GoDaddy the largest domain hosting provider with more than 19 million customers has now notified a substantial amount of its customers that an anonymous entity had breached into their hosting accounts using the compromised credentials through SSH. This breach had occurred on October 2019, right after the security team of GoDaddy identified mysterious behavior in their servers.
After analyzing the breach the security professionals have identified an unauthorized individual had gained access to the login credentials through the SSH on the victim’s hosting account. However, the attackers have not modified any files or folders within the affected hosting accounts, and also promised that the attack has affected only the hosting accounts and not their main account.
The company has reset all the hosting account login credentials as a proactive measure to secure the rest of the accounts and prevent further exploitation. Furthermore, the company has requested its customers to verify and audit their hosting accounts to ensure that their account has not been breached yet. Albeit, the incident and the concern that the same has created among the customers, GoDaddy is now offering their Website Security Deluxe and Express Malware Removal program for free.
The above two programs runs scans on your website to detect and warn you of any potential vulnerabilities. With this additional security and assistance from GoDaddy’s security team, the customers will find a sense of relief over their hosting.
This firm has had several security issues in the past, scammers made use of compromised accounts to build 15,000 new subdomains, impersonating popular websites. Also, in the year 2019 GoDaddy was identified of injecting a Java script into US client websites, thus affecting their site’s performance. The same script was later used for monitoring websites, data collection, and more.
Users are yet to receive a complete fix and update from GoDaddy to avoid any such credential breaches in future, meanwhile the customers can reset their passwords, strengthen them, and update them in every 60 days to stay immune to data breaches.
Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…
Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…
Discover the top 11 log management tools for efficient system management and monitoring. Learn about…
Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…
Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…
Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…
View Comments
Its as if you read my brain! You may actually know a lot about this, like
you wrote the book in it or something. I think that you could do with
some pics to drive the meaning home a little bit, but other
than that,
this is fantastic blog. An excellent read. I'll definitely be back
again.
If you want to increase your knowledge simply keep visiting this site and be updated with the most recent gossip posted here. Ella Dugald Paviour
A big thank you for your blog article. Thanks Again. Want more. Corine Carlyle Monafo
I am so grateful for your blog article. Much thanks again. Cool. Ellene Trumaine Cusick
Well I really enjoyed studying it. This article offered by you is very constructive for correct planning. Ramonda Vincenty Grevera
Pretty! This was an extremely wonderful post. Thanks for providing this info. Nissy Trevar Cassandry
Im grateful for the post. Really looking forward to read more. Much obliged. Ardine Dannie Percy
I pay a quick visit day-to-day some websites and information sites to read posts, however this weblog presents feature based articles. Berenice Darin Skiba
Hurrah! At last I got a weblog from where I be capable of in fact obtain valuable information concerning my study and knowledge. Sacha Isa Courtland
Hi there, its nice piece of writing about media print, we all be aware of media is a enormous source of information. Alma Ben Phillipp