Security

CSO

GoDaddy slapped with wet lettuce for years of lax security and 'several major breaches'

Watchdog alleged it had no SIEM or MFA, orders rapid adoption of basic infosec tools


GoDaddy has failed to protect its web-hosting platform with even basic infosec tools and practices since 2018, according to the FTC, but the internet giant won’t face any immediate consequences for its many alleged acts of omission.

As one of the world's largest web-hosting companies, and a registry and registrar with about 82 million domain names in its care, one would assume GoDaddy would be adept at applying software updates and monitoring security-related events in its hosting environment to protect its millions of customers and the visitors to their websites from online threats.

But according to a Wednesday statement from the FTC, “GoDaddy has failed to implement reasonable and appropriate security measures to protect and monitor its website-hosting environments for security threats, and misled customers about the extent of its data security protections on its website hosting services.”

A formal complaint [PDF] against the company, drawn up by the federal consumer watchdog, describes the biz as “blind to vulnerabilities and threats in its hosting environment" since 2018.

The complaint alleges the web-hosting giant failed to properly manage its assets and inventory, patch its software, assess risks to its hosting services, use multi-factor authentication, log security-related events, monitor for threats, segment its network, and secure connections to services providing access to consumer data.

"As a result of GoDaddy's data security failures, it experienced several major compromises of its hosting service between 2019 and December 2022, in which threat actors repeatedly gained access to its customers' websites and data, causing harm to its customers and putting them and visitors to their websites at risk of further harm," the complaint reads.

Failure to secure its systems make "GoDaddy's representations about security false or misleading," the FTC alleged.

One might assume the FTC would come down hard on GoDaddy – which ironically enough owns web security outfit Sucuri – for allegedly failing to secure its web-hosting services, potentially putting millions of Americans at risk. We'll let you down gently, here: Nope.

Instead, a settlement was proposed [PDF], approved by the FTC's commissioners in a 5-0 bipartisan vote, that gives GoDaddy 90 days to establish, implement, and maintain "a comprehensive information security program."

GoDaddy, which appears to be happy with that deal, does not admit or deny any of the allegations in the FTC complaint. A company spokesperson declined to answer The Register's specific questions — including: “Do you really not use security information and event management, aka SIEM? Or MFA?”

Instead, the spokesperson told us the biz is already on top of some of the infosec demands made of it by the FTC:

GoDaddy has a long history of offering innovative products to our web hosting customers. We are focused on protecting our customers' data and websites, and we invest significant resources in technologies, tools and talent to help safeguard systems and information. We are constantly improving our security capabilities and have already implemented a number of the requirements in the settlement agreement with the FTC.

Notably, the resolution of this matter includes no admission of fault and no monetary penalties. We expect minimal financial impact associated with complying with the terms of the agreement with the FTC. We plan to continue to invest in our defenses to address evolving threats and help keep our customers, their websites and their data safe.

Specifically, this infosec program requires the Arizona-based corporation to create a centralized inventory of hardware, software, and firmware, plus a system for managing updates to these components. GoDaddy also needs to start using automated tools, such as a SIEM, for near-real-time analysis of events, and create and retain system audit logs.

Under the order, which is open to public comment for the next 30 days, the hosting provider will have to roll-out at least one MFA method for all employees, staff, and contractors, and third-party affiliates who have access to any hosting service support tool, including connecting to any database.

Another requirement calls for all API calls to use HTTPS "or an equivalently secure transfer protocol for all requests," among other security measures.

In other words: Basic security hygiene.

Additionally, GoDaddy is prohibited from making misrepresentations about its security, and it has to hire a third-party assessor to review its infosec program.

And, did we mention, no fine? However, if the proposed consent order is finalized after the public-comment period and GoDaddy fails to comply with its terms, the biz could face civil penalties of up to $51,744 for each violation. ®

Send us news
12 Comments

Oh, Deere! FTC sues tractor maker, alleging decades of monopolized repairs

Incoming Trump-picked watchdog boss dissents, calls suit 'hasty' and 'deeply imprudent,' so will it stick?

Biden signs sweeping cybersecurity order, just in time for Trump to gut it

Ransomware, AI, secure software, digital IDs – there's something for everyone in the presidential directive

Microsoft eggheads say AI can never be made secure – after testing Redmond's own products

If you want a picture of the future, imagine your infosec team stamping on software forever

Look for the label: White House rolls out 'Cyber Trust Mark' for smart devices

Beware the IoT that doesn’t get a security tag

CISA: Wow, that election had a lot of foreign trolling. Trump's Homeland Sec pick: And that's none of your concern

Cyber agency too 'far off mission,' says incoming boss Kristi Noem

Infoseccer: Private security biz let guard down, exposed 120K+ files

Assist Security’s client list includes fashion icons, critical infrastructure orgs

Miscreants 'mass exploited' Fortinet firewalls, 'highly probable' zero-day used

Ransomware 'not off the table,' Arctic Wolf threat hunter tells El Reg

Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

'Codefinger' crims on the hunt for compromised keys

After China's Salt Typhoon, the reconstruction starts now

If 40 years of faulty building gets blown down, don’t rebuild with the rubble

Just as your LLM once again goes off the rails, Cisco, Nvidia are at the door smiling

Some of you have apparently already botched chatbots or allowed ‘shadow AI’ to creep in

Europe coughs up €400 to punter after breaking its own GDPR data protection rules

PLUS: Data broker leak reveals extent of info trading; Hot new ransomware gang might be all AI, no bark; and more

Database tables of student, teacher info stolen from PowerSchool in cyberattack

Class act: Cloud biz only serves 60M-plus folks globally, no biggie