On Tuesday, GoDaddy reported an October data breach to Californian authorities, affirming that an unofficial individual managed to get access to SSH accounts used in its hosting environment.

“We have no evidence that any files were added or modified on your account,” the company said while overlooking proof that files could have been seen and exfiltrated.

“The unauthorized individual has been blocked from our systems, and we continue to investigate potential impact across our environment.”

The company said the breach had no effect on the major GoDaddy.com customer account, adding that no information within that account was accessed.

GoDaddy said it has reset passwords and would deliver affected customers with a year of its website security and malware removal service for free.

“These services run scans on your website to identify and alert you of any potential security vulnerabilities,” it said.

“With this service, if a problem arises, there is a special way to contact our security team and they will be there to help.”

The company also advised customers to audit their hosting accounts.

GoDaddy, in February, stated full-year net income of $138.4 million on revenue of $2.99 billion, adding it had 19.3 million customers until the end of 2019.

In March, KrebsOnSecurity said a GoDaddy employee was targeted, which resulted in a hacker changing the DNS entries for the Freelancer-owned Escrow.com.

Two hours later, Freelancer CEO Matt Barrie said that Escrow managed to regain control of its DNS entries, and none of its systems were impacted.

“During the incident, our security team managed to talk to the hacker on the phone. For over an hour the hacker attempted to convince what he thought were domain registry operations to regain access to the account,” Barrie said.

“During this phone call, our security team learned that the route of entry was that the hacker had unlawfully accessed our registrar’s internal support systems and was using them to make changes on Escrow.com’s account.”

Leave a Reply

Your email address will not be published. Required fields are marked *