It seems to me the most likely thing is that this collection of credentials
was obtained through conventional means like keyloggers or phishing.

On Sun, Sep 25, 2011 at 2:44 PM, Joel Esler <[email protected]> wrote:

> Okay, so where is the "fight back" part of it?
>
>
> On Sep 25, 2011, at 10:35 AM, Jeffrey Walton wrote:
>
> >
> http://www.internetretailer.com/2011/09/23/godaddy-fights-back-against-hacker-attack
> >
> > GoDaddy.com Inc,... says it “quickly” removed malicious software code
> > that had infected approximately 445 of its clients’ web sites last
> > week....
> >
> > Hackers had used the usernames and passwords of Go Daddy account
> > holders to enter the protected areas of their web sites, then
> > installed software code that redirected visitors to a fraudulent web
> > site designed to capture consumer account information...
> >
> > GoDaddy did not say how many of the infected sites were retail sites.
> >
> > _______________________________________________
> > Fun and Misc security discussion for OT posts.
> > https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
> > Note: funsec is a public and open mailing list.
>
>
> _______________________________________________
> Fun and Misc security discussion for OT posts.
> https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
> Note: funsec is a public and open mailing list.
>
_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Reply via email to