Jump to content
David H. Lipman

GoDaddy Confirms Data Breach - 28,000 Customers Affected

Recommended Posts

GoDaddy Confirms Data Breach - 28,000 Customers Affected

"GoDaddy, one of the world’s largest domain registrar and a web hosting company that provides services to roughly 19 million customers around the world, has confirmed a data breach.

According to a BleepingComputer report, GoDaddy notified notified some of its customers that an unauthorized party used their web hosting account credentials to connect to their hosting account via SSH. GoDaddy claims the breach took place on October 19, 2019 and was discovered on April 23, 2020, after the company's security team discovered an altered SSH file in GoDaddy's hosting environment and suspicious activity on a subset of GoDaddy's servers.

GoDaddy's Vice President for Corporate Communications later told BleepingComputer in an official statement that roughly 28,000 customers' hosting accounts were affected in the incident: "On April 23, 2020, we identified SSH usernames and passwords had been compromised through an altered SSH file in our hosting environment. This affected approximately 28,000 customers. We immediately reset these usernames and passwords, removed the offending SSH file from our platform, and have no indication the threat actor used our customers’ credentials or modified any customer hosting accounts. To be clear, the threat actor did not have access to customers’ main GoDaddy accounts."

 

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.