"Name.com recently discovered a security breach where customer account information including usernames, email addresses, and encrypted passwords and encrypted credit card account information may have been accessed by unauthorized individuals. It appears that the security breach was motivated by an attempt to gain information on a single, large commercial account at Name.com," says the letter.
"Name.com stores your credit card information using strong encryption and the private keys required to access that information are stored physically in a separate remote location that was not compromised. Therefore, we donít believe that your credit card information was accessed in a usable format. Additionally, your EPP codes (required for domain transfers) were unaffected as they are also stored separately. We have no evidence to suggest that your data has been used for fraudulent activities."
They require users to reset their passwords before logging in, and advise changing the password for other online services if the used the same one.
The breach appears to be related with the Linode hack executed earlier this year.
If the latest edition of the 'zine published by the hacker collective "Hack The Planet" is to be believed, Linode and Name.com (its registrar) are just two of the many institutions and organization successfully targeted by the group in the last six months.
The list also includes web servers of MIT (they claim to have gained administrator access to all .edu domains), Nmap, Sucuri, Wireshark, and others. Apparently, the servers were compromised via vulnerabilities in ColdFusion and the MoinMoin wiki engine.