Skip to content

Selfpos

  • Home
  • European Law
  • Canada Law
  • Internet Law
  • Property Law
  • New York Law
  • More
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
  • Toggle search form
GoDaddy ordered to stop lying about crappy security

GoDaddy ordered to stop lying about crappy security

Posted on January 18, 2025 By rehan.rafique No Comments on GoDaddy ordered to stop lying about crappy security

GoDaddy has agreed to roll out some pretty basic security measures and has been told to stop lying about how secure its hosting is, under an agreement with US regulators.

It turns out that the company, while claiming that security “was at the core of everything we do”, was failing to do some pretty basic stuff like installing software patches, retiring end-of-life servers, or securing internet-facing APIs.

Its settlement with the Federal Trade Commission finds that GoDaddy engaged in “false or misleading” advertising and orders that it “must not misrepresent in any manner” its security profile in future.

The FTC complaint (pdf), filed in 2023 after reports of mass hacking incidents, states:

Despite its representations, GoDaddy was blind to vulnerabilities and threats in its hosting environment. Since 2018, GoDaddy has violated Section 5 of the FTC Act by failing to implement standard security tools and practices to protect the environment where it hosts customers’ websites and data, and to monitor it for security threats.

The complaint says that GoDaddy had a slack patching regime that was left up to individual product teams to execute, with no centralized management.

This meant thousands of boxes in its Shared Hosting environment were subject to critical vulnerabilities that allowed bad guys to get in and steal data such as user credentials and credit card info for months.

The complaint also describes a custom internet-facing API designed to enable customer support staff to access details about managed WordPress users, such as login credentials.

This API was apparently open to the internet, unfirewalled, used plaintext for credentials, and had no multi-factor authentication in place, again enabling hackers to steal data.

One or more “threat actors” abused this lax security to pwn tens of thousands of servers between October 2019 and December 2022, according to the complaint.

The settlement (pdf), in which GoDaddy does not admit or deny any wrongdoing, does not come with an associated fine.

Instead, GoDaddy has agreed to a fairly extensive list of requirements designed to increase the security of its hosting services.


If you find this post or this blog useful or interestjng, please support Domain Incite, the independent source of news, analysis and opinion for the domain name industry and ICANN community.

Related

Tweet

Tagged: ftc, godaddy, security

Internet Law

Post navigation

Previous Post: Are signature cards created at the time of opening joint bank accounts held by a parent and adult child sufficient to rebut the presumption of resulting trust?
Next Post: Advocate General Rantos proposes a retroactive interpretation of European type approval law which makes up to 200 Mio type approved motor vehicles in the EU illegal

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Was It Trivial or Consequential?
  • (De)coloniality and EU Legal Studies
  • Can I Sue After Quitting a Toxic Workplace in Ontario?
  • Summaries of judgments: Joined Cases T-830/22 and T-156/23 and Case T-1033/23 Poland v Commission 
  • Best of 2012: Fees, won’t you stay

Copyright © 2025 Selfpos.

Powered by PressBook Blog WordPress theme