On 16th February 2023, GoDaddy Inc, an American Internet domain registrar and web hosting company, released a statement to disclose a multi-year security breach it suffered, which enabled an unknown threat actor to install malware and stealing of the siphon source code related to some of its services.Initially, in the month of December 2022, GoDaddy received a small number of customer complaints related to redirecting of their websites to malicious sites and when GoDaddy investigated, it found that the issue is because an unauthorized third party had gained access to servers which are hosted on its 'cPanel environment' and installed a malware causing the redirection of the websites. In a response to the incident, GoDaddy remediated the situation and implemented additional security measures to prevent future security incidents.Further, during the investigation, they found this campaign was done by a sophisticated and organized group to target the services provided by GoDaddy and ultimately use these malware-infected websites and servers to perform phishing campaigns, malware distribution, and other malicious activities. Additionally, related to this incident, GoDaddy in a 10-K filing made with the U.S. Securities and Exchange Commission (SEC) said the December 2022 incident has connections to the two previous security incidents it suffered in March 2020 and November 2021.The security incident which happened in March 2020 resulted in the compromise of the hosting login credentials of at least 28,000 hosting customers and a small number of its employees. Similarly, during the 2021 security incident, a rogue threat actor compromised the password and accessed the provisioning system in its legacy code base for Managed WordPress (MWP) to affect at least 1.2 million active and inactive MWP customers across multiple GoDaddy brands.
Download https://lpoms.com/2yXUj3