The FTC vs GoDaddy Case: What the 2025 Settlement Actually Revealed The FTC vs GoDaddy Case: What the 2025 Settlement Actually Revealed — Security article on LaunchPad Host SECURITY The FTC vs GoDaddy Case: What the 2025 Settlement Actually Revealed LaunchPad Host 9 min read
The FTC vs GoDaddy Case: What the 2025 Settlement Actually Revealed — Security guide on LaunchPad Host

The FTC vs GoDaddy Case: What the 2025 Settlement Actually Revealed

SL
By Sofia Larsen · DNS & Domains Specialist
Published April 19, 2026 · 9 min read

Key Takeaways

  • FTC alleged GoDaddy failed to implement basic security like MFA, logging, and network segmentation while telling customers their hosting was secure.
  • Three documented breach events between 2019 and 2023 affected tens of thousands to over a million customers — real customer sites were infected with real malware.
  • The February 2023 breach included source-code theft and malware installation within GoDaddy's own cPanel environment — a host-side compromise, not a customer mistake.
  • Settlement finalized May 2025 requires MFA for all hosting access, biennial third-party audits, and prohibits further security misrepresentations.
  • A host with a consent order against it is not disqualifying — but it's a known-bad-actor warning you can't unsee once you know.

What the FTC alleged

On January 15, 2025, the Federal Trade Commission filed a complaint against GoDaddy alleging:

The case was settled via a consent order. The final settlement was finalized on May 8, 2025. GoDaddy did not admit wrongdoing (standard for FTC settlements) but agreed to the remedial measures.

The three documented breaches

Date disclosedWhat happenedScale
March 2020 (disclosed)SSH credential misuse dating from October 2019. Attackers had access to customer hosting SSH credentials for ~5 months before detection.28,000 hosting customers notified.
November 2021Managed WordPress environment compromised. Attackers accessed customer email addresses, WordPress admin usernames/passwords (original ones set at provisioning), SFTP/database credentials, and SSL private keys for a subset.1.2 million Managed WordPress customers.
February 2023 (disclosed; intrusion discovered December 2022)Multi-year breach of GoDaddy's cPanel hosting environment. Source code stolen and malware installed in the GoDaddy cPanel environment itself — not the customers' sites, GoDaddy's infrastructure. Customer sites were then intermittently redirected to malicious URLs.Undisclosed but affected cPanel shared hosting broadly.

The 2023 incident is the most significant for the "host-side malware" question. This wasn't a case where individual customers got hacked because of outdated plugins. It was a case where GoDaddy's own infrastructure was compromised, with attackers able to install malware that then appeared on customer sites. Customers had no ability to prevent or detect this — the vulnerability was in the host's environment.

The security controls GoDaddy was missing

Per the FTC complaint, GoDaddy failed to implement all of the following — controls that are industry-standard and that GoDaddy told customers it had:

Every one of these is table-stakes for a hosting provider. A small independent host running Plesk or cPanel on a single VPS should have file integrity monitoring and MFA. GoDaddy — a $4 billion revenue company at the time — did not.

Tired of slow, overcrowded shared hosting?

LaunchPad Host runs on NVMe SSDs + LiteSpeed with free migration, free SSL, daily backups, and crypto payments. 30-day money-back guarantee.

See Hosting Plans

What the settlement requires GoDaddy to do

The MFA mandate in particular is meaningful: as of the consent order, GoDaddy must require MFA rather than offer it as optional. For customers who had opted out of MFA for convenience, this now changes.

What this means if you're still a GoDaddy customer

  1. Enable MFA immediately if you haven't. GoDaddy now requires it. If you've been using SMS-only MFA, switch to an authenticator app.
  2. Rotate all credentials. If your account existed during any of the three breach windows (especially Managed WordPress in late 2021), assume your original credentials were exposed. Change hosting password, cPanel password, database passwords via wp-config, SFTP, and any saved API keys.
  3. Rotate your SSL certificates. The 2021 breach included SSL private keys for a subset of customers. If you can't confirm you weren't in that subset, regenerate your certificates.
  4. Audit your site for legacy malware. If your site was running during late 2022 through early 2023, the cPanel-environment compromise may have dropped artifacts. Scan with Wordfence or Sucuri SiteCheck — and if found, investigate the root cause rather than buying a cleanup product.
  5. Review what GoDaddy products you're paying for. The Website Security (Sucuri-powered) product continues to be sold. Given the underlying infrastructure issues the FTC documented, paying extra for security add-ons on top of a platform with documented security failures is a questionable purchase.

If you're deciding whether to move

The FTC action does not mean GoDaddy is unsafe in 2026 — the consent order imposes controls that, if followed, meaningfully improve the platform. But it does mean two things:

  1. The culture that produced the 2018-2023 gaps existed at a large, well-resourced, publicly-traded company. Culture doesn't change quickly. The controls are now mandated; the underlying incentives that produced the gaps may or may not have.
  2. You now know. If you continue hosting at GoDaddy after reading the FTC complaint and something bad happens in the future, the "I didn't know" defense to yourself is gone.

Reasonable alternatives depend on what you actually need:

For domain registration specifically: moving domains off GoDaddy is straightforward (60-day transfer lock after last transfer, then unlock and transfer out). Our domain registration page walks through the process.

Frequently Asked Questions

No. The FTC alleged that GoDaddy's security failures allowed third-party attackers to access GoDaddy's environment, and that those attackers installed malware. The malware came from attackers; GoDaddy's failure was in making the attack possible. This is an important distinction — GoDaddy is on the hook for negligence, not malicious intent.

Cumulatively, over 1.2 million customers were directly notified across the three disclosed incidents. The February 2023 cPanel breach affected an undisclosed number of customers, but cPanel shared hosting is GoDaddy's largest product category — the real number is likely multiples of the 1.2M figure.

The underlying infrastructure compromises were remediated by GoDaddy per their public statements and the FTC consent order. Residual risk: if your site was actively infected during the breach windows and you never audited, artifacts may persist. Scan with independent tools.

The opposite. GoDaddy's pricing during the breach years was on par with or higher than independent hosts. Customers paid a premium for a brand that was failing at fundamentals. Factor in the security add-ons (Website Security at $6.99+/month) and the effective cost is significantly higher than hosts that include server-level security in the base plan.

Similar pattern is possible at any large host. The FTC picked GoDaddy because of the scale and the specific misrepresentations, not because other hosts are necessarily better. Hostinger's abuse policy and suspension practices have their own issues (see our <a href="/blog/hostinger-suspended-deleted-data-refused-refund">Hostinger article</a>). Bluehost/HostGator have the SiteLock upsell pattern (our <a href="/blog/sitelock-bluehost-hostgator-malware-upsell-scam-explained">SiteLock article</a>). Every large shared host has structural issues; the trick is picking the set of tradeoffs you can live with.

The FTC's jurisdiction is US-based, but the remedial measures apply to GoDaddy's operations globally because they're internal controls (MFA, logging, audits) rather than customer-facing. EU customers also benefit from the NIS2 directive's similar requirements on hosting providers, which overlap substantially with the FTC order.

The filed complaint is public at ftc.gov. Search "FTC v GoDaddy" or go directly to the FTC's January 15, 2025 press release. The final consent order (May 2025) is also public. Both are worth reading if you want the source rather than secondary coverage.

Ready for hosting that just works?

NVMe + LiteSpeed hosting with free migration, crypto payments accepted, and a 30-day money-back guarantee.

See Hosting Plans
Tags: godaddy ftc security breach malware regulation

Related tools, articles & authoritative sources

Hand-picked internal pages and external references from sources Google itself considers authoritative on this topic.

Related free tools

Offshore & privacy hosting

Related premium tools