Cyber Security News

GoDaddy Hacked – Attackers Breached Cpanel and Stolen Source Code

GoDaddy, a leading web hosting company, has reported a security breach in which its cPanel shared hosting environment was breached by unknown attackers.

The perpetrators were able to steal source code and install malware on GoDaddy’s servers in a prolonged attack that spanned multiple years.

Although customer reports alerted GoDaddy to this security breach in early December 2022, the attackers had actually gained access to the company’s network several years prior. 

During this time, the perpetrators were able to use compromised sites to redirect traffic to various unknown domains. As one of the world’s largest domain registrars, GoDaddy serves more than 20 million customers globally with its hosting services.

Breach Analysis

According to the company, the recent security breach that occurred over a span of several years is connected to previous breaches that were disclosed in November 2021 and March 2020.

In November 2021, GoDaddy’s WordPress hosting environment was compromised by attackers who used a compromised password. Approximately 1.2 million Managed WordPress users have been affected by this data breach as a result of this issue.

As a result, they gained access to the following information:-

  • Email addresses
  • WordPress Admin passwords
  • sFTP
  • Database credentials
  • SSL private keys of a subset of active clients

In October 2019, an attacker gained access to the web hosting accounts of 28,000 GoDaddy customers by using their SSH credentials. GoDaddy discovered this breach in March 2020 and promptly notified the affected customers.

GoDaddy’s Response

As part of an ongoing investigation into the cause of the breach, GoDaddy has enlisted the help of external cybersecurity forensics experts and law enforcement agencies around the globe.

A sophisticated and organized group, whose focus is on hosting services, including GoDaddy, was responsible for the incident, as confirmed by both GoDaddy and law enforcement.

The threat actors’ objective is to corrupt websites and servers with malware to execute various malicious activities, such as malware distribution and phishing campaigns.

Here’s what GoDaddy stated:-

“As we continue to monitor their behavior and block attempts from this criminal organization, we are actively collecting evidence and information regarding their tactics and techniques to help law enforcement.”

Moreover, an apology was issued to customers and website visitors for any inconvenience experienced. While the improvements to the security of their systems are underway, utilizing insights gained from the incident to better safeguard customer data.

Network Security Checklist – Download Free E-Book

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

CISA Warns of Hackers Actively Exploiting Windows Server Update Services RCE Vulnerability in the Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned organizations worldwide about active exploitation…

5 hours ago

New Malware Attack Using Variable Functions and Cookies to Evade and Hide Their Malicious Scripts

A sophisticated malware campaign targeting WordPress sites has emerged, utilizing PHP variable functions and cookie-based…

6 hours ago

Threat Actors Tricks Target Users Via Impersonation and Fictional Financial Aid Offers

An international ecosystem of sophisticated scam operations has emerged, targeting vulnerable populations through impersonation tactics…

8 hours ago

TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT

TransparentTribe, a Pakistani-nexus intrusion set active since at least 2013, has intensified its cyber espionage…

10 hours ago

Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks

As the festive season approaches, organizations are witnessing a disturbing increase in targeted attacks on…

12 hours ago

Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave

The cybersecurity landscape experienced a significant shift in July 2025 when threat actors associated with…

13 hours ago