Domain registrar Name.com was hit by hackers last week, who were able to access usernames, passwords, physical addresses, email, hashed passwords and encrypted credit card data.
Name.com initiated a site-wide password reset, notifying customers of the breach and the password change via an email on Wednesday.
Name.com’s security team detected unauthorized access to its database last week, and according to their investigation the attacks were geared towards a “single, large commercial account at Name.com.”
The attack shows that even if a hacker is after the information of only one client, web hosts need to be prepared to implement safety precautions across the board to ensure all clients are secure.
A recent report by Verizon shows that 75 percent of all cybersecurity breaches in 2012 were financially motivated. So far, Name.com says that there is no evidence to suggest that its customers’ compromised data has been used for fraudulent activities.
The company says EPP codes were not compromised as they weren’t stored in the same place as the other data.
“Many of you received our email or saw online that name.com was hacked. The truth is that it’s one of the more painful admissions that can be made on the Internet. We want you to know that when we say that we ‘give a shit’ we truly mean it,” Name.com said in a statement. “We are genuinely sorry for the annoyance and the scare. We’re taking this incredibly seriously and are doing everything possible to continue to improve the security of our systems. We greatly appreciate the support across the web and over the phones.”
According to a report by Help Net Security, the Name.com breach appears to be related to the recent Linode hack in April. Hacker collective Hack The Planet has claimed responsibility for both the Linode and Name.com breaches.
“Linode turned out to be safe from our null RDS pass 1day (before Adobe had released their critical advisory). In the meantime, their registrar (name.com) was taken out. We acquired their domain login (along with StackOverflow, DeviantArt, etc.), and prepared a transparent proxy to gather Linode logins.”
In a post explaining the attack, Linode said that an unpatched ColdFusion vulnerability made the hack against its system possible.
Talk back: Were you aware of the Name.com breach? Have you ever been in a similar situation where hackers targeted one of your clients? Let us know in a comment.