Tuesday, April 22, 2025
Homecyber securityGoDaddy Hack - Attackers Gained SSH Access to Customer Hosting Accounts

GoDaddy Hack – Attackers Gained SSH Access to Customer Hosting Accounts

Published on

SIEM as a Service

Follow Us on Google News

GoDaddy, the world’s largest domain registrar and hosting provider announced a data breach that impacts web hosting account credentials.

The company notified unauthorized party access to their web hosting account credentials used to connect via SSH.

GoDaddy Hack

Godaddy found that the incident took place on October 19, 2019, was discovered on April 23, 2020, by GoDaddy security who found an SSH file altered in the hosting environment.

- Advertisement - Google News

“We recently identified suspicious activity on a subset of our servers and immediately began an investigation,” the company said in a data-breach notice filed with the California Attorney General, obtained by media.

The company notified to the customers in an email signed by GoDaddy CISO and vice-president of engineering, Demetrius Comes, revealed that the security incident in question came to light after suspicious activity identified.

The email notification revealed an “an unauthorized individual had access to your login information used to connect to SSH on your hosting account.”

Godaddy confirmed that breach affects only the hosting accounts and not the customer accounts with godaddy.com, so that customer accounts not affected.

We have no evidence that any files were added or modified on your account. The unauthorized individual has been blocked from our systems, and we continue to investigate potential impact across our environment, reads GoDaddy Email statement.

The company reset all the hosting account login information to prevent the unauthorized access, also GoDaddy said they are to offer free security services for one year.

we apologize for any inconvenience this may have caused. We have already taken and will continue to take measures to enhance our security in light of this incident.

Recently a spear-phishing attack against GoDaddy customer service employee let attacker gains access to view and modify key customer records, access that was used to change domain settings for a half-dozen GoDaddy customer.

Read More

World’s Largest Web Hoster GoDaddy Exposed Massive Amount Of Sensitive Data Online

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Faster Vulnerability Patching Reduces Risk and Lowers Cyber Risk Index

Trend Micro's Cyber Risk Exposure Management (CREM) solution has highlighted the critical role that...

Malicious npm Packages Target Linux Developers with SSH Backdoor Attacks

In a sophisticated onslaught targeting the open-source ecosystem, reports have emerged detailing several malicious...

Samsung One UI Vulnerability Leaks Sensitive Data in Plain Text With No Expiration!

A glaring vulnerability has come to light within Samsung's One UI interface: the clipboard...

New Rust-Based Botnet Hijacks Routers to Inject Remote Commands

A new malware named "RustoBot" has been discovered exploiting vulnerabilities in various router models...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Faster Vulnerability Patching Reduces Risk and Lowers Cyber Risk Index

Trend Micro's Cyber Risk Exposure Management (CREM) solution has highlighted the critical role that...

Malicious npm Packages Target Linux Developers with SSH Backdoor Attacks

In a sophisticated onslaught targeting the open-source ecosystem, reports have emerged detailing several malicious...

New Rust-Based Botnet Hijacks Routers to Inject Remote Commands

A new malware named "RustoBot" has been discovered exploiting vulnerabilities in various router models...