Original Article Text

Click to Toggle View

FTC finalizes order requiring GoDaddy to secure hosting services. The U.S. Federal Trade Commission (FTC) has finalized an order requiring web hosting giant GoDaddy to secure its services to settle charges of data security failures that led to several data breaches since 2018. In January, the agency also alleged that GoDaddy, a major website hosting company with roughly five million customers, misled users about its security practices. The FTC found that GoDaddy was unaware of vulnerabilities in its hosting environment due to a lack of standard security measures. The FTC's order prohibits the company from misleading customers about its security protections and mandates GoDaddy to establish a robust information security program, secure APIs using HTTPS or other secure transfer protocols, and set up a software and firmware update management program. The order also requires GoDaddy to hire an independent third-party assessor to conduct biennial reviews of its information security program and report any incident where customer data was exposed, accessed, or stolen within 10 days. Among other requirements, the hosting company has to add at least one mandatory MFA for all customers, employees, and contractors' staff "to any Hosting Service supporting tool or asset, including connecting to any database" and "at least one method that does not require the customer to provide a telephone number, such as by integrating authentication applications or allowing the use of security key." Lax security practices behind multiple breaches According to the FTC's complaint, GoDaddy had inadequate security practices, lacking multi-factor authentication (MFA), proper software update management, and logging of security events. It also failed to monitor for threats, segment its network, use file integrity monitoring, keep track of and manage its assets, assess risks to its hosting services, or secure service connections to consumer data. The FTC says these security failures led to several major security breaches between 2019 and 2022, resulting in attackers gaining access to customers' data and websites. For instance, in February 2023, GoDaddy revealed that unknown threat actors installed malware on compromised servers and stole source code after breaching its cPanel shared hosting environment in a multi-year breach. The company discovered the incident in early December 2022, only after receiving customer complaints that their websites were being abused to redirect to unknown domains. GoDaddy also disclosed at the time that breaches disclosed in March 2020 and November 2021 were linked to the same campaign. In the November 2021 breach, attackers hacked into GoDaddy's hosting environment using a compromised password and stole email addresses, WordPress Admin passwords, sFTP and database credentials, and SSL private keys of 1.2 million Managed WordPress customers. Following the March 2020 breach, GoDaddy notified 28,000 customers that an attacker used their web hosting credentials to connect via SSH in October 2019. "We are constantly improving our security capabilities and have already implemented a number of the requirements in the settlement agreement with the FTC. Notably, the resolution of this matter includes no admission of fault and no monetary penalties," GoDaddy told BleepingComputer in January when the FTC issued a proposed settlement order. "We expect minimal financial impact associated with complying with the terms of the agreement with the FTC. We plan to continue to invest in our defenses to address evolving threats and help keep our customers, their websites and their data safe." Top 10 MITRE ATT&CK© Techniques Behind 93% of Attacks Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

Daily Brief Summary

DATA BREACH // FTC Mandates GoDaddy to Enhance Security After Data Breaches

The FTC has finalized an order for GoDaddy to improve its security measures due to multiple data breaches and misleading security claims.

Since 2018, GoDaddy experienced several security incidents, culminating in breaches in 2020 and 2021 where critical customer data was compromised.

GoDaddy's security inadequacies included a lack of multi-factor authentication, insufficient software updates, and ineffective monitoring for threats.

The settlement requires GoDaddy to establish a comprehensive information security program and employ multi-factor authentication across its services.

GoDaddy must also secure its APIs, update its software and firmware management, and hire an external assessor to review its security practices biennially.

The company is obliged to report any significant security incidents within 10 days and ensure no misleading communication about its security measures to users.

Despite these breaches, GoDaddy stated it had already begun implementing some of the FTC's required security improvements, anticipating minimal financial impact from the compliance.