Go Daddy mass hack points surfers towards malware
Source: The Register UK - Posted by Anthony Pell   
Network Security Hundreds of Go Daddy sites were compromised to point towards a site hosting malware last weekend. The mass hack of around 445 sites involved the injection of hostile code into the .htaccess files of the sites. Go Daddy quickly removed the hostile code before working with its customers to take back full control of the sites, which were reportedly compromised by a password hack.

Go Daddy’s chief information security officer, Todd Redfoot, told Domain Name Wire: "The accounts were accessed using the account holder’s username and password.”

Read this full article at The Register UK

Only registered users can write comments.
Please login or register.

Powered by AkoComment!