Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


  • Categories
  • Recent
  • Tags
  • Popular
  • Bookmarks
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse

Cloudron Forum

Apps | Demo | Docs | Install

GoDaddy had another privacy breach - reset your passwords!!

Scheduled Pinned Locked Moved Off-topic
7 Posts 5 Posters 674 Views
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • d19dotcaD Offline
    d19dotcaD Offline
    d19dotca
    wrote on last edited by d19dotca
    #1

    FYI - https://www.theverge.com/2021/11/22/22796729/godaddy-email-addresses-passwords-security-breach-managed-wordpress-ssl-keys - "Over a million GoDaddy WordPress customers had email addresses exposed in latest breach"

    Looks like this was related to people using Managed WordPress services though from them, but I tend to use these as a great excuse to reset any account-related passwords with that provider regardless if you use that particular service or not. So a good idea to reset any GoDaddy passwords just to be safe. 🙂

    Sharing here since GoDaddy is a service used by many and because Cloudron integrates with them. FWIW - I'd recommend not using them if possible as they have a bad reputation in the industry (which is an entirely different conversation lol). Not that nobody will ever be hacked, it's a "only a matter of when, not if" type thing, but GoDaddy has had so many over the years that it'd a bit embarrassing IMO and I'd intentionally avoid them wherever possible. Just my two cents though.

    --
    Dustin Dauncey
    www.d19.ca

    jdaviescoatesJ 1 Reply Last reply
    4
  • jdaviescoatesJ Offline
    jdaviescoatesJ Offline
    jdaviescoates
    replied to d19dotca on last edited by
    #2

    @d19dotca I'd suggest not just changing passwords but completely ditching GoDaddy who are just a really shitty company.

    I use Cloudron with Gandi & Hetzner

    timconsidineT 1 Reply Last reply
    2
  • timconsidineT Offline
    timconsidineT Offline
    timconsidine App Dev
    replied to jdaviescoates on last edited by
    #3

    @jdaviescoates 💯 %

    I moved everything from GoDaddy to Uniregistry .... and then GoDaddy bought Uniregistry !! I was truly miffed !

    I also hate Network Solutions who are most rapacious company I have ever known, and whose pricing model was designed along Moroccan bazaar principles.

    jdaviescoatesJ 1 Reply Last reply
    1
  • jdaviescoatesJ Offline
    jdaviescoatesJ Offline
    jdaviescoates
    replied to timconsidine on last edited by jdaviescoates
    #4

    @timconsidine you'll be safe with gandi.net, they'd never sell themselves to someone like GoDaddy (indeed I doubt they'd ever sell themselves to anyone).

    https://www.gandi.net/en-GB/no-bullshit

    Joker.com are also good for domains, but not yet integrated with Cloudron.

    I use Cloudron with Gandi & Hetzner

    1 Reply Last reply
    2
  • J Offline
    J Offline
    JLX89
    wrote on last edited by
    #5

    FYI -- This breach just expanded to include tsoHost, Media Temple, 123Reg, Domain Factory, Heart Internet, and Host Europe.

    jdaviescoatesJ 1 Reply Last reply
    3
  • jdaviescoatesJ Offline
    jdaviescoatesJ Offline
    jdaviescoates
    replied to JLX89 on last edited by
    #6

    @jlx89 yep, thanks for sharing. I got this from Wordfence too

    https://www.wordfence.com/blog/2021/11/godaddy-tsohost-mediatemple-123reg-domain-factory-heart-internet-host-europe/

    I use Cloudron with Gandi & Hetzner

    1 Reply Last reply
    1
  • S Offline
    S Offline
    Stephanie_Sy
    wrote on last edited by
    #7

    GoDaddy blocked the third party from its system. However, the attacker had already been using the compromised password since Sept. 6, giving them more than two months to do damage before they were discovered.

    1 Reply Last reply
    2

  • Login

  • Don't have an account? Register

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • Bookmarks
  • Login

  • Don't have an account? Register

  • Login or register to search.