GoDaddy has disclosed another cybersecurity incident and the company believes the attack was part of a multi-year campaign conducted by a sophisticated threat actor.
In a statement published last week on its website, the hosting giant said a small number of customers complained in early December 2022 about their websites being intermittently redirected. An analysis showed the redirects occurring on apparently random sites hosted on GoDaddy’s cPanel shared hosting services. The redirects were difficult to reproduce.
Further analysis revealed that hackers had breached servers in the company’s cPanel shared hosting environment and installed malware that caused customer websites to intermittently redirect their visitors.

“We have evidence, and law enforcement has confirmed, that this incident was carried out by a sophisticated and organized group targeting hosting services like GoDaddy. According to information we have received, their apparent goal is to infect websites and servers with malware for phishing campaigns, malware distribution and other malicious activities,” GoDaddy said.
In a 10-K report filed with the US Securities and Exchange Commission (SEC), the hosting company said it believes this and other attacks were part of a multi-year campaign conducted by a sophisticated threat actor that — among other things — installed malware on its systems and obtained source code associated with some of its services.
The same SEC form includes a brief description of previously disclosed incidents that appear to be part of the same campaign. One of them came to light in May 2020, after GoDaddy discovered that the hosting login credentials of 28,000 customers — as well as the credentials of some employees — had been compromised.
GoDaddy also mentioned a November 2021 incident where a compromised password was used to access a provisioning system linked to Managed WordPress services. This hack impacted 1.2 million customers across several GoDaddy brands.
“To date, these incidents as well as other cyber threats and attacks have not resulted in any material adverse impact to our business or operations, but such threats are constantly evolving, increasing the difficulty of detecting and successfully defending against them,” GoDaddy explained in the SEC report.
Related: Hackers Trick GoDaddy Employees in Operation Targeting Cryptocurrency Services
Related: GoDaddy Says Several Brands Hit by Recent WordPress Hosting Breach
Related: Hackers Hit Web Hosting Provider Linked to Oregon Elections

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Thousands Access Fake DDoS-for-Hire Websites Set Up by UK Police
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Dole Says Employee Information Compromised in Ransomware Attack
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
Latest News
- 14 Million Records Stolen in Data Breach at Latitude Financial Services
- Webinar Today: Understanding Hidden Third-Party Identity Access Risks
- Thousands Access Fake DDoS-for-Hire Websites Set Up by UK Police
- iOS Security Update Patches Exploited Vulnerability in Older iPhones
- Microsoft: No-Interaction Outlook Zero Day Exploited Since Last April
- US to Adopt New Restrictions on Using Commercial Spyware
- Hackers Earn Over $1 Million at Pwn2Own Exploit Contest
- GoAnywhere Zero-Day Attack Hits Major Orgs
