If your business’s WordPress website is hosted with GoDaddy, you must take these urgent actions now

GoDaddy last week announced a major breach in its security, involving more than a million of its customers. And if your business could be affected, there are some urgent actions you must take now.

You’ve probably heard of GoDaddy. It’s been around since the late 1990s when it started as a place to build and host your website.

Later it became famous for selling domain names. These days it’s a huge internet company, with revenues of more than $3 billion.

One of the things GoDaddy does is host WordPress websites. WordPress is a very popular Content Management System (CMS) that powers a third of all websites.

It announced last week that a hacker got into one of its WordPress hosting systems in early September, by using a compromised password.

And before the hacker was kicked out in the middle of November, they had access to data from 1.2 million WordPress hosted customers.

Specifically, the hacker could access email addresses, original WordPress admin passwords, and other usernames and passwords.

If your business hosts a WordPress website with GoDaddy, please don’t panic. You may not be affected. The company hosts 5 million websites in total. It says it has reset the breached passwords and contacted everyone affected.

However. We prefer playing 100% safe. And we believe there are two risks you must protect yourself against.

The first is phishing. This is where a cyber-criminal sends an email pretending to be someone they’re not, such as a big supplier or your bank. They want you to click on a bad link to either give them access to your network, or accidentally download malicious software, known as malware.

Any time your email address is compromised, you are likely to be the target of more phishing emails.

The way to mitigate this risk is to train your staff what to look out for, and what to do is they are targeted in a phishing attack.

The second and greater risk is that someone has already been able to log into your website.

Even though GoDaddy has now reset the passwords, it seems the hacker enjoyed free access to all this data for up to two months.

There’s a possibility they could have logged into your website and hidden malicious files there.

To play it safe, we recommend these Cache4 urgent steps:

  • 1.Change all admin passwords on your website
  • 2. Turn on 2FA/MFA
  • 3.Check there are no new admins that you didn’t set up. If there are, remove them immediately
  • 4.Run a thorough security scan on your website to look for backdoor access (a secret place where hackers can get in), trojans and malicious files

If you need help with any of this, please contact us immediately.

Published with permission from Your Tech Updates. 


profile image

Paul Crooks

An entrepreneur with over 9 years of experience, Paul has successfully run several businesses and is known as a problem-solver who loves to help.Active and respected in the Managed Service Provider sector, Paul has made significant contributions to both the industry and his local community in Carlisle, Cumbria.A passionate enthusiast of Artificial Intelligence, Paul is always keen on exploring and implementing the latest AI technologies in business solutions.Outside of work, Paul enjoys hiking in the beautiful Cumbria fells and is an avid football fan.
around the desk meeting with technicians and director

Pop in or give us a call

Why not call into our office in Lowry Hill, Carlisle, give us a call on 01228 812614 or drop us an email?

We’re all about IT and keeping IT simple and affordable for everyone.