Web hosting giant GoDaddy on Monday disclosed a data breach that resulted in the unauthorised access of data belonging to a total of 1.2 million active and inactive customers, making it the third security incident to come to light since 2018.
In a filing with the U.S. Securities and Exchange Commission (SEC), the world’s largest domain registrar said that a malicious third-party managed to gain access to its Managed WordPress hosting environment on September 6 with the help of a compromised password, using it to obtain sensitive information pertaining to its customers. It’s not immediately clear if the compromised password was secured with two-factor authentication.
The Arizona-based company claims over 20 million customers, with more than 82 million domain names registered using its services.
GoDaddy revealed it discovered the break-in on November 17. An investigation into the incident is ongoing and the company said it’s “contacting all impacted customers directly with specific details.” The following information is believed to have been accessed by the intruder —
- Email addresses and customer numbers of up to 1.2 million active and inactive Managed WordPress customers
- Original WordPress Admin password that was set at the time of provisioning was exposed
- sFTP and database usernames and passwords associated with its active customers, and
- SSL private keys for a subset of active customers
GoDaddy said it’s in the process of issuing and installing new certificates for the impacted customers. As a precautionary measure, the company also stated it has reset the affected passwords and it’s bolstering its provisioning system with added security protections.
According to Wordfence CEO Mark Maunder, “GoDaddy stored sFTP passwords in such a way that the plaintext versions of the passwords could be retrieved, rather than storing salted hashes of these passwords, or providing public key authentication, which are both industry best practices.”
While data breaches are no longer a sporadic occurrence, the exposure of email addresses and passwords presents risk of phishing attacks, not to mention enable the attackers to breach the vulnerable WordPress sites to upload malware and access other personally identifiable information stored in them.
“On sites where the SSL private key was exposed, it could be possible for an attacker to decrypt traffic using the stolen SSL private key, provided they could successfully perform a man-in-the-middle (MITM) attack that intercepts encrypted traffic between a site visitor and an affected site,” Maunder said.
A data breach at web hosting company GoDaddy might run deeper than the firm has so far been prepared to admit, as multiple subsidiaries of the company’s Managed WordPress services, including 123Reg, Domain Factory, Heart Internet, Host Europe, Media Temple and tsoHost, have been found affected.
GoDaddy told Wordfence that a “small number of active and inactive Managed WordPress users at those brands were impacted,” although It’s unclear exactly how many additional users may have had their sensitive details exposed in the wake of the security incident.