A breach at
On April 17, GoDaddy discovered and began investigating suspicious activity that dated back to October, a company representative said. Six days later, GoDaddy identified affected customers and began remediation, the representative said.
GoDaddy “immediately reset the affected usernames and passwords,” which were used only by customers for accessing remotely hosted servers, rather than their main GoDaddy accounts, according to a company statement. GoDaddy has “no indication the threat actor used our customers’ credentials ...
Learn more about Bloomberg Law or Log In to keep reading:
See Breaking News in Context
Bloomberg Law provides trusted coverage of current events enhanced with legal analysis.
Already a subscriber?
Log in to keep reading or access research tools and resources.