Frequently used guides and links
Other guides can be found in the Service menu.
SRAS | AMI | ScombZ(System fault information / News) | Online Classes |
first |
For students | For teachers |
For staff |
Site map |
Other guides can be found in the Service menu.
SRAS | AMI | ScombZ(System fault information / News) | Online Classes |
first |
For students | For teachers |
For staff |
Site map |
2025年度学術情報センター学生スタッフを募集します。
詳細は以下をご覧ください。
2024年12月20日(金) 夕方頃より、学外から本学へのメール配送および各種サービスについて、サーバトラブルのため障害が発生しております。
障害状況: 2024/12/20(金) 夕方頃より、20214/12/23(月) 午前中頃まで、学外から本学宛のメールの配送遅延、未着、送信元への未配送メールが発生しています。
原因: 海外より大量のスパム・フィッシングメールが送られてきたことにより、本学メールサーバーの処理能力を超えたため、メールサーバーが一杯となり、新規メールの受取拒否や配送遅延が発生しています。
2024/12/23 午前中より、徐々に解消をしてきており新規に送信されたメールにつきましては、概ね受信できるようになっておりますが、障害の期間に送信された一部のメールにつきましては、届かない場合、送信者にエラーメールが送信場合、遅れて届く場合がございます。
ご利用の皆様におかれましては、本来届くメールが届いていない可能性があることにご留意願います。
(2024/12/25 17:00更新)
現時点で障害の発生していたメールサーバ上から復旧できるメールにつきましては、配送済みとなっております。本来届く予定のメールが届いていない場合は、送信元にお問い合わせください。
ご迷惑をおかけして申し訳ございません。
本件に関しての問い合わせは、以下までお願いいたします。
教員:goiken@sic.shibaura-it.ac.jp
学生:oshiete@sic.shibaura-it.ac.jp
12月20日(金)より、サーバに障害が発生しており、メールの配送に大幅な遅延が発生しております。
サーバ自体の復旧はしておりますが、本日からのメールが順次配送されていくため、しばらくメール配送に遅れが出る見込みです。
皆さまにはご迷惑をおかけして申し訳ございません。
本件に関しての問い合わせは、以下までお願いします。
教員:goiken@sic.shibaura-it.ac.jp
学生:oshiete@sic.shibaura-it.ac.jp
12月8日(日)より、サーバに障害が発生しており、メールの配送に大幅な遅延が発生しております。
サーバ自体の復旧はしておりますが、日曜日からのメールが順次配送されていくため、しばらくメール配送に遅れが出る見込みです。
皆さまにはご迷惑をおかけして申し訳ございません。
本件に関しての問い合わせは、以下までお願いします。
教員:goiken@sic.shibaura-it.ac.jp
学生:oshiete@sic.shibaura-it.ac.jp
学祭期間中のPC教室は大宮・豊洲共に以下の通りです。
芝浦祭準備日: 10月31日(木)~11月1日(金) 通常開室
芝浦祭当日: 11月2日(土)~11月4日(月) 閉室
芝浦祭片付日: 11月5日(火)~11月6日(水) 通常開室
ScombZを介してExamena(外部サイト)が利用できるようになりました。
具体的な利用方法は、
以下にあります、「テストを作る」内にあります、Examenaのリンクをクリックください。
以下日時において、ScombZのメンテナンスを行います。
11月18日(月) 20時~21時 20:20 完了 (2024/11/18 20:20 更新)
メンテナンス中は接続不良が発生します。
ログインはお控えください。
ご不便をおかけして大変申し訳ございませんが、
ご協力の程何卒よろしくお願いいたします。
本日、以下の時間でメンテナンスを行うため、
ScombZをご利用いただけません。
11月6日(水) 10時~13時
ご迷惑をおかけしますが、ご協力のほど何卒よろしくお願いいたします。
以下日時において、ScombZのメンテナンスを行います。
2024年6月13日(木) 20時~21時
メンテナンス中は接続不良が発生します。
ログインはお控えください。
ご不便をおかけして大変申し訳ございませんが、
ご協力の程何卒よろしくお願いいたします。
2024年4月27日現在、
通知メールに記載してるScombZに遷移するURLにアクセスすると、
システムエラーになるという障害が発生しております。
本件に関しましては、即時の対応が難しく、修正が4月30日頃になる見込みです。
続報あれば、こちらに追記いたします。
検索サイトから本学に関連するキーワードを検索すると、本学を騙る偽サイトが検索結果に表示されることを確認いたしました。
本件に限らず、最近検索結果に偽サイトが表示されることが散見されます。
偽サイトの中にはアクセスをするとWebブラウザに感染するものや、マルウエアがダウンロードされるものも存在しますので、常に検索結果に不審なものが含まれていないか確認することを心掛けてください。
また、偽サイトを発見した場合は、SIT-CSIRTまでご報告いただけます様お願いいたします。
SIT-CSIRT
csirt@shibaura-it.ac.jp
We have confirmed that a fake website impersonating our university appears in the search results when you search for keywords related to our university through search engines.
Not only in this case, but also in other recent cases, fake sites have been appearing in search results.
Some of the fake sites may infect web browsers or download malware when accessed, so please be sure to always check your search results for suspicious items.
If you find a fake site, please report it to SIT-CSIRT.
SIT-CSIRT
csirt@shibaura-it.ac.jp
Example of search results
Examples of Fake Sites
Dear students, faculty and staff
This is a notice from the Information Systems Division.
There has been an increase in the number of phishing e-mails sent to you by people trying to defraud you of your account information for commercial Internet services or for the University.
Some of these emails may slip through our email security system and be delivered to you.
Users have reported receiving suspicious e-mails.
If you receive a suspicious e-mail, be careful not to access the URL in the body of the message.
Do not open any attached files.
The sender (From:) is often spoofed and may be the sender's own email address or the administrator's email address (e.g., admin@~).
An example of a subject line: sic.shibaura-it
sic.shibaura-it.ac.jp New Webmail service is now available
mail delivery failure: storage is almost full
ow.shibaura-it.ac.jp mail service update Case ID: ?????
You have [13] pending incoming emails
SYSTEM NOTIFICATION ~ Your 8 unreceived emails are stuck on the sic.shibaura-it.ac.jp Server.
Your ow.shibaura-it.ac.jp Account will be disabled soonest.
Your Outlook storage is full
Verify User
Mail Notice: De-activation
Account Termination
Email Termintaion Request
Undeliverable: Incoming messages failure
Check Password
Email Verification ~ VERIFY YOUR EMAIL ACCOUNT TODAY
~Unknown Login Notification
Password Expiration Notice!
~ Email Notification
Required Action: Email Deactivation Notification for
Required Action: Important Notification for Tuesday, June 27, 2023
Required Action: Important Notification for Monday, June 26, 2023
Required Action: Important Notification for Sunday, June 25, 2023
You have received a new voicemail memo.
Error receiving mail
Notification: Mailbox size has reached quota limit
Sic mailbox size has reached quota limit
Mailbox storage space is low
~ Received Mail Error
Mailbox storage is full, account is suspended
If you receive a suspicious email, please contact SIT-CSIRT.
SIT-CSIRT (Shibaura Institute of Technology Computer Security Incident Response Team)
Email: csirt@shibaura-it.ac.jp
Translated with www.DeepL.com/Translator (free version)
Emotet is malware that is often infected by opening Word files attached to emails.
It was seized and stopped by EUROPOL (European Organization of the Criminal Police) on 1/27/2021, but there are signs of resumption of activity since around 11/14/2021.
The attached files are not only Word and Excel files, but also zip files with passwords.
Emotet malware, which was popular in Japan from the end of August 2019 to January 2020, seems to have temporarily resumed its activities in Japan since July 2020. Please be aware that activities may become more active in the future.
When infected with Emotet, not only is the e-mail information of Outlook (authentication information to the e-mail server, e-mail address of the inbox, subject etc.) stolen, but also other malware (Qbot, TrickBot, Ryuk ransomware, Ursnif banking malware etc.) ) May cause additional infections.
The stolen email information may be used to scatter emails to spread infection.
Please note that there are various subject lines for emails, and some may take the form of replies to stolen emails.
If you receive such an email, please do not open it and contact the Center for Science Information.
If you open it and activate the content, immediately disconnect from the network.
Please check if the antivirus software on your device is working properly.
【Attention】
For the emails scattered,there are those that take the form of replying by quoting stolen mail in the body (reply type), and those that embed the stolen name/email address etc. in the subject and signature of the body.
Please be careful.
It has been confirmed that there is no attached file and a link is written in the email body.
Please be careful not to access the link destination as the Word file etc. of the Emotet downloader will be downloaded when you click the link.
!!!Do not run macros in Word files with macros (do not press enable content)!!!
【Information about Emotet】
Sender
(People who have exchanged in the past)
Example of subject
Request to send invoice (number etc.)
This is the invoice. (Numbers, etc.)
Re: (Subject of previously received email)
Example of attachment file name
(Alphabet and numbers) Please send invoice. doc
(Alphabet or number) This is the invoice. .doc
(Alphabets and numbers) Notification of payment amount and issuance of invoice.doc
Dear Faculty and Staff
This is a notice from the Information Network Service Section.
During the year-end and New Year holidays, security incidents are more likely to occur due to the lack of system management.
As the volume of e-mails checked will increase, please be especially careful of suspicious e-mails after the holidays,
In recent years, A number of cyber-attacks confirmed by fake e-mails sent to Japanese academics, think tank researchers, and the press, pretending to be requests for lectures or interviews, etc., and leading to be compromised by executing malware, then attempt to steal the contents of emails and computer files exchanged by these individuals.
For details, please refer to the information provided by the National Police Agency's Cybercrime Countermeasures Project.
( https://www.npa.go.jp/cyber/ )
Our university introduced an e-mail targeted attack countermeasure system for full-time faculty and administrative staff.
Suspicious e-mails are automatically quarantined and a notification e-mail is sent at 15:00 daily,
so please make sure to check the contents.
https://web.sic.shibaura-it.a
If you receive a suspicious email, please contact SIT-CSIRT.
SIT-CSIRT (Shibaura Institute of Technology Computer Security Incident Response Team)
Email: csirt@shibaura-it.ac.jp
Dear Students, Faculty and Staff
Warning from the Information Network Service Division
We have received many reports of suspicious Emotet malware email from several people today.
We announced this on November 25 last year, but we would like to ask you to check again.
Please also check the security information on the Center for Science Information website.
1. Warning against phishing e-mails
Recently, there have been many cases of phishing e-mails aimed at fraudulently obtaining account information for webmail services.
We have also received reports of suspicious emails from users of our university.
If you receive a suspicious email, please be careful not to access the URL in the text.
If you receive a suspicious e-mail, please do not access the URL in the text, and do not open any attachments.
Please check the security information on the Center For Science Information website.
Example of subject line:
メールプラン、セキュリティ強化第2弾リリースのお知らせ
【重要】2021年XX月XX日(X)のサービス復旧のお知らせ。
【重要】使用制限によるサービス停止のお知らせ- {メールアドレス}
【重要】サービス停止のお知らせ - {メールアドレス}
【お知らせ】メール配信通知 - {メールアドレス}
[メール接続サービスの終了について_shibaura-it.ac.jp] - {メールアドレス}
[からの通知_Shibaura-it]_{メールアドレス}
【バージョンアップ】メンテナンス作業のお知らせ
【重要】sic.shibaura-it.ac.jp メール送信機能停止のお知らせ
If you receive a suspicious email, please contact SIT-CSIRT.
SIT-CSIRT (Shibaura Institute of Technology Computer Security Incident Response Team)
Email: csirt@shibaura-it.ac.jp
2. Warning about Emotet malware email
The Emotet malware was seized and stopped by EUROPOL (European Criminal Police Organization) on January 27, 2021.
However, it has tended to resume its activities since around November 14, 2021.
It seems that emails targeting Japan are also being sent.
For more information about the Emotet malware, please check the security information on the Center For Science Information website.
If you receive a suspicious email, please contact SIT-CSIRT.
SIT-CSIRT (Shibaura Institute of Technology Computer Security Incident Response Team)
Email: csirt@shibaura-it.ac.jp 3.
3. Warning about attacks on the CMS of web servers
If you are running a web server in your laboratory and using CMS (WordPress, Movable Type, etc.)
Please check for suspicious access.
In Japan, there have been cases of illegal content being embedded, phishing e-mails being sent out in large numbers, and unauthorized server intrusions.
Please take measures such as managing passwords for the web servers you use, updating vulnerable software, and stopping unnecessary services.
If you find any suspicious access, please contact SIT-CSIRT.
SIT-CSIRT (Shibaura Institute of Technology Computer Security Incident Response Team)
Email: csirt@shibaura-it.ac.jp