GoDaddy Data Breach Exposes Over 1 Million WordPress Customers’ Data

GoDaddy Data Breach

Web hosting giant GoDaddy on Monday disclosed a data breach that
resulted in the unauthorized access of data belonging to a total of
1.2 million active and inactive customers, making it the third[1]
security incident[2]
to come to light since 2018.

In a filing with the U.S. Securities and Exchange Commission
(SEC), the world’s largest domain registrar said[3]
that a malicious third-party managed to gain access to its Managed WordPress[4]
hosting environment on September 6 with the help of a compromised
password, using it to obtain sensitive information pertaining to
its customers. It’s not immediately clear if the compromised
password was secured with two-factor authentication.

Automatic GitHub Backups

The Arizona-based company claims[5]
over 20 million customers, with more than 82 million domain names
registered using its services.

GoDaddy Data Breach

GoDaddy revealed it discovered the break-in on November 17. An
investigation into the incident is ongoing and the company said
it’s “contacting all impacted customers directly with specific
details.” The following information is believed to have been
accessed by the intruder —

  • Email addresses and customer numbers of up to 1.2 million
    active and inactive Managed WordPress customers
  • Original WordPress Admin password that was set at the time of
    provisioning was exposed
  • sFTP[6]
    and database usernames and passwords associated with its active
    customers, and
  • SSL private keys for a subset of active customers

GoDaddy said it’s in the process of issuing and installing new
certificates for the impacted customers. As a precautionary
measure, the company also stated it has reset the affected
passwords and it’s bolstering its provisioning system with added
security protections.

Prevent Data Breaches

According to Wordfence CEO Mark Maunder[7], “GoDaddy stored sFTP
passwords in such a way that the plaintext versions of the
passwords could be retrieved, rather than storing salted hashes of
these passwords, or providing public key authentication, which are
both industry best practices.”

While data breaches are no longer a sporadic occurrence, the
exposure of email addresses and passwords presents risk of phishing
attacks, not to mention enable the attackers to breach the
vulnerable WordPress sites to upload malware and access other
personally identifiable information stored in them.

“On sites where the SSL private key was exposed, it could be
possible for an attacker to decrypt traffic using the stolen SSL
private key, provided they could successfully perform a
man-in-the-middle (MITM) attack that intercepts encrypted traffic
between a site visitor and an affected site,” Maunder said.

References

  1. ^
    third
    (www.upguard.com)
  2. ^
    security
    incident
    (www.bleepingcomputer.com)
  3. ^
    said
    (www.sec.gov)
  4. ^
    Managed
    WordPress
    (in.godaddy.com)
  5. ^
    claims
    (aboutus.godaddy.net)
  6. ^
    sFTP
    (in.godaddy.com)
  7. ^
    Mark
    Maunder
    (www.wordfence.com)

Read more

Leave a Reply