A breach at
On April 17, GoDaddy discovered and began investigating suspicious activity that dated back to October, a company representative said. Six days later, GoDaddy identified affected customers and began remediation, the representative said.
GoDaddy “immediately reset the affected usernames and passwords,” which were used only by customers for accessing remotely hosted servers, rather than their main GoDaddy accounts, according to a company statement. GoDaddy has “no indication the threat actor used our customers’ credentials ...
Learn more about Bloomberg Law or Log In to keep reading:
Learn About Bloomberg Law
AI-powered legal analytics, workflow tools and premium legal & business news.
Already a subscriber?
Log in to keep reading or access research tools.