Although we all know GoDaddy's subpar, this is massive:
> credentials that gave it access to a “small number” of employee accounts and the hosting accounts of roughly 28,000 customers.
> obtain login credentials for WordPress admin accounts, FTP accounts, and email addresses for 1.2 million current and inactive Managed WordPress customers
I'm curious what they concretely did:
> goal is to infect websites and servers with malware for phishing campaigns, malware distribution
> weight loss websites
but hm. I guess I don't know a lot about malware, phishing and stuff. How would you gain exactly?
The article reads like a press release more than journalism.
Multiple uses of the word “sophisticated” as if the only way someone could gain access to Godaddy for _multiple years_ was if they are quite sophisticated, and not as a result of massive negligence on the part of Godaddy itself.
Multi year breaches and general incompetence are kind of Godaddy’s MO. I remember doing notifications of suspicious activity to them and they never bothered even trying to fix it.
I would be shocked if they weren’t running afoul of GDPR required notifications by intentionally putting their heads in the sand and pretending no PII was stolen.
Well, when you're more interesting in killing endangered animals to own the libs than you are in running your business, I guess this is what you end up with.
When small businesses adopted the web for their own little site, godaddy grab the opportunity and exploded. It's not like demand is fading, despite social media platform offering decent storefront for even less money and effort. People want $9 monthly turnkey website, they end up paying more but the hook works.
[+] [-] dang|3 years ago|reply
[+] [-] veqq|3 years ago|reply
> credentials that gave it access to a “small number” of employee accounts and the hosting accounts of roughly 28,000 customers.
> obtain login credentials for WordPress admin accounts, FTP accounts, and email addresses for 1.2 million current and inactive Managed WordPress customers
I'm curious what they concretely did:
> goal is to infect websites and servers with malware for phishing campaigns, malware distribution
> weight loss websites
but hm. I guess I don't know a lot about malware, phishing and stuff. How would you gain exactly?
[+] [-] Retr0id|3 years ago|reply
If you phish someone and gain access to something, you can sell that access to someone else.
The "end" of the chain is things like ransomware, identity theft, cc fraud, etc.
[+] [-] iambateman|3 years ago|reply
Multiple uses of the word “sophisticated” as if the only way someone could gain access to Godaddy for _multiple years_ was if they are quite sophisticated, and not as a result of massive negligence on the part of Godaddy itself.
No quotes from the company apologizing.
Godaddy is wild…what a mess.
[+] [-] sergers|3 years ago|reply
Surprised they didn't come out with government state sponsored actors... Ex china, Russia , and North Korea lol(remember that excuse from sony).
[+] [-] someonenice|3 years ago|reply
Any idea what was the impact on Mozilla ? Did it impact the Firefox and plugin servers ?
[+] [-] paranoidrobot|3 years ago|reply
The registrar for mozilla.org is MarkMonitor. I'd guess that most (if not all) of their big name/public facing domains are done through MarkMonitor.
Domains used for testing or marketing purposes might be done through GoDaddy and others. This is a fairly common pattern.
[+] [-] jpleger|3 years ago|reply
I would be shocked if they weren’t running afoul of GDPR required notifications by intentionally putting their heads in the sand and pretending no PII was stolen.
[+] [-] rodgerd|3 years ago|reply
[+] [-] insane_dreamer|3 years ago|reply
[+] [-] hirako2000|3 years ago|reply
[+] [-] xmprt|3 years ago|reply
[+] [-] TedDoesntTalk|3 years ago|reply
[+] [-] MonkeyMalarky|3 years ago|reply
[+] [-] unknown|3 years ago|reply
[deleted]
[+] [-] cyanydeez|3 years ago|reply