If Your Business’s WordPress Website is Hosted with GoDaddy, You Must Take Action Now

Last week, GoDaddy announced a major breach in its security, involving more than a million customers. If your business could be affected, there are some urgent actions you must take now.

You’ve probably heard of GoDaddy. It’s been around since the late 1990s when it started as a place to build and host your website. Later, it became famous for selling domain names. These days, it’s a huge internet company with revenue over $3 billion.

One of the things GoDaddy does is host WordPress websites. WordPress is a very popular Content Management System (CMS) that powers a third of all websites.

It announced last week that a hacker got into one of its WordPress hosting systems in early September by using a compromised password. The hacker was kicked out mid-November, but not before gaining access to data from 1.2 million WordPress hosted customers. Specifically, the hacker could access email addresses, original WordPress admin passwords, and other usernames and passwords.

If your business hosts a WordPress website with GoDaddy, please don’t panic. You may not be affected as the company hosts 5 million websites in total. We have been told that the breached passwords have been reset and that everyone affected has been contacted.

However, we prefer playing it 100% safe. We believe there are two risks you must protect yourself against. The first is phishing. This is where a cyber-criminal sends an email pretending to be someone they’re not, such as a big supplier or your bank. They want you to click on a bad link to either give them access to your network, or accidentally download malicious software, known as malware.

Any time your email address is compromised, you are likely to be the target of more phishing emails. The way to mitigate this risk is to train your staff on what to look out for and what to do if they are targeted in a phishing attack.

The second and greater risk is that someone has already been able to log into your website. Even though GoDaddy has now reset the passwords, it seems the hacker enjoyed free access to all this data for up to two months. There’s a possibility they could have logged into your website, and hidden malicious files there.

To play it safe, we recommend these three urgent steps:

  1. Change all admin passwords on your website.
  2. Check that there are no new admins that you didn’t set up. If there are, remove them immediately.
  3. Run a thorough security scan on your website to look for backdoor access (a secret place where hackers can get in), trojans and malicious files.

If you need help with any of this, please contact us immediately. We can be reached at 905-231-1303 or info@durham-it.ca

 

Published with permission from Your Tech Updates.