At the time, it was unknown whether the DNS record hijacking was due to a security hole or stolen login credentials, but Scott Gerlach, Go Daddy’s Director of Information Security Operations, has reassured the company's customers by stating yesterday that it was due to phishing.
"Go Daddy has detected a very small number of accounts have malicious DNS entries placed on their domain names. We have been identifying affected customers and reversing the malicious entries as we find them. Also, we’re expiring the passwords of affected customers so the threat actors cannot continue to use the accounts to spread malware," he shared with TNW.
"We suspect that the affected customers have been phished or their home machines have been affected by Cool Exploit as we have confirmed that this is not a vulnerability in the My Account or DNS management systems."
He advised customers located in the US and Canada to enable two-step authentication to help protect their accounts and prevent this from happening to them. The rest of the customers will have to wait for the option to be made available.
In the meantime, all customers would do well to consider changing their passwords to a stronger one that they haven't used for any other service.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.