GoDaddy, 123Reg hacked
★ Trevor Wood ★
★I help people and organisations protect themselves from cyber attacks★Ethical hacker★Cybersecurity consultant★Web developer★Speaker and trainer
On 22nd November 2021, GoDaddy disclosed that an unknown attacker had gained unauthorized access to the system used to provision the company’s Managed WordPress sites. The following day, GoDaddy revealed that the hack also affected their reseller brands, including 123Reg, tsoHost, Media Temple, Domain Factory, Heart Internet and Host Europe. This hack affected around 1.2M WordPress customers.
What happened?
According to GoDaddy, the attacker gained access to their system through a compromised password. They are not saying whether the password was one of their employees’ or one of their clients’. Access to this account was immediately stopped, but there was a window of about 2 months where the attacker could set up other ways to maintain access.
Now comes the juicy part – GoDaddy had been storing some login credentials in plain text, which should never be done; it’s akin to writing your PIN on the back of your credit card. So now 1.2M customers have all their WordPress websites compromised.
What could the attacker now do?
Helping ambitious entrepreneurs & full time business coaches escape the trap of growing their business whilst sacrificing time & life. Working on the elements of delivery, sales & high quality daily lead flows.
1 年Trevor, thanks for sharing, always good to see some insights from people who have viewed my profile or are connected to me.