GoDaddy admits it fell victim to data breach in October

An unauthorised third-party gained access to login information used to connect to SSH protocol on hosting accounts

Web hosting giant GoDaddy has informed customers of a security incident involving an unauthorised third-party who may have had access to users’ login information used to connect SSH to their hosting account.

The SSH protocol, also known as Secure Shell, is a method for secure remote login from one computer to another. It provides serval alternative options for strong authentication, and protects the communications security and integrity with strong encryption.

GoDaddy reported the data breach to Californian regulators after learning that an unauthorised individual was able to access SSH accounts used in its hosting environment in October 2019.

GoDaddy said it identified suspicious activity on a subset of its servers and began investigating. This process found that an unauthorised individual had access to login information used to connect to SSH on users’ hosting accounts.

Although the investigation regarding the potential impact of the breach is ongoing, there’s so far no evidence that any files were modified on users’ accounts. Moreover, the unauthorised individual has been blocked from GoDaddy systems.

“This incident is limited in scope to your hosting account,” the firm’s Demetrius Comes wrote. “Your main GoDadd.com customer account and the information stored within your customer account was not accessible by this threat actor.” 

GoDaddy has apologised to its customers for any inconvenience this may have caused, and is offering a full year of Website Security Deluxe and Express Malware Removal at no cost.

“These services run scans on your website to identify and alert you of any potential security vulnerabilities,” Comes added. “With this service, if a problem arises, there is a special way to contact our security team and they will be there to help.”

GoDaddy is the leading web hosting provider, according to Datanyze, with a 16.6% market share and more than 1.4 million registered domains, followed by UnitedLayer and Amazon Web Services (AWS) web hosting. 

The service also encountered a security issue in January last year, regarding a vulnerability in the way it handles domain name server (DNS) change requests. According to a cyber security researcher, the flaw allowed hackers to hijack domains and create two disruptive spam email campaigns. 

Featured Resources

Consumer choice and the payment experience

A software provider's guide to getting, growing, and keeping customers

Download now

Prevent fraud and phishing attacks with DMARC

How to use domain-based message authentication, reporting, and conformance for email security

Download now

Business in the new economy landscape

How we coped with 2020 and looking ahead to a brighter 2021

Download now

How to increase cyber resilience within your organisation

Cyber resilience for dummies

Download now

Recommended

ProtectedBy.AI’s CodeLock blocks malware at source code level
software as a service (SaaS)

ProtectedBy.AI’s CodeLock blocks malware at source code level

9 Jun 2021
CISOs aren’t leading by example when it comes to cyber security
cyber security

CISOs aren’t leading by example when it comes to cyber security

24 May 2021
New report highlights the need for diversity in cyber security recruitment
cyber security

New report highlights the need for diversity in cyber security recruitment

28 Apr 2021

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

16 Jun 2021
What is HTTP error 400 and how do you fix it?
Network & Internet

What is HTTP error 400 and how do you fix it?

16 Jun 2021
EU plans to launch bloc-wide cyber task force
cyber attacks

EU plans to launch bloc-wide cyber task force

22 Jun 2021