Security

Mehr Informationen zu dem Service finden Sie in unserem Dokumentationsportal.

Phishing Email: "Alert: Important Message for ... (E-Mail Adresse)"

Warning
Monday 11/17/2025 01:00 PM - Thursday 11/20/2025 02:58 PM

A phishing email with the above subject line points to a convincing fake of mail.rwth-aachen.de.

Please do not click, we are monitoring this.

17.11.2025 15:01

Phishing Email: "Aktion erforderlich ..."

Warning
Tuesday 11/11/2025 10:31 PM - Sunday 11/16/2025 01:30 PM

Last night, a phishing email was sent out with today's or yesterday's date in the subject line.

Please do not enter any login information via the link in this email.

The pattern is always the same:

a) it creates pressure to do something IMMEDIATELY.
b) the sender is fake.

These are typical characteristics of a phishing email.

12.11.2025 13:31
Updates

A new phishing email has just arrived, subject: "Aktion erforderlich" (date of today)

13.11.2025 16:32

DNS RPZ

Notice
Monday 07/07/2025 12:45 PM - Tuesday 07/08/2025 01:45 PM

Some records have been added to the local RWTH response policy zone with "passthru" policy - so just logging but not blocking DNS requestst to known bad domains.

07.07.2025 12:30

Routing über neue XWiN-Router

Maintenance
Tuesday 06/10/2025 09:00 PM - Tuesday 06/10/2025 10:13 PM

During this period, the routing of the previous XWiN routers (Nexus 7700) will be switched to the new XWiN routers (Catalyst 9600). These routers are essential for RWTH's network connection. This changeover also requires the migration of the DFN connection, which is switched redundantly to Frankfurt and Hannover, and the RWTH firewall to the new systems.
There will be complete or partial outages of the external connection during the maintenance window. All RWTH services (e.g. VPN, email, RWTHonline, RWTHmoodle) will not be available during this period. The accessibility of services within the RWTH network will be temporarily unavailable due to limited DNS functionality.

07.05.2025 12:47
Updates

Der Uplink nach Frankfurt wurde erfolgreich auf das neue System geschwenkt.

10.06.2025 21:07

Umbau des Uplinks nach Hannover beginnt.

10.06.2025 21:36

Uplink nach Hannover auf das neue System umgezogen.

10.06.2025 21:45

BGP v4/v6 nach Frankfurt und Hannover sind nun über die neue Routern funktional.

10.06.2025 21:57

Es stehen noch ein paar kleinere Nacharbeiten an.

10.06.2025 22:03

Wartung ist abgeschlossen. Der Datenverkehr läuft nun vollständig über die neuen Router!

10.06.2025 22:12

Problematik mit der Anbindung zur Physik identifiziert, Lösung erfolgt morgen früh.

10.06.2025 23:50

DFN Timestamp Service Temporarily Unavailable

Partial Outage
Wednesday 02/12/2025 03:45 PM - Wednesday 02/12/2025 10:00 PM

The DFN timestamp service is temporarily unavailable at the moment. As a result, the digital signature cannot be used as usual.
We are already working on a solution to the problem.

12.02.2025 15:53
Updates

DFN Zeitstempeldienst funktioniert wieder

19.02.2025 13:13

Phishing Warning

Notice
Wednesday 12/18/2024 10:45 AM - Friday 01/24/2025 01:29 PM

We are currently observing a new wave of phishing attacks. This time, the focus is on CEO Fraud:
https:
polizei.nrw/en/article/ceo-fraud-high-risk-of-fraud-for-companies
Usually the name of the correct supervisor is shown as the sender name. The actual sender email address, however, is most often very generic (e.g. office12345@gmail.com or similar). It is therefore strongly recommended to check the actual sender email address.
We advise caution. If you receive one of those emails, please do not reply and never send any gift cards or money. Report the email (as an attachment) to servicedesk@itc.rwth-aachen.de and also to spam@access.ironport.com in Cc.
You can find more information about e-mail phishing here:
https:
help.itc.rwth-aachen.de/en/service/1jefzdccuvuch/article/44343c9765a44f1cad23f0c4cd75f856/#Phishing-Mails

18.12.2024 11:15

Erneuerung der Vulnerability-Management-Lösungen

Notice
Thursday 01/02/2025 11:15 AM - Thursday 01/09/2025 12:15 PM

As part of a modernization of the vulnerability management solutions used, the license of the old appliance has expired as planned. The reports displayed on [0] therefore do not reflect the current status quo. Information about a new portal, which displays the data of the new scanner, will soon be provided via the usual channels (e.g. e-mail distribution list for the admin round).
[0]
https:
noc-portal.itc.rwth-aachen.de/sec-scan-report/scan_results

02.01.2025 11:23

Hosts of RWTH Aachen University partly not accessible from networks of other providers

Partial Outage
Saturday 08/24/2024 08:15 PM - Sunday 08/25/2024 09:00 PM

Due to DNS disruption, the name servers of various providers are currently not returning an IP address for hosts under *.rwth-aachen.de.
As a workaround, you can store alternative DNS servers in your connection settings, e.g. the Level3-Nameserver (4.2.2.2 and 4.2.2.1) or Comodo (8.26.56.26 und 8.20.247.20). It may also be possible to reach the RWTH VPN server, in which case please use VPN.

25.08.2024 10:34
Updates

Instructions for configuring an alternative DNS server under Windows can be found via the following links:
https:
www.ionos.de/digitalguide/server/konfiguration/windows-11-dns-aendern/
https:
www.netzwelt.de/galerie/25894-dns-einstellungen-windows-10-11-aendern.html
You can also use VPN as an alternative. If you cannot reach the VPN server, you can adjust the host file under Windows according to the following instructions. This will allow you to reach the server vpn.rwth-aachen.de. To do this, the following entry must be added:
134.130.5.231 vpn.rwth-aachen.de
https:
www.windows-faq.de/2022/10/04/windows-11-hosts-datei-bearbeiten/

25.08.2024 13:20

The hosts of RWTH Aachen University can now be reached again from outside the RWTH network.

25.08.2024 21:10

Individual users may have experienced problems even after the fault was rectified on 25 August at 9 pm. On 26.8. at 9 a.m. all follow-up work was completed, so there should be no further problems.

26.08.2024 15:25

Wartung NOC-portal

Partial Maintenance
Tuesday 08/20/2024 09:30 AM - Tuesday 08/20/2024 03:00 PM

wegen einer Wartung des Systems noc-portal werden einige unserer Webdienste zum Steuern der Internet Basisdienste kurzzeitig im Wartungszeitraum nicht zur Verfügung stehen.
Unter anderem sind betroffen:
* DNS-Admin
* DHCP- Admin
* RADIUS-Admin
* Interface-Admin
* Firewall-Admin & -Formular
* WLAN Gastaccounts (anlegen)

20.08.2024 09:32

Unwanted cloud storage in free "New Outlook" apps

Warning
Friday 11/24/2023 01:45 PM - Monday 08/19/2024 04:00 PM

The new Outlook app for Windows 10 and 11 and the Outlook apps on mobile devices (Android and iOS/macOS) must not be used for information security and data protection reasons, as they transmit unwanted data to Microsoft.
License-based Outlook programs (from Microsoft Office) and the "Outlook on the Web" app (OWA) are not affected. These may continue to be used. There are currently no security concerns here, as these applications communicate directly with the RWTH Aachen University mail servers and no data is transferred to the Microsoft cloud.
Further information can be found at:
https:
help.itc.rwth-aachen.de/service/1jefzdccuvuch/article/a0fbb2a445e84927ad982e1259942e22/

24.11.2023 14:03
Updates

The message will be deactivated. We continue to warn against the use of the new, free Outlook app:
https:
help.itc.rwth-aachen.de/en/service/1jefzdccuvuch/article/a0fbb2a445e84927ad982e1259942e22/

19.08.2024 16:03

Phishing Warning

Warning
Wednesday 07/24/2024 08:00 AM - Monday 08/12/2024 08:00 AM

We are currently observing a new wave of phishing attacks. This time, the following subject is particularly noticeable:
Current subject: "Payment Advice - Ref: [HSBC107741] / RFQ Priority Payment / Customer Ref: [PI10774QT44]" or similar.
We advise caution. If you receive one of those emails, please do not click on the link under any circumstances and report them to servicedesk@itc.rwth-aachen.de and also to spam@access.ironport.com in Cc.
You can find more information about e-mail phishing here:
https:
help.itc.rwth-aachen.de/en/service/1jefzdccuvuch/article/ab86b235c4f5426facd675d623a0365b/
https:
help.itc.rwth-aachen.de/en/service/1jefzdccuvuch/8e226a36638741ddacac573faa95a0e3/faq/#f2b3552a3e6f49d9be25a1ed9ad2ebe7

25.07.2024 15:15

Phishing Warning

Warning
Wednesday 06/05/2024 04:00 PM - Monday 07/15/2024 10:00 AM

We are currently seeing another wave of phishing attacks using the following email subjects: "Paskyra
pasenusi" and "Kontingentinformationen".
If you receive such an e-mail, please do not click on the link and report it to servicedesk@itc.rwth-aachen.de.

05.06.2024 16:12
Updates

The wave continues:

11.06.2024 21:35

The wave continues:
current Subject: "E-Mail-Kontingent voll"

17.06.2024 09:46

We are no longer observing phishing emails with these subjects.

25.07.2024 15:00

Phishing Warning

Warning
Friday 04/12/2024 12:00 PM - Thursday 05/23/2024 03:46 PM

We are currently seeing a wave of phishing attacks of various kinds.
E-mails with the subject "??? Voice Mail (00:19secs)" are particularly noticeable.
If you receive this e-mail, please do not click on the link and report it to servicedesk@itc.rwth-aachen.de.

17.04.2024 13:12
Updates

Phishing attacks continue to occur more frequently. Phishing e-mails with the subject "WICHTIG: E-Mail-Benachrichtigung der Universität Würzburg" are particularly noticeable at the moment. This email may also be sent in a modified version and/or in English.

30.04.2024 16:09

We are ending the warning message as the total number of phishing cases has decreased. However, phishing emails are still being sent. Therefore, please keep an eye out for suspicious emails and do not click on any links they contain.

23.05.2024 15:45

Hohe Anzahl verschlüsselter Archive

Warning
Friday 04/05/2024 09:15 AM - Tuesday 04/09/2024 10:15 AM

Wir sehen gerade eine hohe Anzahl verschlüsselter Anhänge hereinkommen.
Muster des Dateinamens: "Zahl"-BST-SH.zip
Wir gehen von Malware aus

05.04.2024 09:26
Updates

Ein weiteres Muster taucht auf: DOC"Zahl"-"längere Zahl".zip

05.04.2024 11:05

Heute ist das Muster TCR"Zahl".zip, Zahl ist vierstellig

08.04.2024 14:14

Hohe Anzahl E-Mails mit verschlüsselten ZIP Files

Notice
Tuesday 01/23/2024 01:00 PM - Thursday 01/25/2024 03:00 PM

Wir sehen seit ca. 13:00 E-Mails mit Anhängen in Form verschlüsselter ZIP Files.
Die Filenamen haben das Muster "in_lange Zahl".
Wir gehen von einer Malware Attacke aus.

23.01.2024 14:16