Reliable Technology ServicesReliable Technology ServicesReliable Technology ServicesReliable Technology Services
Menu
  • Home
  • About Us
  • Services
    • Managed IT Services
      • Remote Monitoring & Maintenance
      • Onsite and Remote Support
      • Managed Security Services
    • Cloud Services
      • Cloud Email Solutions
      • Managed Backup Services
      • Cloud Data Storage Solutions
    • IT Consulting
      • Disaster Recovery & Business Continuity
      • IT Vendor Management Services
      • Network Infrastructure Planning, Design & Implementation
    • Cybersecurity
      • Employee Cybersecurity Training
      • Penetration Testing & Vulnerability Scanning
      • Cybersecurity Risk Assessments, Software and Services
  • FAQ’s
  • Blog
  • Contact

Breach on GoDaddy Goes Back “Multiple Years”

  • Home
  • Blog
  • Breach On GoDaddy Goes Back “Multiple...

Breach on GoDaddy Goes Back “Multiple Years”

CategoriesInformation Security

Rick Ornato

March 15, 2023

0 0

Share this post

Whether you’ve used it before or just seen it in commercials, you’ve probably heard about GoDaddy.com before. The website hosting platform manages over 76M domains around the world, making it easy for people to build, grow and market their website.

Recently an investigation into suspicious activity on GoDaddy servers uncovered a massive data breach that’s been ongoing since at least 2020.

Photo by Mikhail Nilov from Pexels

What GoDaddy Users Should Know

The threat actors responsible for the breach appear to have first gotten in through the shared hosting environment used by GoDaddy. Simply put, shared hosting environments are a type of web hosting that allows multiple sites to be run on the same server; that’s what GoDaddy does. Shared hosting environments typically offer increased security measures compared to other types of web hosting solutions, which is often ideal for SMBs.

Last December, numerous customers started to report that their hosted websites were redirecting to outside domains. This prompted the initial investigation. It was then that the plot was uncovered: threat actors had been accessing GoDaddy’s network for several years already, with at least two other breaches linked to the same exposure.

The first was an incident dating all the way back to March 2020, when a supply chain attack impacted the security of its millions of users. Although no customer data was accessed or stolen, the incident nevertheless raised concerns about the security of web hosting services.

The second, which took place November 2021, impacted 1.2M WordPress sites when a stolen password was used to breach them through their GoDaddy accounts. Emails, admin passwords, login for the database, active SSL keys and more were all compromised.

Looking even further into this latest breach also revealed possible connections to a larger attack campaign against website hosting platforms all over the world. It appears to be a widespread conspiracy, wherein threat actors aim to spread malware, phishing, and other malicious activity to a ton of websites at once by first breaching these hosting services, like GoDaddy.

How to Protect Yourself from Supply Chain Risks

It’s tough when you do everything possible on your end to protect your private data and important accounts, only to wind up victimized by something out of your control.

In the event that your data is compromised in a larger attack, here are some steps that you can take to mitigate the damage.

  • Create and implement a reliable Business Continuity Plan (BCP)
  • Utilize both regional and global security strategies
  • Develop distribution centers in different regions
  • Ensure visibility, collaboration, and information sharing among upstream and downstream supply chain partners
  • To prevent IT and cyber risks, invest in hardware and software tools
  • Pay attention to, and then heed, your cybersecurity awareness trainings

Conclusion

This attack on GoDaddy, while massive, is only the latest in an increasingly furious swarm of attacks against third-party services. Everyone needs to research the security of online services before using them, and then continue to monitor and protect your accounts there. This will help to reduce the risk of becoming a victim to something like this. Cyber events like these also illustrate how anyone, anywhere can be targeted for a data breach.

Take time to go over your security settings and make sure your accounts are as impenetrable as they can be. Update to new versions of software and hardware whenever you can, stay aware of new threats and breaches, and follow this blog for more tips on remaining cyber-secure!

Photo by Rodolfo Clix

References

  • https://www.bleepingcomputer.com/news/security/godaddy-hackers-stole-source-code-installed-malware-in-multi-year-breach/

Related Post

JULY 31, 2023

3 Smart Ways to Hide Your...

Our modern world is extremely digitized; because of that, we constantly use...

00

JULY 24, 2023

Consumer Financial Protection...

Consumer Financial Protection Bureau, commonly known as CFPB, is a government agency...

00

JULY 17, 2023

How Well Do You Know Your...

The faster you can identify suspicious activity on your network, the faster you can...

00

JULY 10, 2023

Beginning of the End? Behind...

Since bursting onto the scene in November 2022, ChatGPT has changed the game for...

00

JULY 3, 2023

A Real Pain: CACTUS...

Virtual private networks, more commonly known as VPNs, have long been touted as a more...

00

JUNE 29, 2023

Crash Course in Keylogging:...

What if threat actors could see everything that you did online? Everything you searched,...

00

Managed IT Services

  • Managed IT Services
    • Onsite and Remote Support
    • Remote Monitoring & Maintenance
    • Managed Security Services
Get a free IT Consultation
Contact Us

© 2018 Reliable Technology Services, All Rights Reserved.