The October 2019 breach left some customer data open to hacking eyes.

Dark Reading Staff, Dark Reading

May 6, 2020

1 Min Read

GoDaddy has reported that a breach occurred in October, resulting in unauthorized access to certain SSH accounts hosted by the provider. According to a notice sent to affected customers, the breach had an impact only on SSH accounts: No "main GoDaddy accounts" were affected by the activity.

The breach notification states that no data was added to or modified in the accounts; no information was provided on whether data was read or exfiltrated. GoDaddy has forced a password change for any customer affected by the breach and has offered a year of Website Security Deluxe and Express Malware Removal at no cost to victims.

GoDaddy has not released information on how many customers were affected or for how long the breach was active.

For more, read here and here.

_OMDIA_LOGO_Endorsement_Black.png

A listing of free products and services compiled for Dark Reading by Omdia analysts to help meet the challenges of COVID-19. 

About the Author(s)

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights