GoDaddy DNS Hack That Took Down Millions Of Sites Allegedly Came From Member Of Anonymous
Yesterday the world’s largest domain provider, GoDaddy, experienced massive DNS outages that took down millions of sites worldwide for several hours. While GoDaddy didn’t disclose the source of the issue, one member of ‘Anonymous” took claim to the outages as his own doing. The Twitter account AnonymousOwn3r has confessed to the alleged attack saying:
Hello everyone who wanna me to put 99% of the global Internet in #tangodown?
— Anonymous Own3r (@AnonymousOwn3r) September 10, 2012
GoDaddy stated on their website that intermittent outages have occurred and that at no time was any sensitive information compromised.:
At 10:25 am PT, GoDaddy.com and associated customer services experienced intermittent outages. Services began to be restored for the bulk of affected customers
at 2:43 pm PT. At no time was any sensitive customer information, such as credit card data, passwords or names and addresses, compromised. We will provide an additional update within the next 24 hours. We want to thank our customers for their patience and support.
During the outage, GoDaddy actually moved their DNS over to Verisign, a competitor. The Verisign name servers were not under attack and most of the issues were fixed by the end of the day Monday.
GoDaddy has partaken in questionable activities over the past few years making them an ideal target for disgruntled cyberattackers. From SOPA support to questionable ethics to using sex to sell domains, GoDaddy’s aggressive tactics have made them a target.
For more information on outages & uptime, see the temporary message box on the GoDaddy homepage.
GoDaddy has claimed that an attack was not the driving force behind the outages.
Some opinions expressed in this article may be those of a guest author and not necessarily Marketing Land. Staff authors are listed here.
(Some images used under license from Shutterstock.com.)
Sign up for content marketing news and tips delivered every Tuesday.