Wednesday, April 30, 2025
HomeCyber Security NewsGlobal Zoom Outage Linked to Server Block by GoDaddy Registry

Global Zoom Outage Linked to Server Block by GoDaddy Registry

Published on

SIEM as a Service

Follow Us on Google News

Millions of users worldwide experienced a sudden disruption of Zoom services on April 16, as the popular video conferencing platform suffered a global outage traced back to a server block imposed by GoDaddy Registry.

The incident, which rendered the core zoom.us domain unavailable for nearly two hours, has raised urgent questions about the underlying robustness of critical internet infrastructure and domain management processes.

The outage hit at approximately 11:25 AM PDT, with users across the United States and international regions reporting an inability to access Zoom’s website, schedule or start meetings and use several online services.

- Advertisement - Google News

Though ongoing phone calls and meetings were not interrupted for users already connected, any new attempts to join or initiate sessions failed, as DNS lookups for the domain could not be completed.

The service disruption was fully resolved by 1:12 PM PDT the same day.

However, domain name system (DNS) propagation delays meant some users experienced continued access issues even after the initial fix, prompting Zoom to advise customers to flush their DNS cache manually.

Root Cause Revealed

Zoom’s technical investigation, conducted with its domain registrar Markmonitor and GoDaddy Registry, uncovered that the outage was the result of a server block mistakenly placed on the zoom.us domain by GoDaddy Registry.

The block was caused by a communication error between Markmonitor and GoDaddy, not a cyberattack or a failure within Zoom’s infrastructure.

“There was no security breach, product failure, or DDoS attack involved,” Zoom clarified in its incident report. “A miscommunication led to GoDaddy Registry erroneously disabling our domain.”

Upon identification, teams from Zoom, Markmonitor, and GoDaddy worked swiftly to lift the server block and restore service.

Given the hierarchical nature of DNS and the caching mechanisms involved, service restoration took several minutes to propagate across the global internet.

For users facing continued access difficulties, Zoom provided step-by-step instructions to flush local DNS caches on both Windows and Mac systems.

Zoom stressed the seriousness of the incident and outlined steps to prevent recurrence.

Working with both GoDaddy Registry and Markmonitor, the company has introduced stricter registry lock protocols, which now prevent unauthorized server block commands on the zoom.us domain.

“We apologize for the impact on our customers. Our goal is to ensure such an incident cannot happen again,” said a Zoom spokesperson.

The company pledged continued vigilance and collaboration with domain management partners to bolster the resilience and reliability of its global services.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Docker Registry Vulnerability Lets macOS Users Access Any Registry Without Authorization

A recently discovered vulnerability in Docker Desktop for macOS is raising concerns in the developer and...

PowerDNS DNSdist Vulnerability Let Attackers Trigger Denial-of-Service

PowerDNS has issued an urgent security advisory for its DNSdist software, warning users of...

WhatsApp Unveils New AI Features While Ensuring Full Message Secrecy

WhatsApp, the world’s most popular messaging platform, has announced a major expansion of artificial...

Wormable AirPlay Zero-Click RCE Flaw Allows Remote Device Hijack via Wi-Fi

A major set of vulnerabilities-collectively named “AirBorne”-in Apple’s AirPlay protocol and SDK have been...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Docker Registry Vulnerability Lets macOS Users Access Any Registry Without Authorization

A recently discovered vulnerability in Docker Desktop for macOS is raising concerns in the developer and...

PowerDNS DNSdist Vulnerability Let Attackers Trigger Denial-of-Service

PowerDNS has issued an urgent security advisory for its DNSdist software, warning users of...

WhatsApp Unveils New AI Features While Ensuring Full Message Secrecy

WhatsApp, the world’s most popular messaging platform, has announced a major expansion of artificial...