
GoDaddy Company Cyber Security Posture
godaddy.comAt GoDaddy, you’re the star when it comes to your craft—you’re the real deal. But being an entrepreneur means juggling it all: online marketing, digital ads, website building—pretty much everything! That’s why we created GoDaddy Airo for small business owners—designed to help you conquer it all while growing your online business at AI speed. Business dreamers can go from “no clue” to “wow, I did it!” in minutes with Airo—the intelligent experience that can whip up social posts, a classy logo, or a full-blown website out of thin air—powered by AI. 20+ million customers around the globe are convincing the world (and themselves) that they’re top dog entrepreneurs with GoDaddy, and they’re crushing it. With GoDaddy Airo and your vision – It’s like you know what you’re doing 😎
GoDaddy Company Details
godaddy
8349 employees
145030.0
none
Technology, Information and Internet
godaddy.com
Scan still pending
GOD_3070288
In-progress

Between 200 and 800
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

GoDaddy Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 200 and 800 |
GoDaddy Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
GoDaddy | Breach | 100 | 6 | 09/2021 | GOD153630322 | Link | |
Rankiteo Explanation : Attack threatening the economy of a geographical regionDescription: The details of hundreds of websites hosted on Godaddy were compromised in a cyber attack. The attackers used a compromised password and gained access to the provisioning system and breached the system. The attack compromised the user information of more than 1 million users of GoDaddy. | |||||||
GoDaddy | Breach | 60 | 3 | 10/2019 | GOD1441301222 | Link | |
Rankiteo Explanation : Attack with significant impact with internal employee data leaksDescription: An unauthorized party used their web hosting account credentials to connect to GoDaddy hosting account via SSH. GoDaddy is the world’s largest domain registrar and web hosting company that provides services to roughly 19 million customers around the world. The security incident took place on October 19, 2019. An altered SSH file in GoDaddy's hosting environment and suspicious activity were noticed on a subset of GoDaddy's servers. | |||||||
GoDaddy | Breach | 60 | 3 | 11/2020 | GOD2315623 | Link | |
Rankiteo Explanation : Attack with significant impact with internal employee data leaksDescription: GoDaddy reported the compromising of 28,000 of its customers' web hosting accounts. One of its primary domain names is hosted by "GoDaddy," who inadvertently gave a malicious actor control of the account and site. As a result, the actor was able to manipulate several internal email accounts by altering DNS data. After some time had passed, the hostile actor was able to access document storage and compromise some of their infrastructure. Unauthorized changes were made to certain of the domain registration records' settings at GoDaddy, temporarily rerouting the site's email and web traffic. Although it appears that no emails, passwords, or other sensitive information was obtained, the business advised changing the password and turning on 2FA security. | |||||||
GoDaddy | Breach | 50 | 2 | 02/2023 | GOD195781023 | Link | |
Rankiteo Explanation : Attack limited on finance or reputationDescription: GoDaddy, a provider of web hosting services, reported that malware and source code had been stolen from its servers. Threat actors have infiltrated the organization's cPanel shared hosting environment. Although the company is unable to pinpoint the exact moment of the initial penetration, it is currently looking into the breach to ascertain the incident's underlying cause. Random client websites might occasionally be redirected to dangerous websites by the malware that had been installed on the company's computer systems. The organization claimed that the attacks haven't affected their operations or business, but that it believes it was the target of a sophisticated threat actor's strike. | |||||||
GoDaddy | Vulnerability | 100 | 6/2025 | GOD616060625 | Link | ||
Rankiteo Explanation : Attack threatening the organization’s existenceDescription: Hackers are exploiting a critical vulnerability in the Roundcube webmail application, which is widely used by hosting providers like GoDaddy. The vulnerability, CVE-2025-49113, allows remote code execution and has a severity score of 9.9 out of 10. This vulnerability has been present for over a decade and impacts versions 1.1.0 through 1.6.10. Despite a patch being released, attackers have reverse-engineered the fix and are selling exploits on hacker forums. The wide use of Roundcube, including by government and academic institutions, makes the attack surface significant. The vulnerability can lead to data breaches and significant impact on organizations using the application. |
GoDaddy Company Subsidiaries

At GoDaddy, you’re the star when it comes to your craft—you’re the real deal. But being an entrepreneur means juggling it all: online marketing, digital ads, website building—pretty much everything! That’s why we created GoDaddy Airo for small business owners—designed to help you conquer it all while growing your online business at AI speed. Business dreamers can go from “no clue” to “wow, I did it!” in minutes with Airo—the intelligent experience that can whip up social posts, a classy logo, or a full-blown website out of thin air—powered by AI. 20+ million customers around the globe are convincing the world (and themselves) that they’re top dog entrepreneurs with GoDaddy, and they’re crushing it. With GoDaddy Airo and your vision – It’s like you know what you’re doing 😎
Access Data Using Our API

Get company history
.png)
GoDaddy Cyber Security News
Making Meaningful Contributions: Meet Abhishek Kumar Sah
Today, as a Senior Security Engineer at GoDaddy, I focus on building and fine-tuning threat detection strategies to protect our environment. What continues to ...
FTC cracks down on GoDaddy for cybersecurity failings
GoDaddy's failure to use industry standard security measures led to what the FTC called “several major security breaches” between 2019 and 2022.
GoDaddy Hit With an FTC Order Mandating a Robust Security Program After a Series of Data Breaches
GoDaddy slapped with FTC order for failing to prevent data breaches · FTC order requires implementation of security measures.
FTC orders GoDaddy to upgrade cybersecurity defenses following three breaches
The FTC found that GoDaddy failed to use basic cybersecurity measures to protect its customers, including multi-factor authentication, regular ...
5 ways teams can comply with the FTC’s GoDaddy ruling
COMMENTARY: The FTC's finalized order against GoDaddy last week marks a strategic breakpoint in cybersecurity oversight.
FTC finalizes order requiring GoDaddy to secure hosting services
The U.S. Federal Trade Commission (FTC) has finalized an order requiring web hosting giant GoDaddy to secure its services to settle charges ...
FTC Orders GoDaddy to Bolster its Security After Years of Attacks
The FTC pointed to failures by GoDaddy to protect the data it holds that led to “several major security breaches” between 2019 and 2022, which ...
FTC Finalizes Settlement With GoDaddy Over Data Security Failures
In a complaint first announced in January 2025, the FTC charged that GoDaddy falsely marketed its services as offering “award-winning security” ...
GoDaddy Pledges Improved Cybersecurity in US FTC Settlement
Internet registrar and web host GoDaddy agreed to two decades worth of third-party assessments over its cybersecurity practices in a ...

GoDaddy Similar Companies

Flipkart
At Flipkart, we're driven by our purpose of empowering every Indian's dream by delivering value through innovation in technology and commerce. With a customer base of over 350 million, product coverage of over 150 million across 80+ categories, a focus on generating direct and indirect employment an

OYO
OYO is a global platform that aims to empower entrepreneurs and small businesses with hotels and homes by providing full-stack technology products and services that aims to increase revenue and ease operations; bringing easy-to-book, affordable, and trusted accommodation to customers around the worl

Joomla!
Joomla, The CMS Trusted By Millions for their Websites Joomla is an award-winning content management system (CMS), which enables you to build Web sites and powerful online applications. Joomla is the mobile-ready and user-friendly way to build your website. Choose from thousands of features and d

The Death Star
The mission of the Death Star is to keep the local systems "in line". As we have recently dissolved our Board of Directors, there is little resistance to our larger goal of universal domination. Our Stormtroopers are excellent shots and operate with our Navy, and are fielded like marines - sep

Binance
Binance is the world’s leading blockchain ecosystem and cryptocurrency infrastructure provider with a product suite that includes the world's largest digital asset exchange and much more. Trusted by over 200 millions of users worldwide, the Binance platform is dedicated to increasing the freedom of

MyFunLIFE
MyFunLIFE is a new way to give people the FUN they really want in life and the FREEDOM they deserve! At MyFunLIFE it is our mission to create more fun, freedom and fulfillment in peoples lives by offering amazing products, cutting edge technology and unparalleled opportunity. See you on the beach

Frequently Asked Questions (FAQ) on Cybersecurity Incidents
GoDaddy CyberSecurity History Information
Total Incidents: According to Rankiteo, GoDaddy has faced 5 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include ['Breach', 'Vulnerability'].
Total Financial Loss: The total financial loss from these incidents is estimated to be {total_financial_loss}.
Cybersecurity Posture: The company's overall cybersecurity posture is described as At GoDaddy, you’re the star when it comes to your craft—you’re the real deal. But being an entrepreneur means juggling it all: online marketing, digital ads, website building—pretty much everything! That’s why we created GoDaddy Airo for small business owners—designed to help you conquer it all while growing your online business at AI speed. Business dreamers can go from “no clue” to “wow, I did it!” in minutes with Airo—the intelligent experience that can whip up social posts, a classy logo, or a full-blown website out of thin air—powered by AI. 20+ million customers around the globe are convincing the world (and themselves) that they’re top dog entrepreneurs with GoDaddy, and they’re crushing it. With GoDaddy Airo and your vision – It’s like you know what you’re doing 😎.
Detection and Response: The company detects and responds to cybersecurity incidents through {description_of_detection_and_response_process}.
Incident Details

Incident 1: Ransomware Attack
Title: {Incident_Title}
Description: {Brief_description_of_the_incident}
Date Detected: {Detection_Date}
Date Publicly Disclosed: {Disclosure_Date}
Date Resolved: {Resolution_Date}
Type: {Type_of_Attack}
Attack Vector: {Attack_Vector}
Vulnerability Exploited: {Vulnerability}
Threat Actor: {Threat_Actor}
Motivation: {Motivation}

Incident 2: Data Breach
Title: {Incident_Title}
Description: {Brief_description_of_the_incident}
Date Detected: {Detection_Date}
Date Publicly Disclosed: {Disclosure_Date}
Date Resolved: {Resolution_Date}
Type: {Type_of_Attack}
Attack Vector: {Attack_Vector}
Vulnerability Exploited: {Vulnerability}
Threat Actor: {Threat_Actor}
Motivation: {Motivation}
Common Attack Types: The most common types of attacks the company has faced are ['Breach'].
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through {description_of_identification_process}.
Impact of the Incidents

Incident 1: Ransomware Attack
Financial Loss: {Financial_Loss}
Data Compromised: {Data_Compromised}
Systems Affected: {Systems_Affected}
Downtime: {Downtime}
Operational Impact: {Operational_Impact}
Conversion Rate Impact: {Conversion_Rate_Impact}
Revenue Loss: {Revenue_Loss}
Customer Complaints: {Customer_Complaints}
Brand Reputation Impact: {Brand_Reputation_Impact}
Legal Liabilities: {Legal_Liabilities}
Identity Theft Risk: {Identity_Theft_Risk}
Payment Information Risk: {Payment_Information_Risk}

Incident 2: Data Breach
Financial Loss: {Financial_Loss}
Data Compromised: {Data_Compromised}
Systems Affected: {Systems_Affected}
Downtime: {Downtime}
Operational Impact: {Operational_Impact}
Conversion Rate Impact: {Conversion_Rate_Impact}
Revenue Loss: {Revenue_Loss}
Customer Complaints: {Customer_Complaints}
Brand Reputation Impact: {Brand_Reputation_Impact}
Legal Liabilities: {Legal_Liabilities}
Identity Theft Risk: {Identity_Theft_Risk}
Payment Information Risk: {Payment_Information_Risk}
Average Financial Loss: The average financial loss per incident is {average_financial_loss}.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are {list_of_commonly_compromised_data_types}.

Incident 1: Ransomware Attack
Entity Name: {Entity_Name}
Entity Type: {Entity_Type}
Industry: {Industry}
Location: {Location}
Size: {Size}
Customers Affected: {Customers_Affected}

Incident 2: Data Breach
Entity Name: {Entity_Name}
Entity Type: {Entity_Type}
Industry: {Industry}
Location: {Location}
Size: {Size}
Customers Affected: {Customers_Affected}
Response to the Incidents

Incident 1: Ransomware Attack
Incident Response Plan Activated: {Yes/No}
Third Party Assistance: {Yes/No}
Law Enforcement Notified: {Yes/No}
Containment Measures: {Containment_Measures}
Remediation Measures: {Remediation_Measures}
Recovery Measures: {Recovery_Measures}
Communication Strategy: {Communication_Strategy}
Adaptive Behavioral WAF: {Adaptive_Behavioral_WAF}
On-Demand Scrubbing Services: {On_Demand_Scrubbing_Services}
Network Segmentation: {Network_Segmentation}
Enhanced Monitoring: {Enhanced_Monitoring}

Incident 2: Data Breach
Incident Response Plan Activated: {Yes/No}
Third Party Assistance: {Yes/No}
Law Enforcement Notified: {Yes/No}
Containment Measures: {Containment_Measures}
Remediation Measures: {Remediation_Measures}
Recovery Measures: {Recovery_Measures}
Communication Strategy: {Communication_Strategy}
Adaptive Behavioral WAF: {Adaptive_Behavioral_WAF}
On-Demand Scrubbing Services: {On_Demand_Scrubbing_Services}
Network Segmentation: {Network_Segmentation}
Enhanced Monitoring: {Enhanced_Monitoring}
Incident Response Plan: The company's incident response plan is described as {description_of_incident_response_plan}.
Third-Party Assistance: The company involves third-party assistance in incident response through {description_of_third_party_involvement}.
Data Breach Information

Incident 2: Data Breach
Type of Data Compromised: {Type_of_Data}
Number of Records Exposed: {Number_of_Records}
Sensitivity of Data: {Sensitivity_of_Data}
Data Exfiltration: {Yes/No}
Data Encryption: {Yes/No}
File Types Exposed: {File_Types}
Personally Identifiable Information: {Yes/No}
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: {description_of_prevention_measures}.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through {description_of_handling_process}.
Ransomware Information

Incident 1: Ransomware Attack
Ransom Demanded: {Ransom_Amount}
Ransom Paid: {Ransom_Paid}
Ransomware Strain: {Ransomware_Strain}
Data Encryption: {Yes/No}
Data Exfiltration: {Yes/No}
Ransom Payment Policy: The company's policy on paying ransoms in ransomware incidents is described as {description_of_ransom_payment_policy}.
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through {description_of_data_recovery_process}.
Regulatory Compliance

Incident 1: Ransomware Attack
Regulations Violated: {Regulations_Violated}
Fines Imposed: {Fines_Imposed}
Legal Actions: {Legal_Actions}
Regulatory Notifications: {Regulatory_Notifications}

Incident 2: Data Breach
Regulations Violated: {Regulations_Violated}
Fines Imposed: {Fines_Imposed}
Legal Actions: {Legal_Actions}
Regulatory Notifications: {Regulatory_Notifications}
Regulatory Frameworks: The company complies with the following regulatory frameworks regarding cybersecurity: {list_of_regulatory_frameworks}.
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through {description_of_compliance_measures}.
Lessons Learned and Recommendations

Incident 1: Ransomware Attack
Lessons Learned: {Lessons_Learned}

Incident 2: Data Breach
Lessons Learned: {Lessons_Learned}

Incident 1: Ransomware Attack
Recommendations: {Recommendations}

Incident 2: Data Breach
Recommendations: {Recommendations}
Key Lessons Learned: The key lessons learned from past incidents are {list_of_key_lessons_learned}.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: {list_of_implemented_recommendations}.
References
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at {list_of_additional_resources}.
Investigation Status

Incident 1: Ransomware Attack
Investigation Status: {Investigation_Status}

Incident 2: Data Breach
Investigation Status: {Investigation_Status}
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through {description_of_communication_process}.
Stakeholder and Customer Advisories

Incident 1: Ransomware Attack
Stakeholder Advisories: {Stakeholder_Advisories}
Customer Advisories: {Customer_Advisories}

Incident 2: Data Breach
Stakeholder Advisories: {Stakeholder_Advisories}
Customer Advisories: {Customer_Advisories}
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: {description_of_advisories_provided}.
Initial Access Broker

Incident 1: Ransomware Attack
Entry Point: {Entry_Point}
Reconnaissance Period: {Reconnaissance_Period}
Backdoors Established: {Backdoors_Established}
High Value Targets: {High_Value_Targets}
Data Sold on Dark Web: {Yes/No}

Incident 2: Data Breach
Entry Point: {Entry_Point}
Reconnaissance Period: {Reconnaissance_Period}
Backdoors Established: {Backdoors_Established}
High Value Targets: {High_Value_Targets}
Data Sold on Dark Web: {Yes/No}
Monitoring and Mitigation of Initial Access Brokers: The company monitors and mitigates the activities of initial access brokers through {description_of_monitoring_and_mitigation_measures}.
Post-Incident Analysis

Incident 1: Ransomware Attack
Root Causes: {Root_Causes}
Corrective Actions: {Corrective_Actions}

Incident 2: Data Breach
Root Causes: {Root_Causes}
Corrective Actions: {Corrective_Actions}
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as {description_of_post_incident_analysis_process}.
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: {list_of_corrective_actions_taken}.
Additional Questions
General Information
Ransom Payment History: The company has {paid/not_paid} ransoms in the past.
Last Ransom Demanded: The amount of the last ransom demanded was {last_ransom_amount}.
Last Attacking Group: The attacking group in the last incident was {last_attacking_group}.
Incident Details
Most Recent Incident Detected: The most recent incident detected was on {most_recent_incident_detected_date}.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on {most_recent_incident_publicly_disclosed_date}.
Most Recent Incident Resolved: The most recent incident resolved was on {most_recent_incident_resolved_date}.
Impact of the Incidents
Highest Financial Loss: The highest financial loss from an incident was {highest_financial_loss}.
Most Significant Data Compromised: The most significant data compromised in an incident was {most_significant_data_compromised}.
Most Significant System Affected: The most significant system affected in an incident was {most_significant_system_affected}.
Response to the Incidents
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was {third_party_assistance_in_most_recent_incident}.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were {containment_measures_in_most_recent_incident}.
Data Breach Information
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was {most_sensitive_data_compromised}.
Number of Records Exposed: The number of records exposed in the most significant breach was {number_of_records_exposed}.
Ransomware Information
Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was {highest_ransom_demanded}.
Highest Ransom Paid: The highest ransom paid in a ransomware incident was {highest_ransom_paid}.
Regulatory Compliance
Highest Fine Imposed: The highest fine imposed for a regulatory violation was {highest_fine_imposed}.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was {most_significant_legal_action}.
Lessons Learned and Recommendations
Most Significant Lesson Learned: The most significant lesson learned from past incidents was {most_significant_lesson_learned}.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was {most_significant_recommendation_implemented}.
References
Most Recent Source: The most recent source of information about an incident is {most_recent_source}.
Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is {most_recent_url}.
Investigation Status
Current Status of Most Recent Investigation: The current status of the most recent investigation is {current_status_of_most_recent_investigation}.
Stakeholder and Customer Advisories
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was {most_recent_stakeholder_advisory}.
Most Recent Customer Advisory: The most recent customer advisory issued was {most_recent_customer_advisory}.
Initial Access Broker
Most Recent Entry Point: The most recent entry point used by an initial access broker was {most_recent_entry_point}.
Most Recent Reconnaissance Period: The most recent reconnaissance period for an incident was {most_recent_reconnaissance_period}.
Post-Incident Analysis
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was {most_significant_root_cause}.
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was {most_significant_corrective_action}.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
