Hundreds of Go Daddy sites were compromised to point towards a site hosting malware last weekend. The mass hack of around 445 sites involved the injection of hostile code into the .htaccess files of the sites. Go Daddy quickly removed the hostile code before working with its customers to take back full control of the sites, …
First time I've read in a while...
...that the hack didn't quickly show poor security at the hacked service. Further down the line there maybe recommendations that's not unreasonable.
Reason I left GoDaddy ages ago, these type of attacks are nothing new.
So not GoDaddy's fault then
Big boy done it and run away.
This is nothing new. Malware specifically designed to target FTP clients and either retrieve stored passwords or monitor connections when the password is manually provided is nothing new, see Gumblar for one example dating back to 2009.
These account access details are then used for a whole variety of reasons, sometimes the details are used to upload PHP/Perl junk mailers to accounts, sometimes they add iframe links into all content into an account, or sometimes they upload content to folders' .htaccess files.
These attacks are generally carried out in batches as a matter of course, where large numbers of different accounts will be compromised in a short period of time, the only thing that may seem unusual about this particular round is the number of accounts being hosted by a single host.
As mentioned in the article, it wasn't an attack on GoDaddy's systems or security procedure, it's sloppy users not updating crummy insecure Adobe software and having their own passwords compromised as a result.
- Breaking news: Google exec veep in terrifying SKY PLUNGE DRAMA
- Geek's Guide to Britain Kingston's aviation empire: From industry firsts to Airfix heroes
- Analysis Happy 2nd birthday, Windows 8 and Surface: Anatomy of a disaster
- Google CEO Larry Page gives Sundar Pichai keys to the kingdom
- Something for the Weekend, Sir? SKYPE has the HOTS for my NAKED WIFE