Saturday, September 7, 2024
Homecyber securityGoDaddy Hack - Attackers Gained SSH Access to Customer Hosting Accounts

GoDaddy Hack – Attackers Gained SSH Access to Customer Hosting Accounts

Published on

GoDaddy, the world’s largest domain registrar and hosting provider announced a data breach that impacts web hosting account credentials.

The company notified unauthorized party access to their web hosting account credentials used to connect via SSH.

GoDaddy Hack

Godaddy found that the incident took place on October 19, 2019, was discovered on April 23, 2020, by GoDaddy security who found an SSH file altered in the hosting environment.

- Advertisement - EHA

“We recently identified suspicious activity on a subset of our servers and immediately began an investigation,” the company said in a data-breach notice filed with the California Attorney General, obtained by media.

The company notified to the customers in an email signed by GoDaddy CISO and vice-president of engineering, Demetrius Comes, revealed that the security incident in question came to light after suspicious activity identified.

The email notification revealed an “an unauthorized individual had access to your login information used to connect to SSH on your hosting account.”

Godaddy confirmed that breach affects only the hosting accounts and not the customer accounts with godaddy.com, so that customer accounts not affected.

We have no evidence that any files were added or modified on your account. The unauthorized individual has been blocked from our systems, and we continue to investigate potential impact across our environment, reads GoDaddy Email statement.

The company reset all the hosting account login information to prevent the unauthorized access, also GoDaddy said they are to offer free security services for one year.

we apologize for any inconvenience this may have caused. We have already taken and will continue to take measures to enhance our security in light of this incident.

Recently a spear-phishing attack against GoDaddy customer service employee let attacker gains access to view and modify key customer records, access that was used to change domain settings for a half-dozen GoDaddy customer.

Read More

World’s Largest Web Hoster GoDaddy Exposed Massive Amount Of Sensitive Data Online

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

BBTok Abuses Legitimate Windows Utility Command Tool to Stay Undetected

Cybercriminals in Latin America have increased their use of phishing scams targeting business transactions...

Predator Spyware Exploiting “one-click” & “zero-click” Flaws

Recent research indicates that the Predator spyware, once thought to be inactive due to...

Tropic Trooper Attacks Government Organizations to Steal Sensitive Data

Tropic Trooper (aka KeyBoy, Pirate Panda, and APT23) is a sophisticated cyberespionage APT group,...

NoiseAttack is a Novel Backdoor That Uses Power Spectral Density For Evasion

NoiseAttack is a new method of secretly attacking deep learning models. It uses triggers...

Free Webinar

Decoding Compliance | What CISOs Need to Know

Non-compliance can result in substantial financial penalties, with average fines reaching up to $4.5 million for GDPR breaches alone.

Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted role of compliance in securing modern enterprises.

Discussion points

The Role of Compliance
The Alphabet Soup of Compliance
Compliance
SaaS and Compliance
Indusface's Approach to Compliance

More like this

BBTok Abuses Legitimate Windows Utility Command Tool to Stay Undetected

Cybercriminals in Latin America have increased their use of phishing scams targeting business transactions...

Predator Spyware Exploiting “one-click” & “zero-click” Flaws

Recent research indicates that the Predator spyware, once thought to be inactive due to...

Tropic Trooper Attacks Government Organizations to Steal Sensitive Data

Tropic Trooper (aka KeyBoy, Pirate Panda, and APT23) is a sophisticated cyberespionage APT group,...