Go Daddy says DNS records hijacking was due to phishing
Posted on 27.11.2012
Last week malware peddlers have managed to compromise the DNS records of Go Daddy hosted websites so that they would redirect victims to malicious sites hosting the Cool exploit kit and ultimately leading to ransomware.

At the time, it was unknown whether the DNS record hijacking was due to a security hole or stolen login credentials, but Scott Gerlach, Go Daddy’s Director of Information Security Operations, has reassured the company's customers by stating yesterday that it was due to phishing.

"Go Daddy has detected a very small number of accounts have malicious DNS entries placed on their domain names. We have been identifying affected customers and reversing the malicious entries as we find them. Also, we’re expiring the passwords of affected customers so the threat actors cannot continue to use the accounts to spread malware," he shared with TNW.

"We suspect that the affected customers have been phished or their home machines have been affected by Cool Exploit as we have confirmed that this is not a vulnerability in the My Account or DNS management systems."

He advised customers located in the US and Canada to enable two-step authentication to help protect their accounts and prevent this from happening to them. The rest of the customers will have to wait for the option to be made available.

In the meantime, all customers would do well to consider changing their passwords to a stronger one that they haven't used for any other service.


The big picture of protecting and securing Big Data

Today almost every company is dealing with big data in one way or another – including customer data, tracking data, and behavioral marketing information – connecting every aspect of our lives. While this is a cutting edge use of technology, data monitoring can become dangerous when placed in the wrong hands.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Fri, Aug 28th