Sunday, February 5, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > GoDaddy confirmed data breach involving SSH access on hosting accounts

GoDaddy confirmed data breach involving SSH access on hosting accounts

GoDaddy, one of the world’s largest website hosting providers, reported that an attacker gained access to users’ SSH accounts, potentially affecting its 28,000 customers.


Seda Nur Cinar Seda Nur Cinar
May 6, 2020
2 min read
GoDaddy confirmed data breach involving SSH access on hosting accounts

Web hosting provider and domain registrar GoDaddy discovered a security incident that affects approximately 28,000 GoDaddy hosting accounts. It is unclear which of GoDaddy’s hosting packages were affected by this breach and the reason for the breach. GoDaddy reset the user’s hosting account login information to prevent unauthorized access.

GoDaddy discovered the breach 7 months later

Due to the Submitted Breach Notification to California Attorney General’s office, GoDaddy revealed that the suspicious activity occurred on some of its servers on October 19, 2019. An unauthorized individual had gained access to the login credentials of customers and had used SSH (Secure Shell) to connect to their hosting accounts.

SSH, a network protocol, offers a secure way to access a computer over an unsecured network by providing strong password authentication and public key authentication. In other words, SSH protocol is a method for secure remote login from one computer to another. This network protocol which is widely used by network administrators provides security for managing systems and applications remotely. Network administrators can log managing systems and applications into another computer over a network, execute commands and move files from one computer to another.

GoDaddy has 77 million domain registrations. The company officials apologized to an undisclosed number of its users in an email:

“On April 23, 2020, we identified SSH usernames and passwords had been compromised by an unauthorized individual in our hosting environment. This affected approximately 28,000 customers. We immediately reset these usernames and passwords, removed an authorized SSH file from our platform, and have no indication the individual used our customers’ credentials or modified any customer hosting accounts. The individual did not have access to customers’ main GoDaddy accounts.”

GoDaddy shared that there was no evidence that any files were ‘added or modified’ on user accounts. Additionally, GoDaddy said that the incident was limited only to customers’ hosting accounts.

The web hosting provider and domain registrar provides a full year of Website Security Deluxe and Express Malware Removal free of charge to its affected customers. According to the company, with this service, if a problem arises, there is a special way to contact our security team and they will be there to help.

Recommendations against cyberattacks

Wordfence Threat Intelligence team recommends GoDaddy’s affected users to check the email header, to look for any typos or misspellings in the email content itself. The team also warns the users about modified verbiage to scare and force them to provide personal information. Moreover, creating a strong password and using two-step verification are the other ways to protect your GoDaddy account.

See more Cybersecurity News


Tags: Cyber AttackData BreachGoDaddyHacking
Seda Nur Cinar

Seda Nur Cinar

Seda Nur Cinar is the news editor of the Cloud7 News. With more than 8 years of Linux and cloud experience, Seda is a Linux and opensource enthusiast, security researcher and a web application developer.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Stable Clonezilla live 2.6.6-15 released

Clonezilla live 2.6.6-15 released

Related News

LockBit encryptor source code is updated

LockBit encryptor source code is updated

February 3, 2023 4:40 pm
Fortinet is expanding its SOC offerings portfolio

Fortinet is expanding its SOC offerings portfolio

February 3, 2023 2:00 pm
Radware announces a new partner program

Radware announces a new partner program

February 3, 2023 1:30 pm
APTs are looking for developers to hire with hefty paychecks

APTs are looking for developers to hire with hefty paychecks

February 1, 2023 2:30 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Editor's Choice

What’s new in Linux kernel 6.2 rc6?

10 Best Web Hosting Services of 2023

Ubuntu 22.04 LTS is available for download. What is new?

CERN and Fermilab recommend AlmaLinux

7 best hosting control panels of 2023

How to update Linux Kernel without rebooting?

7 best Linux mail servers of 2023

7 best cPanel alternatives for 2023

7 best Linux web browsers for 2023

7 best CentOS alternatives

7 best Linux server distros of 2023

Interview with Igor Seletskiy on AlmaLinux

How to create a VM on VMware Workstation

Recent News

  • Weekly round-up: 30 January – 3 February
  • What is Deep Learning?
  • What is GitHub Copilot?
  • Cloud7 Expert Series: Dennis Kittrell from CloudLinux
  • Best Ubuntu alternatives for desktop of 2023

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.