Site icon TheCyberThrone

GoDaddy Breached ! It’s Serious

Advertisements

The US Securities and Equities Commission (SEC) has published a “Security Incident” submitted last week by Web services behemoth GoDaddy.

According to GoDaddy, the crooks – or the unauthorised third party, as the report refers to them:

Advertisements

GoDaddy stated that default WordPress admin passwords, created when each account was opened, were accessed, too, though we’re hoping that few, if any, active users of the system had left this password unchanged after setting up their WordPress presence.

If the passwords had been  salted hashed and stretched, as you might expect, that GoDaddy would have reported the breach by saying so, given that properly hashed passwords, once stolen, still need to be cracked by the attackers, and with well-chosen passwords and a decent hashing process, that process can take weeks, months or years.

GoDaddy has now reset all affected passwords, and says it’s in the process of replacing all potentially stolen web certificates with freshly generated ones.

Advertisements

GoDaddy is also in the process of contacting as many of the 1,200,000 affected users at it can.

We will learn from this incident and are already taking steps to strengthen our provisioning system with additional layers of protection”, which is a refreshing change from companies that start off by telling you how strong their protection was even before the incident.

GoDaddy Statement

Ten weeks in hand before getting spotted, the criminals in this attack could have used the compromised sFTP passwords and web certificates to pull off further cybercrimes against MWP users.

Those unauthorised website additions could include:

Also, crooks with a copy of your SSL/TLS private key could set up a fake site elsewhere, such as an investment scam or a phishing server, that not only claimed to be your site, but also actively “proved” that it was yours by using your very own web certificate.

Advertisements

Steps to be followed

Exit mobile version