GoDaddy Data Breach: 19 Million Customers’ Potentially at Risk

Data Breach reported to have exposed user accounts at hosting company, GoDaddy

GoDaddy Confirms Data Breach

GoDaddy disclosed a data breach affecting web hosting account credentials. With more than 19 million customers, 77 million domains managed, and millions of websites hosted, most everyone has heard of GoDaddy.

According to Bleeping Computer, which broke the news yesterday evening, an as yet unknown number of customers have been informed that their web hosting account credentials had been compromised.

The confirmation of the technology data breach, in an email signed by GoDaddy CISO and vice-president of engineering, Demetrius Comes, revealed that the security incident in question came to light after suspicious activity was recently identified on some GoDaddy servers.

The breach itself appears to have occurred on October 19, 2019, according to the State of California Department of Justice, with which the disclosure notification email sample was filed.

The email notification stated that, upon an investigation of the incident, it was determined that an “unauthorized individual” had gained access to login credentials that meant they could “connect to SSH” on the affected hosting accounts. SSH is an acronym for secure shell, a network protocol used by system administrators to access remote computers. SSH is, as you might imagine then, quite a useful attack vector for hackers.

If you want to dive into the technical detail, then Hackaday has an excellent article about the “terminal program that talks to a server using an encrypted connection.”

“The GoDaddy breach underlines just how important SSH security is,” Yana Blachman, a threat intelligence specialist at Venafi, said. “SSH is used to access an organisation’s most critical assets, so it’s vital that organisations stick to the highest security level of SSH access and disable basic credential authentication, and use machine identities instead,” Blachman said, “this involves implementing strong private-public key cryptography to authenticate a user and a system.”

GoDaddy email said that the breach is limited only to hosting accounts and did not involve customer accounts or the personal information stored within them. It noted that no evidence was found to suggest that any files were modified or added to the affected accounts but fell short of mentioning if files had been viewed or copied.

However, all impacted hosting account logins have been reset, and the email contained the procedure customers need to follow in order to regain access to the hosting accounts concerned. GoDaddy has also recommended, “out of an abundance of caution,” that users audit their hosting accounts.

While the attacker has been “blocked from our systems,” the email said, it also stated that GoDaddy is continuing to determine any potential impact across its environment.

Be the first to comment

Leave a Reply

Your email address will not be published.


*


This site uses Akismet to reduce spam. Learn how your comment data is processed.