Jump to content

GoDaddy: Hackers stole source code, installed malware in multi-year breach


MrD

Recommended Posts

  • Root Admin

GoDaddy discovered a security breach in early December 2022 following customer reports of their sites being redirected to random domains. Investigation revealed that attackers had access to the company’s network for multiple years, during which they installed malware and obtained source code.

Previously disclosed breaches in November 2021 and March 2020 are also linked to this multi-year campaign. The November 2021 incident led to a data breach affecting 1.2 million Managed WordPress customers who had their email addresses, WordPress Admin passwords, sFTP and database credentials, and SSL private keys exposed.

The March 2020 breach saw 28,000 customers affected after attackers used their web hosting account credentials to connect to their hosting account via SSH.

GoDaddy is now working with external cybersecurity forensics experts and law enforcement agencies worldwide as part of an ongoing investigation into the root cause of the breach. Evidence has been found linking attackers to a broader campaign targeting other hosting companies internationally over the years, whose goal is to infect websites and servers with malware for phishing campaigns and other malicious activities. 

Read→ https://www.bleepingcomputer.com/news/security/godaddy-hackers-stole-source-code-installed-malware-in-multi-year-breach/

Link to comment
Share on other sites

  • 1 year later...

If hackers managed to steal source code and install malware over several years, that’s absolutely terrible—it makes you worry about the security of your own accounts. I am also looking for tips how to secure my information
 

Link to comment
Share on other sites

When hackers compromise source code and install malware over time, it raises significant concerns about the security of personal and organizational accounts. To protect your data, proactive measures are critical. A great way to ensure web application security is by conducting regular penetration tests. Services like ImmuniWeb's web application penetration test https://www.immuniweb.com/resources/application-penetration-testing/ offer a comprehensive approach by combining automated and manual testing to uncover vulnerabilities such as SQL injection or authentication bypass, while also prioritizing fixes based on criticality.

Edited by raymond34
Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • 👍 Join TopGold.Forum Now

    The Most Welcoming & Trustworthy Earning Online Community

    Join over 25,000 members and 700 businesses on their journey to strike GOLD. 💰🍾👍

    👩 Want to make money online? 
    💼 Represent a company? 

⤴️-Paid Ad- TGF approve this banner. Add your banner here.🔥

×
×
  • Create New...