All systems are operational

Past Incidents

Friday 24th December 2021

[SEWAN] General information 24.12.2021, scheduled 3 years ago

 

Beginning: 24.12.2021 – 12.30 AM

Ending: 24.12.2021 – 5.00 PM

Impact: Customer Care closed

 

Dear customer, dear partner,

 

Please note that our office will exceptionally be closed on 24th of December 2021 at 12.30 AM

We will be pleased to welcome your calls again as from 27.12.2021 at 9.00 AM.

 

Best wishes for 2022 !!

SEWAN Team

Wednesday 22nd December 2021

No incidents reported

Tuesday 21st December 2021

No incidents reported

Monday 20th December 2021

No incidents reported

Sunday 19th December 2021

No incidents reported

Saturday 18th December 2021

No incidents reported

Friday 17th December 2021

[SEWAN] Technical maintenance - 17.12.2021, scheduled 3 years ago

 

Beginning: 17.12.2021 – 1.00 AM

Ending: 17.12.2021 – 4.00 AM

Internal ref: DTCAB-2437

Impact: 10 minutes downtime on xDSL and FTTH lines

 

Dear customer, dear partner,

 

In order to keep increasing our Internet physical redundancy, please note that our technical team will perform maintenances on 17.12.2021 from 1.00 AM to 4.00 AM on our xDSL and FTTH infrastructure.

 

During this timeframe, a maximum of 10 minutes of downtime is foreseen.

 

No intervention is needed from your side.

 

Best regards;

SEWAN Technical Team

Thursday 16th December 2021

No incidents reported

Wednesday 15th December 2021

No incidents reported

Tuesday 14th December 2021

No incidents reported

Monday 13th December 2021

No incidents reported

Sunday 12th December 2021

No incidents reported

Saturday 11th December 2021

No incidents reported

Friday 10th December 2021

Mobile service [SEWAN] General information 10.12.2021

Dear customer, dear partner,

 

We would like to inform you that mobile customers are being targeted by cybercriminals.

These cybercriminals attempt to obtain access to personal data by installing a piece of malware on the End-User device.

Besides the "usual" SIMbox, FluBot malware is currently very active. It spreads via SMS through contacts on the infected phone, with the ultimate goal to steal bank details and passwords from their devices.

 

How does it work?

FluBot pulls off a rather audacious bluff by warning users that they have been infected by… FluBot. It offers to install a (fake) security update to "protect" the user from FluBot. The malware goes so far as to explain how to disable the phone's security to install the fake update.

As from the moment the fake security update is installed, the malware actually infects the device.

 

In case you experience such practice, please immediately report to our support team.

 

SEWAN Technical Team

Thursday 9th December 2021

No incidents reported

Wednesday 8th December 2021

No incidents reported