Credential theft
GoDaddy WordPress Managed Hosting Breach (1.2M Customers, SSL Keys Exposed)
Primary Source βIncident Details
On September 6, 2021, an attacker used a compromised password to access GoDaddy’s Managed WordPress hosting provisioning system, where they maintained access for over two months before being detected on November 17, 2021. GoDaddy filed an SEC 8-K disclosing the breach on November 22. Approximately 1.2 million active and inactive Managed WordPress customer accounts were affected. Exposed data included email addresses, sFTP (Secure FTP) credentials, database usernames and passwords, and SSL private keys for active customers β the SSL private keys effectively allowed the attacker to impersonate any affected customer’s website. GoDaddy reset all sFTP passwords and database credentials, and reissued SSL certificates. The exposure of SSL private keys was particularly severe, as it could enable man-in-the-middle attacks against website visitors even after the credentials were rotated, until affected certificates expired or were reissued across the ecosystem.
Technical Details
- Initial Attack Vector
- Attacker used a compromised password to gain access to GoDaddy's Managed WordPress provisioning system; the password granted access since at least September 6, 2021 β giving the attacker 2+ months of undetected access
- Vendor / Product
- GoDaddy Managed WordPress
Timeline
- 2021-09-06 Breach occurred
- 2021-11-22 Publicly disclosed
- 2021-11-22 Customers notified