SYSTEM STATUS AND HOSTING NEWS
|30 Apr 2021|
Fri 2:20 PM
| ||RHIS mail server SSL warnings for Apple users|
Users who have mail clients on Apple devices are likely to encounter an SSL Certificate Trust Warning when connecting to our mail servers using an aliased name such as mail.youdomain.com. This may be preventing you from connecting our mail servers to send/receive emails. Please email support and we will provide you with an alternative hostname that should resolve the issue.
Please note this does not apply to our cPanel users, who should remain unaffected.
|9 Apr 2021|
Fri 9:50 AM
| ||RHIS mailbox login update|
We will be disabling legacy usernames for users of the RHIS mail platform on the 15th April 2021 to improve our services and streamlining your customer experience. This change will generally only apply to users who where set up on the system before 2010 and are using the old style login method.
A legacy username is a username that is not an email address, for example pop.joebloggs instead of email@example.com.
Please check which you are using and, if necessary, update the username on your mailbox to your email address before 15th April by logging into your email client with the updated username. Please remember to check both POP/IMAP (incoming) and SMTP (outgoing) settings.
If you need any assistance please get in touch and we will be happy to help.
If your username is not updated by this date, you will no longer be able to authenticate your mail account and will not be able to access your emails. If this happens, please contact us to update your mailbox account.
Please note: This announcement does not apply if you are on one of our cPanel servers.
|17 Mar 2021|
Wed 9:50 AM
| ||[Completed] US Data Centre Maintenance Server Downtime|
The US data centre has alerted us to an issue with the PDU (power distribution unit) that supplies electrical power to our US servers. With this in mind, we have gone ahead and scheduled a maintenance window to replace the defective PDU. Unfortunately, this maintenance will require a brief period of downtime for the Cedar and Beach servers.
We have scheduled the maintenance to be performed between 11:00PM EDT on Friday March 26th 2021 and 3:00AM EDT on Saturday March 27th 2021 and we expect downtime to be approximately 30 minutes.
|16 Oct 2020|
Fri 10:35 PM
| ||[Resolved] Beach server connectivity issue|
We have lost connectivity to the Beach server due to a network issue at the data centre. This is currently being worked on with more updates to be posted shortly. We are sorry for the inconvenience caused.
Update: This appears to be an issue with the power distribution unit to one of the racks. It is being swapped out.
Update 23:55: The server is accessible again. W2-S Internet Services wishes to thank you for your patience whilst this issue was resolved.
|20 Sep 2020|
Sun 11:10 AM
| ||[Resolved] Email delivery delays on Richards and Knopfler UK servers|
We are currently experiencing slowdowns in our email cluster, we are investigating and will update this announcement with more information as it becomes available.
Update 13:35: Works have completed to improve the email cluster and mails are being handled accordingly. There is a small backlog of mails that are pending processing, this announcement will be updated once the queues are empty.
Update 16:00: The email queues are now back under control and our email cluster is operating at peak performance once again. We would like to apologise for any inconvenience caused.
|30 Aug 2020|
Sun 3:20 PM
| ||[Resolved] US Network issues|
We are experiencing connectivity issues to our US data centre. As a result, the Cedar and Beach servers are currently offline. Updates to follow.
Update: From the data centre: Centurylink / Level3 is experiencing a global network disruption that is affecting clients throughout world at this time. We have removed Centurlink / Level3 from our blended network till they stabilize. Some clients might still be having issues connecting while their upstream providers reroute their connectivity.
Update 17:25: From CenturyLink: We are able to confirm that all services impacted by today’s IP outage have been restored. We understand how important these services are to our customers, and we sincerely apologize for the impact this outage caused.
Update 19:40: This afternoon CenturyLink / Level3 experienced a global network disruption affecting clients throughout the world. Initially we removed CenturyLink / Level3 from our blended network till they stabilized. Unfortunately, CenturyLink's issues had poisoned the routing pool for many ISP's so some clients were still having issues connecting through their upstream providers. This is a CenturyLink outage which is affecting a vast portion of the Internet.
Currently CenturyLink claims the issue is resolved and thus far our testing shows things resuming normal operations. You can follow live updates from CenturyLink here: https://twitter.com/CenturyLink
|6 Aug 2020|
Thu 1:30 PM
| ||[Resolved] UK Networking issues|
We are aware of and currently are investigating the issues with the network affecting the Knopfler and Richards servers.
Update: Portions of the network are becoming available, we are continuing to investigate this and mitigate where possible.
Update: We investigated the issue to find an unprecedented level of traffic hitting the network and established the destination of this attack. The destination has now been null-routed, all traffic for this IP will be dropped and traffic has now returned to normal levels.
|4 May 2020|
Mon 9:55 PM
| ||[Resolved] Beach server high load|
We are rebooting Beach server for maintenance. It will be online shortly.
|14 Apr 2020|
Tue 9:30 AM
| ||[Resolved] Incoming email delay for Richards and Knopfler|
Due to an issue with the spam filters on our email cluster overnight, incoming mail is currently delayed on Richards and Knopfler. We are still working on the issue, and trying to get the backlog through as quickly as possible.
Update 11:30: The backlog is currently decreasing as mail is being delivered to inboxes.
Update 12:05: Work on clearing the backlog is still in progress. New mail should be coming through more reliably, but may still be delayed slightly due to the volume of mail currently being processed.
Update 17:40: The backlog is almost entirely clear now, and service should be back to normal shortly.
|12 Mar 2020|
Thu 3:02 PM
| ||[Resolved] Cedar server offline|
A network issue has caused the Cedar server to go offline.
Our team is aware of the situation and is actively investigating the matter to bring about a resolution as quickly as possible. It seems like a DDOS attack on a server at the data centre.
W2-S Internet Services wishes to thank you for your patience in this matter while it is being resolved.
Update: Data centre staff are still working on the network issue. We regret any inconvenience this ongoing issue may cause.
Update 19:05: Cedar is back online
|7 Oct 2018|
Sun 9:30 PM
| ||[Resolved] Intermittent UK network connectivity issues|
Customers on our Knopfler and Richards servers may be noticing some intermittent network connectivity issues from some locations right now causing problems accessing websites or email, due to a very large denial of service attack directed at our upstream provider in this location. We are currently working with our provider on mitigating this and will update further once this is resolved - sorry for any inconvenience caused.
|4 Oct 2018|
Thu 1:20 PM
| ||[Resolved] RHIS servers network issue|
We are aware of an issue with the RHIS servers reporting a "503 Service Unavailable" error or "Connection Refused" error. The connectivity issues is caused by a fault in networking services and our networking team is currently working on the problem to resolve it and restore connectivity to our services.
We would like to apologise for any inconvenience caused.
|5 Sep 2018|
Wed 12:05 PM
| ||[Resolved] RHIS servers offline|
We are aware of an issue with the RHIS servers reporting a "503 Service Unavailable" error and hope to get them back online very soon.
W2-S Internet Services wishes to thank you for your patience in this matter while it is being resolved.
|27 Jan 2018|
Sat 4:30 PM
| ||[Resolved] RHIS server unresponsive|
The RHIS server is currently down. Updates to follow.
Update 17:45: The server is back online. We would like to apologise for any inconvenience caused.
|1 Dec 2017|
Fri 11:40 AM
| ||[Resolved] Network issue at UK data centre|
The Knopfler and Richards servers are currently having connectivity issues. Updates to follow.
Update 11:50: This issue is now resolved. We would like to apologise for any inconvenience caused.
|21 Dec 2015|
| ||Important Security Note for Joomla users|
The team at Joomla has released a new version of their software to address a critical vulnerability in versions 1.5 to 3.4. If you have Joomla installed on your hosting account you need to update Joomla as soon as possible to protect your site and the server.
You can read more about this vulnerability at the following URLs:
|24 Jul 2014|
Thu 11:00 AM
| ||WordPress Malware|
Please be aware, we have seen a recent increase in the following attack, detailed at http://blog.sucuri.net/2014/07/malware-infection-breaking-wordpress-sites.html
Please ensure all plugins, themes and core installations of Wordpress are up to date.
For anyone using WordPress who has been a victim of hackers - this plugin could help with the cleanup: http://blog.sucuri.net/2013/10/cleaning-up-your-wordpress-site-with-the-free-sucuri-plugin.html
Please note, we don't offer any support for it, and we haven't extensively tested it. Use it at your own risk.
Update: Sucuri have posted some information regarding what could have possibly caused this.
To clarify, it's not possible for an account on the same server on our systems to compromise another account, unless it's all hosted under the same cPanel username (example, addon domains, subdomains, etc).
This is however a plugin to consider updating immediately.
|14 Apr 2014|
Mon 10:00 AM
| ||Heartbleed Bug Security Threat|
As has been widely reported in the media, a vulnerability was discovered last week in OpenSSL (Version 1.01 and beta 1.0.2), the software that is used for encryption across much of the Internet.
We want to reassure you that the majority of the servers we use where not affected by this issue as they did not use the version of the technology that was affected. The server that was affected was patched last week.
While we have no indication the vulnerability was taken advantage of, we always encourage regular password changes.
|10 Jul 2013|
| ||WordPress Exploit - Please check your sites|
If you have WordPress installed on your website, please go check you are running the latest version of WordPress (currently version 3.5.2). It is important that you do this RIGHT NOW.
There is an attack taking place and it is affecting a LOT of WordPress installations across multiple servers because people have not been keeping their WordPress installations up to date.
If you find your site has already been hacked please contact support.
|12 Apr 2013|
| ||WordPress/Joomla Admin Access|
We are seeing increased traffic to a large number of WordPress sites on our shared hosting platform. The attack is not unique to ourselves and is affecting many hosting providers worldwide. When accessing your WordPress Admin Area you may find that you are prompted for a username and password not previously required. The credentials for this login are:
As soon as normal service is resumed, this prompt will be removed and the above credentials will no longer be required. We appreciate your patience during this time, and we will update this page once this has been resolved.
In addition it is recommended that you make sure you have a very secure password using letters, numbers, upper and lower case letters, and special characters such as )@!, etc. It is also recommend to NOT have a username of "admin."
More info from this TechCrunch article
Update: We are currently seeing further attempts from a large scale botnet targeting Joomla/Wordpress Administration areas. This attack has recently increased its hit rate and we have taken action to protect the targeted areas from these attacks. As a result of this you may now find you are prompted to pass a CAPTCHA check when attempting to login to your Wordpress / Joomla website.
|26 Aug 2011|
| ||Domain Renewal Group letters|
The Domain Renewal Group (and various similar companies such as Domain Registry of America) have been sending out a lot of letters recently to our clients with .com, .net and .org domains. Their "courtesy" letters are made to look like renewal invoices or bills but are actually forms for transferring the domains away from your current supplier. Our clients are free to move their domains away from us at any time but you should be aware that the renewal fees charged by these companies are usually much higher than what we would charge so we wouldn't recommend it. You also have to question their unethical methods to have you transfer your domain to them.
If you bought your domain through W2-S Internet Services then you can safely bin these domain notices. Just google "Domain Renewal Group" if you want to see what other people think of these letters. If in doubt please contact us.
|11 Feb 2011|
| ||Fake mails alert|
We're seeing an increase in fake mails again from criminals trying to steal your web hosting passwords. These emails should be ignored and deleted.
Subject: Your your-domain.com account information has changed
New secret questions were added to your your-domain.com account.
To ensure that your account information remains accurate and secure we notify you whenever this information changes.
This change request was made on [a random date]
If the changes described above are accurate, no further action is needed. If anything doesn't look right, follow the link below to make changes:
[link to a fake site requesting your login details]
your-domain.com Account Services
All genuine emails sent by W2-S Internet Services come from w2s.net and usually refer to you personally by name and will have the proper contact details in the email's signature. Keep your login details secure.
|13 Jan 2010|
| ||Spoof "mailing service" emails alert|
Please be aware that recently there has been a sharp increase in fake emails suggesting that your "mailing service" has had a security upgrade. These emails then usually ask the user to click on a link to apply the new settings. The link itself is spoofed to look like it is from your own domain (or ours), usually in the form of http://firstname.lastname@example.org, but is actually linking to an externally compromised host that we have no control over. The emails usually end along the lines of "Best regards, your-domain.com Technical Support," where your-domain.com is your actual domain.
Please note these emails are fake and designed to trick the user into logging on to a phishing site or compromise your computer. Please delete these emails and DO NOT click on the link or submit any login information to a 3rd party. If you think you have submitted your login details via one of these emails please change your email and FTP passwords as soon as possible via your site's control panel and contact us.
All genuine emails sent by W2-S Internet Services come from w2s.net and usually refer to you personally by name and will have the proper contact details in the email's signature.