PHP Exploit – RESOLVED
Not what you're looking for?
We want your feedback!
UPDATE: 9/19/10 at 11:36 pm EDT: The exploit affecting PHP files on several Go Daddy accounts this past weekend has been resolved.
Go Daddy’s Security Team worked quickly to clean and restore all affected sites. The exploit was caused by malicious files uploaded via FTP to customer websites.
As a good security practice, Go Daddy recommends all customers change their FTP passwords on a regular basis. To modify your FTP password please follow the steps provided in our help documentation.
As always, Go Daddy’s Security Team is here for you. If you ever suspect your site is under attack, please fill out our security submission form, located here – godaddy.com/securityissue – and notify Go Daddy’s 24/7 Customer Support.
An exploit affected PHP files on approximately 150 Go Daddy accounts Friday afternoon. Go Daddy’s Security Team worked quickly to clean and restore these websites, however, we have detected additional customer sites that may currently be experiencing difficulties due to this same attack.
Go Daddy’s Security Team has identified the cause. Our forensics have determined malicious files are being uploaded via FTP to customer websites. Go Daddy is asking all customers who believe they have a problem to change their FTP passwords.
Meantime, our team is working swiftly to restore all affected websites and appreciates customer feedback. Go Daddy will continue to monitor as long as it takes to ensure our customer accounts are clean.
If you suspect your site was impacted, please fill out our security submission form, located here – http://www.godaddy.com/securityissue.
Go Daddy Chief Information Security Officer