RSS Feed
Latest Updates
May
25
Uniregistry Registry Maintenance Notice | 25th May, 2017
Posted by on 25 May 2017 03:19:12 PM

A maintenance will be carried out by Uniregistry Registry as per the schedule mentioned below :

 

Maintenance Details:

 

Date

Thursday, May 25, 2017

Start Time

21:00 hrs UTC | 02:30 hrs IST (26th May, 2017 )

End Time

22:00 hrs UTC | 03:30 hrs IST (26th May, 2017 )

Duration

1 Hour

 

During the maintenance, you will not be able to register, renew, transfer, manage or perform Whois look-ups for all TLDs under Uniregistry Registry.

 

Please note that domains which have already been registered and are functional(resolving to destination pages), will continue to function as normal.

 

Please reach out to the Support Team in case of any queries.

 

Read more »



May
22

A maintenance will be carried out by the SIDN Registry for .NL and .AMSTERDAM as per the schedule mentioned below:
 

Maintenance Details :


Date

Tuesday, May 23rd, 2017

Start Time

03:00 Hrs GMT | 08:30 Hrs IST

End Time

06:00 Hrs GMT | 11:30 Hrs IST

Duration

3 Hours


During the maintenance, you will not be able to register, renew, transfer, manage or perform Whois look-ups for .NL and .AMSTERDAM.
 

Please note that domains which have already been registered and are functional(resolving to destination pages), will continue to function as normal.


Please reach out to the Support Team in case of any queries.


Read more »



May
20
Connectivity issues with .AU Registry
Posted by on 20 May 2017 09:44:35 AM

We are currently facing connectivity issues with the .AU Registry. Due to this, you may not be able to complete actions that require Registry connections such as: domain name registrations, renewals and transfers.

 

Please note that this will have no impact on the resolution / working of your already registered domain names.

 

We are working with the Registry to get this issue resolved at the earliest.

Please get in touch with our Support Team for any further queries.


Read more »



May
19
.COM/.NET Registry Maintenance Notice | 18th June, 2017
Posted by on 19 May 2017 03:11:09 PM

A maintenance will be carried out by the .COM/NET Registry as per the schedule mentioned below:
 

Maintenance Details :


Date

Sunday, 18th June 2017

Start Time

01:00 AM GMT   | 06:30 AM IST

End Time

01:45 AM GMT   | 07:15 AM IST

Duration

45 Minutes


 

During the maintenance, you will not be able to register, renew, transfer, manage or perform whois look-ups for the .COM/NET domain names.

 

Please note that domains which have already been registered and are functional(resolving to destination pages), will continue to function as normal.

You can get in touch with our support team in case of any queries.


Read more »



May
15
IMP : Windows Vulnerability - WannaCry
Posted by on 15 May 2017 05:32:40 PM

What is Ransomware?


Ransomware is a malicious software that encrypts files and locks devices, such as a computer, tablet or smartphone and then demands a ransom to unlock it. Recently, a dangerous ransomware named 'Wannacry' has been affecting devices worldwide creating the biggest ransomware attack the world has ever seen. 


What is WannaCry Ransomware?


WannaCry ransomware attacks windows based machines. It also goes by the name WannaCrypt, WannaCry, WanaCrypt0r, WCrypt, WCRY. It leverages SMB exploit in Windows machines called EternalBlue to attack and inject the malware. All versions of windows before Windows 10 are vulnerable to this attack if not patched for MS-17-010. After a system is affected, it encrypts files and shows a pop up with a countdown and instructions on how to pay the 300$ in bitcoins to decrypt and get back the original files. If the ransom is not paid in 3 days, the ransom amount increases to 600$ and threatens the user to wipe off all the data. It also installs DOUBLEPULSAR backdoor in the machine.


How it spreads?


It uses EternalBlue MS17-010 to propagate. The ransomware spreads by clicking on links and downloading malicious files over internet and email. It is also capable of automatically spreading itself in a network by means of a vulnerability in Windows SMB. It scans the network for specific ports, searches for the vulnerability and then exploits it to inject the malware in the new machine and thus it spreads widely across the network.


What can you do to prevent infection?

  • Microsoft has released a Windows security patch MS17-010 for Windows machines. This needs to be applied immediately and urgently.

  • Remove Windows NT4, Windows 2000 and Windows XP-2003 from production environments.

  • Block ports 139, 445 and 3389 in firewall.

  • Avoid clicking on links or opening attachments or emails from people you don't know or companies you don't do business with.

  • SMB is enabled by default on Windows. Disable smb service on the machine by going to Settings > uncheck the settings > OK

  • Make sure your software is up-to-date.

  • Have a pop-up blocker running on your web browser.

  • Regularly backup your files.

  • Install a good antivirus and a good anti-ransomware product for better security.

What are we doing on our Windows shared servers?


We are already in the phase of applying Windows updates on all our shared hosting Windows servers. However we need to reboot servers in-order to apply those security patches. We shall announce the schedule for server reboot in this thread shortly.


What you need to do in case of our Windows dedicated servers?


You need to patch the Windows dedicated server immediately using the steps mentioned in the link : https://goo.gl/PYIEis

In-addition to this, please block the IP addresses, domains and file names mentioned in this link : https://goo.gl/JsSo0v

You can also refer to the following links to apply the necessary fix.


https://technet.microsoft.com/library/security/MS17-010

https://technet.microsoft.com/en-us/library/security/ms17-010.aspx

https://support.microsoft.com/en-in/help/4013389/title

For dedicated servers, once you have applied necessary changes, you need to reboot the server.


Please feel free to contact our support desk if you have any questions.


Read more »