GoDaddy has admitted that it was attacked. The attackers managed to deceive GoDaddy employees who worked in the domain registration department. In this way, they redirected the traffic of emails and the web on various cryptocurrency trading platforms to their own websites last week.
Η σελίδα Krebs on Security he says that the attack began on November 13 with an attack on liquid.com.
"The hosting provider GoDaddy, which manages one of our core domains, mistakenly handed over control of the domain to a malicious user," Liquid CEO Mike Kayamori said in a post on the company's blog.
"This allowed the malicious user to modify the DNS and take control of a number of internal email accounts. Thus it managed to partially endanger our infrastructure and gain access to store records.
In the early morning hours of November 18, 2020 (CET), mining service NiceHash discovered that some of the DNS settings for its GoDaddy domain had been changed. So the malicious ones users redirected email and domain traffic. NiceHash froze all transactions for approximately 24 hours until they verified that the domain settings had been reset to their original state. "So far no emails, passwords or personal information appear to have been leaked, but we recommend changing your password and enabling 2FA security," the company said on its blog.
Many cryptocurrency platforms accepted attacks probably from the same group. Sta domains including: Bibox.com, Celsius.network and Wirex.app.
GoDaddy told KrebsOnSecurity that "a small number of its customers' domains were switched" when a "limited number of GoDaddy employees" fell victim to a social engineering fraud.
GoDaddy is often victim of attacks.