Last week, millions of GoDaddy websites went offline. This left internet users confused, but it infuriated those who depend on GoDaddy for reliable hosting. While the sites were brought back up after a few hours, the damage had already been done.
So how did GoDaddy, one of the largest domain and hosting companies on the internet, get taken down? According to the self-proclaimed culprit, @AnonymousOwn3r, he used old-school tactics to breach GoDaddy’s defenses.
Instead of using today’s modern “command and control” hacking techniques – techniques which are used by most large hacking groups and botnets, @AnonymousOwn3r reportedly attacked GoDaddy through IRC. He took control of a botnet using Internet Relay Chat (IRC) and then instructed the bots to attack the GoDaddy services with an infusion of malware and viruses.
Despite the name (and his Twitter description), AnonymousOwn3r doesn’t appear to be affiliated with Anonymous in any way. His Twitter description says “Anonymous Official Member!” but Anonymous immediately distanced themselves from the GoDaddy attack after it became known last week.
Meanwhile, GoDaddy continues to claim that the attack had nothing to do with a hacker, and that the problem existed within GoDaddy’s servers. PC security experts say that’s not what happened at all, and that it was @AnonymousOwn3r’s successful use of old school hacking techniques that caused millions of paying GoDaddy customers to lose web access.
For what it’s worth, GoDaddy has rewarded its customers with a free month of hosting, which is a significant amount of money considering that GoDaddy has millions of customers paying for hosting on a monthly basis. Whether it truly was AnonymousOwn3r who entered the GoDaddy system or an internal problem, GoDaddy’s gaff will end up costing the company millions of dollars.