WASHINGTON, Sept 10, 2012 (AFP) – A member of a hacker collective claimed credit Monday for downing the Web hosting firm GoDaddy, which manages millions of websites around the world.
Credit was claimed on Twitter by AnonymousOwn3r, identified as the “security leader” of the loosely organized hacker group knows as Anonymous.
“Hello http://godaddy.com/ now yes! all servers #tangodown by @AnonymousOwn3r,” a tweet said, using the code word for a hack attack.
When some news sites blamed the attack on Anonymous, the same individual responded on Twitter by saying: “it is not Anonymous coletive it’s only me don’t use Anonymous coletive name on it, just my name.”
GoDaddy issued its own statement on Twitter: “Status Alert: Hey, all. We’re aware of the trouble people are having with our site. We’re working on it.”
The company added later: “So many messages, can’t get to you all… Sorry to hear all your frustration. We’re working feverishly to resolve as soon as possible.”
The purported hacker, when asked about his motivation, tweeted; “I’m taking godaddy down bacause well i’d like to test how the cyber security is safe and for more reasons that i can not talk now.”
Another message said the attack had no specific time frame: “it can last one hour or one month,” the tweet said.

More from AFP
- UK Minister Warns Meta Over End-to-End Encryption
- ‘Cybersecurity Incident’ Hits ICC
- China Says No Law Banning iPhone Use in Govt Agencies
- Spies, Hackers, Informants: How China Snoops on the West
- Meta Fights Sprawling Chinese ‘Spamouflage’ Operation
- Two Men Arrested Following Poland Railway Hacking
- UK Court Concludes Teenager Behind Huge Hacking Campaign
- Suspected N. Korean Hackers Target S. Korea-US Drills
Latest News
- Researchers Discover Attempt to Infect Leading Egyptian Opposition Politician With Predator Spyware
- In Other News: New Analysis of Snowden Files, Yubico Goes Public, Election Hacking
- China’s Offensive Cyber Operations in Africa Support Soft Power Efforts
- Air Canada Says Employee Information Accessed in Cyberattack
- BIND Updates Patch Two High-Severity DoS Vulnerabilities
- Faster Patching Pace Validates CISA’s KEV Catalog Initiative
- SANS Survey Shows Drop in 2023 ICS/OT Security Budgets
- Apple Patches 3 Zero-Days Likely Exploited by Spyware Vendor to Hack iPhones
