Monday, April 28, 2025
Homecyber securityGoDaddy Hack - Attackers Gained SSH Access to Customer Hosting Accounts

GoDaddy Hack – Attackers Gained SSH Access to Customer Hosting Accounts

Published on

SIEM as a Service

Follow Us on Google News

GoDaddy, the world’s largest domain registrar and hosting provider announced a data breach that impacts web hosting account credentials.

The company notified unauthorized party access to their web hosting account credentials used to connect via SSH.

GoDaddy Hack

Godaddy found that the incident took place on October 19, 2019, was discovered on April 23, 2020, by GoDaddy security who found an SSH file altered in the hosting environment.

- Advertisement - Google News

“We recently identified suspicious activity on a subset of our servers and immediately began an investigation,” the company said in a data-breach notice filed with the California Attorney General, obtained by media.

The company notified to the customers in an email signed by GoDaddy CISO and vice-president of engineering, Demetrius Comes, revealed that the security incident in question came to light after suspicious activity identified.

The email notification revealed an “an unauthorized individual had access to your login information used to connect to SSH on your hosting account.”

Godaddy confirmed that breach affects only the hosting accounts and not the customer accounts with godaddy.com, so that customer accounts not affected.

We have no evidence that any files were added or modified on your account. The unauthorized individual has been blocked from our systems, and we continue to investigate potential impact across our environment, reads GoDaddy Email statement.

The company reset all the hosting account login information to prevent the unauthorized access, also GoDaddy said they are to offer free security services for one year.

we apologize for any inconvenience this may have caused. We have already taken and will continue to take measures to enhance our security in light of this incident.

Recently a spear-phishing attack against GoDaddy customer service employee let attacker gains access to view and modify key customer records, access that was used to change domain settings for a half-dozen GoDaddy customer.

Read More

World’s Largest Web Hoster GoDaddy Exposed Massive Amount Of Sensitive Data Online

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...

Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts

Cybersecurity researchers from The DFIR Report’s Threat Intel Group uncovered an open directory hosted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...