRI lines at ISP end. Hence impacting our phone lines down. We will be unrecheable via phone till the issue is resolved.

We are expecting this to be resolved by 12/07/2017 morning 10 AM.

Our support is available via chat and tickets.

We apologies for the inconvenience.

Thanks.

ZNET Team

 

Status as: 10:44AM 12/07/2017: Resolved

cheduled upgradation activity featured image
Jul 7 2017

cPanel/Linux and Windows critical patch updates for the month of June 2017

As part of their monthly update releases, Microsoft, cPanel and Plesk have released Windows and Linux critical patches for the month of June 2017.

This mail is with regards to the newly released security patches by Microsoft, Plesk and cPanel for the flaws relating to all Windows 2008/2008R2/2012/2012R2 server and Linux server versions.

Although, we have tested all the patches at our end but we humbly request you also, to review at your end.

We understand that security updates are often viewed as inconvenience, but in reality, they are the best defense against common viruses, malware or any other security threats prevalent in the online environment.
So to minimize the risk of exposure or low performance, please perform these updates.

Please test each patch’s compatibility with your business-critical applications and software and provide us with a suitable window to apply the patches.

– Expected Downtime: 30-45 mins

– Effect of Maintenance: We shall be restarting the servers after the patch update, so there can be 30-45 mins (approx) downtime on the servers, during the maintenance window provided by you.

To know more, use ZNetLive’s 24×7 Member Panel for immediate resolution.

Important Notice: Our all AWS and Azure cloud customers can protect their data with the help of Snapshot backups either on their own or by purchasing them with us.

This will help you recover your data in the event of data loss or corruption.

For more details, please contact our sales team.

Note:

Click here to download  the details of Windows Patches released in June, 2017.
Click here to download  the details of Linux Patches released in June, 2017.
Click here to download  the details of cPanel/Plesk Patches released in June, 2017.

Resolved Issues
Jul 6 2017

Critical: Network Issue at Mumbai DC

We are facing network related issue at our Mumbai facility where LAN to WAN connectivity is having issue. Though network from outside is recheable.

Our DC team is working on the issue to resolve it asap.

Expected Time to resolve: We are expecting it to resolve in next 3-4 hours but depending on scenario it may vary.

Support: Our technical support is fully staffed over ticket, chat and support.

Thanks,

 

ZNET Team

 

Update: Resolved.

Resolved Issues
Jul 1 2017

ResellerPlesk-14: Emergency Maintenance

Dear Customer,

We are getting disk related errors on reseller server named : ResellerPlesk-14 and services not accessible. We are performing  emergency maintenance on server for fix disk issues.

Currently disk check is in process and may take 4+ hours.

Kindly keep checking this URL for further updates.

Our technical support is staffed over ticket, chat and phone.

Thanks for your cooperation.

ZNET Team

———————-

Update :  Activity completed and server is working fine now.

Resolved Issues
Jun 28 2017

Scheduled upgradation activity at Indian DC-Noida: Saturday,1st July, 2017.

Warm greetings from ZNetLive!

This is to inform you that we are conducting a firmware upgradation activity for Cloud Storage and network devices at our Noida Facility.

Upgradation Date: Saturday,1st July, 2017.

Upgradation Time: 11:00 P.M. to 5:00 A.M.

There is no complete downtime but you may face network fluctuation during the activity.

Communication Plan: Our helpdesk would be fully staffed & functional during the activity period. Please feel free to get in touch with our support team at support@znetlive.com, in case of any queries/doubts.

Please be patient & support us in our endeavor of serving you with better network facility.

Thank you for your co-operation and support.

 

==

Update at 12:19AM 1st July, 2017: Due to hardware failure, we are facing issue in connectivity. So customer services are impacted now. Our engineers are working on this.

Update at 5:00 AM: Servers and services are UP but maintenance is still going on. This won’t seem to impact on services.

Update at 6:00AM :  Maintenance completed.

Resolved Issues
Jun 11 2017

ResellerPlesk-06: Emergency Maintenance

Dear Customer,

On of our reseller server named: ResellerPlesk-06’s OS seems having issues. We are trying to make it online back. It would take some couple of hours.

We are expecting it to be up in next 5-6 hours.

Kindly keep checking this URL for further updates.

Our technical support is staffed over ticket, chat and phone.

Thanks for your cooperation.

ZNET Team

Resolved Issues
Jun 9 2017

Scheduled Maintenance Activity of ZNetLive site and Member Panel : Friday, 9th June, 2017

This is to inform you that we are going to have a scheduled maintenance activity for ZNetLive site (https://www.znetlive.com/) and Member Panel (https://manage.znetlive.com) in order to provide you with better  support and services.

However, it will not impact any of your services.

The schedule of the activity is as per the given time frame:

Maintenance Window Details :

Scheduled Activity Date : Friday, 9th June, 2017.

Scheduled Activity Time : 10:30 P.M. to 12:30 A.M.

We regret any inconvenience caused due to this maintenance.

Keep visiting announcement section or http://znetlivestatus.com for further updates!

Thank you in anticipation of your co-operation and support.

cheduled upgradation activity featured image
Jun 8 2017

cPanel/Linux and Windows critical patch updates for the month of May 2017

As part of their monthly update releases, Microsoft, cPanel  and Plesk have released Windows and Linux critical patches for the month of May 2017.

This mail is with regards to the newly released security patches by Microsoft, Plesk and cPanel for the flaws relating to all Windows 2008/2008R2/2012/2012R2 server and Linux server versions .

Although, we have tested all the patches at our end but we humbly request you also, to review at your end.

We understand that security updates are often viewed as inconvenience but in real they are the best defense against the common viruses, malware or any other security threats prevalent in the online environment.

So to minimize the risk of exposure or low performance, please perform these updates.

Please test each patch’s compatibility with your business-critical applications and software and provide us with a suitable window to apply the patches.

Expected Downtime: 30-45 mins

Effect of Maintenance: We shall be restarting the servers after the patch update, so there can be 30-45 mins (approx) downtime on the servers, during the maintenance window provided by you.

To know more, use ZNetLive’s 24×7 Member Panel for immediate resolution.

Important Notice: Our all AWS and Azure cloud customers can protect their data with the help of Snapshot backups either on their own or by purchasing them with us.

This will help you recover your data in the event of data loss or corruption.

For more details please contact to our sales team.

Note:

Click here to download the details of Windows Patches released in May, 2017.
Click here to download the details of Linux  Patches  released in  May, 2017.
Click here to download the details of cPanel/Plesk Patches  released in  May, 2017.

Resolved Issues
May 15 2017

Emergency Maintenance and Security Updates on Reseller Servers

This is to inform you that we are performing emergency maintenance on our reseller servers and you may face some packet loss or downtime during this activity.

The schedule of the activity is as per the given time frame:

Maintenance Window Details :

Activity Start Time : Monday 15th May 2017, 12PM

Current status : In-progress

Server’s

Resellerplesk12

Resellerplesk14

Resellerplesk9-u

Resellerplesk15

Availability of Services: You may face fluctuations in the availability of services.

Technical Support: Tech support would be available over phone, chat and tickets.

Thank you for your cooperation.

Regards,

ZNET Team

——————————————–

All servers security updates completed.

Currently scanning is going on Resellerplesk14 and it will take couple or hours.

Resolved Issues
May 13 2017

{Urgent} Security Advisory for May 2017

Aligning to industry best practices and standards of providing the best services to you, we publish security advisories that are designed to provide timely information to all our esteemed customers.

Advisories are a way for ZNetLive to communicate security information to customers about the issues that may not be classified as vulnerabilities and may not require a security bulletin.

Below are the threat information shared regarding recent critical vulnerabilities/threat reported.

WannaCry Ransomware That’s Hitting World Right Now Uses NSA Windows Exploit

A massive ransomware campaign hit computer systems of hundreds of private companies and public organizations across the globe – which is believed to be the most massive ransomware delivery campaign to date. The Ransomware has been identified as a variant of ransomware known as WannaCry also known as ‘Wana Decrypt0r,’ ‘WannaCryptor’ or ‘WCRY’.

Ransomware Using NSA’s Exploit to Spread Rapidly

Most interesting about this ransomware is that WannaCry attackers are leveraging a Windows exploit harvested from the NSA called EternalBlue, which was dumped by the Shadow Brokers hacking group over a month ago. Microsoft released a patch for the vulnerability in March (MS17-010), but many users and organizations who did not patch their systems are open to attacks. The exploit has the capability to penetrate into machines running unpatched version of Windows XP through 2008 R2 by exploiting flaws in Microsoft Windows SMB Server. Once a single computer in organization is hit by the WannaCry ransomware, the worm looks for other vulnerable computers and infects them as well.

Who are affected?

Like other nasty ransomware variants, WannaCry also blocks access to a computer or its files and demands money to unlock it. Once infected with the WannaCry ransomware, victims are asked to pay up to $300 in order to remove the infection from their PCs; otherwise, their PCs render unusable, and their files remain locked.
The ransomware targeted over 45,000 computers in 74 countries, including United States, Russia, Germany, Turkey, Italy, Philippines and Vietnam, and that the number was still growing

How to Protect Yourself from WannaCry:

1) First of all, patch your Windows machines and servers against EternalBlue exploit (MS17-010)
2) You should always be suspicious of uninvited documents sent an email and should never click on links inside those documents unless verifying the source.
3) Keep a good backup routine in place that makes their copies to an external storage device that is not always connected to your PC.
4) Make sure that you run an active anti-virus security suite of tools on your system, and most importantly, always browse the Internet safely.

Reference: https://www.tripwire.com/state-of-security/latest-security-news/wannacryptor-ransomware-strikes-nhs-hospitals-telefonica-and-others/

Threat Summary: Massive vulnerability in Windows Defender leaves most Windows PCs vulnerable

Microsoft patched a severe code-execution vulnerability in the malware protection engine that is used in almost every recent version of Windows (7, 8, 8.1, 10, and Server 2016), just three days after it came to its attention. Notably, Windows Defender is installed by default on all consumer-oriented Windows PCs. The exploit allows a remote attacker to take over a system without any interaction from the system owner: it’s simply enough for the attacker to send an e-mail or instant message that is scanned by Windows Defender. Likewise, anything else that is automatically scanned by Microsoft’s malware protection engine – websites, file shares—could be used as an attack vector.

Google Project Zero researchers who discovered the flaw, warned that exploits were “wormable,” meaning they could lead to a self-replicating chain of attacks that moved from vulnerable machine to vulnerable machine.

The Google researchers found that MsMpEngine contains a component called NScript that analyses any file system or network activity that looks like JavaScript. NScript isn’t sandboxed and runs at a very high privilege level, and it’s used to evaluate untrusted code by default on almost every modern Windows system. NScript can be exploited with a few lines of JavaScript, which can be injected via a specially crafted Web page, e-mail, or just about any other attack vector.

Who are affected?

Microsoft says the risk of remote code execution is lower on Windows 10 and Windows 8.1 because of CFG, a security feature that protects against memory corruption. CFG is an optional compilation flag in Visual Studio 2015.

Reference: https://arstechnica.com/information-technology/2017/05/windows-defender-nscript-remote-vulnerability/

Threat Summary: Microsoft Issues Patches for Another Four Zero-Day Vulnerabilities

As part of this month’s Patch, Microsoft has released security patches for a total of 55 vulnerabilities across its products, including fixes for four zero-day vulnerabilities being exploited in the wild.. Just, Microsoft released an emergency out-of-band update separately to patch a remote execution bug in Microsoft’s Antivirus Engine that comes enabled by default on Windows 7, 8.1, RT, 10 and Server 2016 operating systems.

Affected Software:

Out of 55 vulnerabilities, 17 have been rated as critical and affect the company’s main operating systems, along with other products like Office, Edge, Internet Explorer, and the malware protection engine used in most of the Microsoft’s anti-malware products.

First Zero-Day Vulnerability (CVE-2017-0261)

This vulnerability could be exploited by tricking victims into opening a file containing a malformed graphics image in an email. The=is vulnerability is due to insufficient rate limiting protection. An attacker could exploit this vulnerability by sending the affected device a high rate of SIP messages. An exploit could allow the attacker to cause the device to reload unexpectedly. The device and services will restart automatically.

Who are affected?

Affects the 32- and 64-bit versions of Microsoft Office 2010, 2013 and 2016, and resides in how Office handles Encapsulated PostScript (EPS) image files, leading to remote code execution (RCE) on the system.

Second Zero-Day Vulnerability (CVE-2017-0262)

FireEye and ESET researchers believe that the APT28 hacking group, also known as Fancy Bear, or Pawn Storm, was actively using this EPS-related Microsoft Office zero-day vulnerability which leads to remote code execution on opening a malformed file.

Third Zero-Day Vulnerability (CVE-2017-0263)

The third zero-day bug is an elevation of privilege (EoP) vulnerability in all supported versions of Microsoft’s Windows operating system.

Fourth Zero-Day Vulnerability (CVE-2017-0222)

Another zero-day vulnerability affects Internet Explorer 10 and 11 and resides in how Internet Explorer handles objects in memory.

Reference: http://thehackernews.com/2017/05/patch-windows-zero-days.html

Microsoft Malware Protection Engine Remote Code Execution Vulnerability- CVE-2017-0290

Overview

The update addresses a vulnerability that could allow remote code execution if the Microsoft Malware Protection Engine scans a specially crafted file. An attacker who successfully exploited this vulnerability could execute arbitrary code in the security context of the Local System account and take control of the system.

Who are affected?

The following software versions or editions are affected. Versions or editions that are not listed are either past their support life cycle or are not affected.

  • Microsoft Forefront Endpoint Protection 2010
  • Microsoft Endpoint Protection
  • Microsoft Forefront Security for SharePoint Service Pack 3
  • Microsoft System Center Endpoint Protection
  • Microsoft Security Essentials
  • Windows Defender for Windows 7
  • Windows Defender for Windows 8.1
  • Windows Defender for Windows RT 8.1
  • Windows Defender for Windows 10, Windows 10 1511,
  • Windows 10 1607, Windows Server 2016, Windows 10 1703
  • Windows Intune Endpoint Protection

Microsoft Malware Protection Engine Remote Code Execution Vulnerability – CVE-2017-0290

An attacker who successfully exploited this vulnerability could execute arbitrary code in the security context of the LocalSystem account and take control of the system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, a specially crafted file must be scanned by an affected version of the Microsoft Malware Protection Engine.

There are many ways that an attacker could place a specially crafted file in a location that is scanned by the Microsoft Malware Protection Engine. For example, an attacker could use an email message or in an Instant Messenger message, websites that accept or host user-provided content, to upload a specially crafted file to a shared location that is scanned by the Malware Protection Engine running on the hosting server.

Who are affected?

All systems running an affected version of antimalware software are primarily at risk.

Reference: https://technet.microsoft.com/en-us/library/security/4022344.aspx

To know more, use ZNetLive’s 24×7 Member Panel for immediate resolution.

Resolved Issues
May 10 2017

Windows critical patch updates for the month of April 2017

This is to inform you that as part of its monthly update releases, Microsoft has released Windows critical patches for the month of April 2017.

This mail is with regards to the newly released critical patches by Microsoft for the flaws relating to all Windows 2008/2008R2/2012/2012R2 server versions. Although, we have tested all the patches at our end but we humbly request you also, to review at your end.

We understand that security updates are often viewed as inconvenience but in real they are the best defense against the common viruses, malware or any other security threats prevalent in the online environment.

So to minimize the risk of exposure or low performance, please perform these updates.

Please test each patch’s compatibility with your business-critical applications and software and provide us with a suitable window to apply the patches.

– Expected Downtime: 30-45 mins

– Effect of Maintenance: We shall be restarting the servers after the patch update, so there can be 30-45 mins (approx) downtime on the servers, during the maintenance window provided by you.

To know more, use ZNetLive’s 24×7 Member Panel for immediate resolution.

Note: Click here to download the details of Patches released in April, 2017.

Resolved Issues
Apr 26 2017

Urgent Maintenance Activity of https://www.znetlive.com and https://manage.znetlive.com Sites : Thursday, 27th April, 2017.

This is to inform you that we are performing urgent maintenance processes on the system, due to which ZNetLive’s member panel: https://manage.znetlive.com and ZNetLive website: https://www.znetlive.com will not be accessible to you.

However, it will not impact any of your services.

The schedule of the activity is as per the given time frame:

Maintenance Window Details :

Activity Date : Thursday, 27 April, 2017.

Activity Time : 00:00 A.M. to 00:30 AM

We regret any inconvenience caused due to this maintenance.

Resolved Issues
Apr 17 2017

Phone support unavailable : Monday, April, 2017

This is to inform you that due to some technical reasons, our phone support will not be available on April 17, 2017.

Our experts are working on the issues and it will take few hours to resume phone services.

During this period  you can reach us via Live Chat and Support tickets.

If there is any further change, we will keep you updated through our portal Znetlivestatus.com

Please be patient and any inconvenience is sincerely regretted.

 

cheduled upgradation activity featured image
Apr 3 2017

Emergency notification regarding nameserver updation of .Club domains

This is to bring to your notice that we are facing an issue while connecting to the  .Club registry for nameservers updation. Our team is in touch with the registry and is coordinating directly with their backend team too.

We hope the issue will get resolved soon. We will keep you updated of the same.

We sincerely regret any inconvenience this may cause you.

Regards,

Team ZNetLive.

Pages:1234567...17