Security News > 2023 > February > GoDaddy: Hackers stole source code, installed malware in multi-year breach

Web hosting giant GoDaddy says unknown attackers have stolen source code and installed malware on its servers after breaching its cPanel shared hosting environment.
While GoDaddy discovered the security breach in early December 2022 following customer reports that their sites were being used to redirect to random domains, the attackers had access to the company's network for multiple years.
"Based on our investigation, we believe these incidents are part of a multi-year campaign by a sophisticated threat actor group that, among other things, installed malware on our systems and obtained pieces of code related to some services within GoDaddy," the hosting firm said in an SEC filing.
GoDaddy is now working with external cybersecurity forensics experts and law enforcement agencies worldwide as part of an ongoing investigation into the root cause of the breach.
GoDaddy's disclosed another breach in May 2020, alerting some customers that an attacker used their web hosting account credentials in October 2019 to connect to their hosting account via SSH. In April 2019, scammers also used hundreds of compromised GoDaddy customer accounts to create almost 15,000 subdomains that enabled them to impersonate popular websites and redirect potential victims to spam pages pushing snake oil products.
GoDaddy is one of the largest domain registrars, and it also provides hosting services to over 20 million customers worldwide.
News URL
Related news
- HPE investigates breach as hacker claims to steal source code (source)
- Hackers steal ZAGG customers' credit cards in third-party breach (source)
- Russia-Linked Hackers Target Kazakhstan in Espionage Campaign with HATVIBE Malware (source)
- FBI Deletes PlugX Malware from 4,250 Hacked Computers in Multi-Month Operation (source)
- Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer (source)
- CISA: Hackers still exploiting older Ivanti bugs to breach networks (source)
- Hacker infects 18,000 "script kiddies" with fake malware builder (source)
- Hackers exploiting flaws in SimpleHelp RMM to breach networks (source)
- North Korean Hackers Deploy FERRET Malware via Fake Job Interviews on macOS (source)
- Hackers exploit SimpleHelp RMM flaws to deploy Sliver malware (source)