Home > Cyber News > GoDaddy Hit by Another Data Breach, 1.2M Customers Exposed

GoDaddy Hit by Another Data Breach, 1.2M Customers Exposed

GoDaddy Gets Hit by Another Large-Scale Data Breach, 1.2M Customers Exposed
Another enormous cybersecurity incident has hit domain registrar GoDaddy. The large-scale data breach is the fifth “injury” the company has had since 2018. This time, 1.2 million GoDaddy customers were affected, after an unauthorized third-party successfully infiltrated its systems on September 6.

The threat actor continued to have access for nearly two and a halfmonth, before the web hosting company noticed the breach on November 17.

This is when GoDaddy “noticed suspicious activity” in their Managed WordPress hosting environment. An investigation was initiated shortly after, with the help of an IT forensics firm. Law enforcement was also contacted.

Update November 24, 2021
It turns out that GoDaddy resellers were affected by the data breach we reported yesterday, in particular 123Reg, Domain Factory, Heart Internet, Host Europe, Media Temple and tsoHost. “A small number of active and inactive Managed WordPress users at those brands were impacted by the security incident. No other brands are impacted. Those brands have already contacted their respective customers with specific detail and recommended action,” said Dan Rice, VP of Corporate Communications at GoDaddy.

How did the GoDaddy data breach happen?

The unknown threat actor used a compromised password to gain a foothold in the provisioning system in the company’s legacy code base for Managed WordPress.

As a result, at least 1.2 million active and inactive Managed WordPress customers had their email address and customer number exposed, GoDaddy said in the official breach notice This puts exposed customers of a high risk of phishing attacks.

What else has been exposed?
“The original WordPress Admin password that was set at the time of provisioning was exposed. If those credentials were still in use, we reset those passwords,” the web hosting company added. sFTP and database credentials were also exposed for active customers. Both passwords had to be reset.

“For a subset of active customers, the SSL private key was exposed. We are in the process of issuing and installing new certificates for those customers,” the company added.
The investigation is still ongoing, and impacted customers are being contacted with specific details. If you are affected by the data breach, you can contact the company via their help center.

It is curious to mention that GoDaddy is one of the companies that helped create the Sunburst malware kill switch. Following the discovery of the malware and given the severity of the situation, a joint team of experts from Microsoft, GoDaddy, and FireEye devised the so-called kill switch to stop the malware from propagating further.

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree