Hackers have, since September, accessed usernames, passwords, email addresses and SSL private keys for GoDaddy customers by compromising their Managed WordPress hosting environment.
The US-based Internet domain registrar and web hosting company said an unauthorised third party accessed GoDaddy’s provisioning system in its legacy code base for Managed WordPress using a compromised password.
The adversary began exploiting the vulnerability on September 6, and GoDaddy discovered the unauthorised access on November 17, according to the company.
“We are sincerely sorry for this incident and the concern it causes for our customers,” GoDaddy chief information security officer Demetrius Comes said in a statement. “We, GoDaddy leadership and employees, take our responsibility to protect our customers’ data very seriously and never want to let them down.
GoDaddy’s stock is down $3.15 (4.42 percent) to $68.16 per share in trading Monday afternoon.
Hackers used the compromised password to access the email addresses and customer numbers for up to 1.2 million active and inactive Managed WordPress customers. The exposure of email addresses presents risks of phishing attacks, according to GoDaddy.
In addition, a subset of active customers had their SSL private key exposed. GoDaddy said it’s in the process of issuing and installing new certificates for those customers. Active customers, meanwhile, had their sFTP and database usernames and passwords exposed, and GoDaddy reset both passwords.
Also, GoDaddy said the original WordPress Admin password set at the time of provisioning was exposed. If those credentials were still in use, GoDaddy said it reset those passwords.
GoDaddy said it contacted law enforcement and investigated the breach with the help of an IT forensics firm.
Upon identifying the attack, GoDaddy said it immediately blocked the unauthorised third party from its system. GoDaddy said its investigation is still ongoing, noting it has contacted all impacted customers directly with specific details.
“We will learn from this incident and are already taking steps to strengthen our provisioning system with additional layers of protection,” Comes said.