HOTforSecurity
  • Home
  • Threats
    • Security alerts
    • Social Networks Security
    • Mobile & Gadgets Security
    • Tips and Tricks
  • Smart Home Security
  • Digital Privacy
    • Digital Identity
    • Good Practices
    • Data Breach Alerts
  • Work from Home: Safety Tips
  • The ABC of Cybersecurity
  • Security Videos
HOTforSecurity
  • Home
  • Threats
    • Security alerts
    • Social Networks Security
    • Mobile & Gadgets Security
    • Tips and Tricks
  • Smart Home Security
  • Digital Privacy
    • Digital Identity
    • Good Practices
    • Data Breach Alerts
  • Work from Home: Safety Tips
  • The ABC of Cybersecurity
  • Security Videos
HOTforSecurity
  • Home
  • Threats
    • Security alerts
    • Social Networks Security
    • Mobile & Gadgets Security
    • Tips and Tricks
  • Smart Home Security
  • Digital Privacy
    • Digital Identity
    • Good Practices
    • Data Breach Alerts
  • Work from Home: Safety Tips
  • The ABC of Cybersecurity
  • Security Videos
Alina Bizga
    Share This!
  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • ReddIt
Digital Privacy • Industry News

GoDaddy Data Breach Affects 28,000 User Accounts

9 months ago
2 Min Read

GoDaddy, the world’s largest domain registrar, has confirmed that 28,000 of its customers’ web hosting accounts were compromised following a security incident in October 2019.

Unfortunately, the web-hosting company only discovered the breach in late April and filed a breach notice with California’s Attorney General’s Office earlier this week.

Were you a victim of a data breach? Time to find out with Bitdefender’s Digital Identity Protection tool.

An “unauthorized individual had access to your login information used to connect to SSH on your hosting account,” said Demetrius Comes, the company’s CISO. “This incident is limited in scope to your hosting account. Your main GoDaddy.com customer account, and the information stored within your customer account, was not accessible by this threat actor.”

Although the breach is said to be limited to hosting accounts, excluding customer accounts and personal information, GoDaddy also reset passwords and usernames for some of their customers.The company gave no additional details of the incident, so it’s unknown how the bad actor gained access to customer login credentials. However, the cybercriminal may have managed to steal credentials or use brute force attacks to guess the password of customers.

“We have proactively reset your hosting account login information to help prevent any potential unauthorized access,” the company said. After apologizing to customers, GoDaddy pledged to provide website security and malware removal services free of charge.

“On behalf of the entire GoDaddy team, we want to say how much we appreciate your business and that we sincerely regret this incident occurred,” the company said. “We are providing you one year of Website Security Deluxe and Express Malware Removal at no cost. These services run scans on your website to identify and alert you of any potential security vulnerabilities. With this service, if a problem arises, there is a special way to contact our security team and they will be there to help.”

This is not the company’s first security incident this year. In early March, a spear-phishing campaign targeted a GoDaddy employee, leading to the threat actors gaining access to customer records. The attackers were also able to change DNS settings for some hosted websites.

For the moment, the two incidents have not been linked, and users are advised to closely monitor their accounts, making sure not to use recycled passwords.

Tagsaccount breach data breach Godaddy Godaddy.com security incident web hosting

You may also like

Alerts • Digital Privacy

How Bitdefender Protects You from Ransomware (Part 2)

35 mins ago
Industry News

Cybercriminals Impersonate UK’s National Health Service to Spread COVID-19 Vaccination Phishing Emails

17 hours ago
Digital Identity • Digital Privacy • Industry News

Hacker Releases Dating Site Data Belonging to 2+ Million Users

19 hours ago

About the author

View All Posts

Alina Bizga

Alina has been a part of the Bitdefender family for some years now, as her past role involved interfacing with end users and partners, advocating Bitdefender technologies and solutions. She is a history buff and passionate about cybersecurity and anything sci-fi. Her spare time is usually split between her two feline friends and traveling.

PrivateVPN and Betternet Apps Vulnerability Let Attackers Send Malicious Updates
Attackers Try to Deploy Remcos Malware with COVID-19-related Messages
    Share This!
  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • ReddIt

Promo

1.3m
Fans
Like
104.7k
Followers
Follow
2.7k
Subscribers
Subscribe
19
Subscribers
subscribe
1.4m
Fans Love us

Recent shouts

  • Meurig Parri on Microsoft Ends Support for Windows 7. What You Need to Know
  • Kevin on Cable Haunt vulnerability affects millions of Broadcom cable modems
  • Terry on Ransomware attack forces Arkansas CEO to fire 300 employees days before Christmas
  • Martin on 1&1 Telecom GmbH hit by almost €10 million GDPR fine over poor security at call centre
  • Xander on 1&1 Telecom GmbH hit by almost €10 million GDPR fine over poor security at call centre

Time Machine

January 2021
M T W T F S S
 123
45678910
11121314151617
18192021222324
25262728293031
« Dec    

ANTIVIRUS SOFTWARE FOR HOME USERS

Bitdefender Cybersecurity for Smart Home
Bitdefender Complete Protection
Bitdefender PC Protection
Bitdefender Antivirus for Mac
Bitdefender Mobile Security for Android
Bitdefender Product Comparison

BUSINESS SOLUTIONS

Bitdefender GravityZone Business Security
Bitdefender GravityZone Advanced Business Security
Bitdefender GravityZone Enterprise Security
Bitdefender Hypervisor Introspection

TOOLS & RESOURCES

Renewal for Business Customers
Trial Downloads
Free Antivirus
Free Online Virus Scanner
Free Virus Removal Tools
Live Remote Assistance
Free Tools
Bug Bounty
Press Center

Powered by Bitdefender - a leading cyber security technology provider | Copyright © 2008 - 2016. All rights reserved.
  • Home
  • The Team
  • Terms and Conditions
  • Contact
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok