GoDaddy has admitted that it was attacked. The attackers managed to deceive GoDaddy employees who worked in the domain registration department. In this way, they redirected the traffic of emails and the web on various cryptocurrency trading platforms to their own websites last week.
Η σελίδα Krebs on Security he says that the attack began on November 13 with an attack on liquid.com.
"The hosting provider GoDaddy, which manages one of our core domains, mistakenly handed over control of the domain to a malicious user," Liquid CEO Mike Kayamori said in a post on the company's blog.
"This allowed the malicious user to modify the DNS and take control of a number of internal email accounts. Thus it managed to partially endanger our infrastructure and gain access to store records.
In the early morning hours of November 18, 2020 (CET), the mining service NiceHash discovered that some of the DNS settings for the domain it had at GoDaddy had been changed. So the malicious users redirected the domain's email and traffic. NiceHash froze all transactions for approximately 24 hours until they verified that the domain settings had been reset to their original state. “So far no emails appear to have been leaked, passwords or personal information, but we recommend changing your password and enabling 2FA security," the company said on its blog.
Many cryptocurrency platforms accepted attacks probably from the same group. The domains include: Bibox.com, Celsius.network and Wirex.app.
GoDaddy told KrebsOnSecurity that "a small number of its clients' domains had changed" when a "limited number" of GoDaddy employees fell victim to a social engineering scam.
GoDaddy is often victim of attacks.