GoDaddy Data Breach Exposes Over 1 Million WordPress Customers' Data #Cybersecurity - The Entrepreneurial Way with A.I.

Breaking

Tuesday, November 23, 2021

GoDaddy Data Breach Exposes Over 1 Million WordPress Customers' Data #Cybersecurity

#HackerNews

Web hosting giant GoDaddy on Monday disclosed a data breach that resulted in the unauthorized access of data belonging to a total of 1.2 million active and inactive customers, making it the third security incident to come to light since 2018.

In a filing with the U.S. Securities and Exchange Commission (SEC), the world's largest domain registrar said that a malicious third-party managed to gain access to its Managed WordPress hosting environment on September 6 with the help of a compromised password, using it to obtain sensitive information pertaining to its customers. It's not immediately clear if the compromised password was secured with two-factor authentication.

The Arizona-based company claims over 20 million customers, with more than 82 million domain names registered using its services.

GoDaddy revealed it discovered the break-in on November 17. An investigation into the incident is ongoing and the company said it's "contacting all impacted customers directly with specific details." The following information is believed to have been accessed by the intruder —

  • Email addresses and customer numbers of up to 1.2 million active and inactive Managed WordPress customers
  • Original WordPress Admin password that was set at the time of provisioning was exposed
  • sFTP and database usernames and passwords associated with its active customers, and
  • SSL private keys for a subset of active customers

GoDaddy said it's in the process of issuing and installing new certificates for the impacted customers. As a precautionary measure, the company also stated it has reset the affected passwords and it's bolstering its provisioning system with added security protections.

According to Wordfence CEO Mark Maunder, "GoDaddy stored sFTP passwords in such a way that the plaintext versions of the passwords could be retrieved, rather than storing salted hashes of these passwords, or providing public key authentication, which are both industry best practices."

While data breaches are no longer a sporadic occurrence, the exposure of email addresses and passwords presents risk of phishing attacks, not to mention enable the attackers to breach the vulnerable WordPress sites to upload malware and access other personally identifiable information stored in them.

"On sites where the SSL private key was exposed, it could be possible for an attacker to decrypt traffic using the stolen SSL private key, provided they could successfully perform a man-in-the-middle (MITM) attack that intercepts encrypted traffic between a site visitor and an affected site," Maunder said.

Found this article interesting? Follow THN on

Facebook

,

Twitter

and

LinkedIn

to read more exclusive content we post.



via https://www.AiUpNow.com

November 23, 2021 at 02:42AM by noreply@blogger.com (Ravie Lakshmanan), Khareem Sudlow