Table of Contents
Short answer: In January 2025, the FTC filed against GoDaddy alleging "lax data security" on its hosting services from 2018 onward. The complaint documents three breaches — March 2020 (28,000 customers), November 2021 (1.2 million Managed WordPress customers), and February 2023 (multi-year cPanel breach with malware installed in GoDaddy's own environment). The settlement finalized in May 2025 requires MFA, biennial audits, and bars GoDaddy from further security misrepresentations. If you're still hosting there in 2026, this is the context you need.
Key Takeaways
- FTC alleged GoDaddy failed to implement basic security like MFA, logging, and network segmentation while telling customers their hosting was secure.
- Three documented breach events between 2019 and 2023 affected tens of thousands to over a million customers — real customer sites were infected with real malware.
- The February 2023 breach included source-code theft and malware installation within GoDaddy's own cPanel environment — a host-side compromise, not a customer mistake.
- Settlement finalized May 2025 requires MFA for all hosting access, biennial third-party audits, and prohibits further security misrepresentations.
- A host with a consent order against it is not disqualifying — but it's a known-bad-actor warning you can't unsee once you know.
What the FTC alleged
On January 15, 2025, the Federal Trade Commission filed a complaint against GoDaddy alleging:
- Since 2018, GoDaddy failed to implement "reasonable and appropriate security measures" on its website hosting services.
- GoDaddy "misled customers about the extent of its data security protections" — specifically, that GoDaddy told hosting customers their data was secure while simultaneously failing at industry-standard security practices.
- Per the FTC, GoDaddy was "blind to vulnerabilities and threats" in its hosting environment due to "operational gaps."
- These failures led to "several major security breaches between 2019 and 2022 in which bad actors gained unauthorized access to customers' websites and data," including visitor redirection to malicious sites.
The case was settled via a consent order. The final settlement was finalized on May 8, 2025. GoDaddy did not admit wrongdoing (standard for FTC settlements) but agreed to the remedial measures.
The three documented breaches
| Date disclosed | What happened | Scale |
|---|---|---|
| March 2020 (disclosed) | SSH credential misuse dating from October 2019. Attackers had access to customer hosting SSH credentials for ~5 months before detection. | 28,000 hosting customers notified. |
| November 2021 | Managed WordPress environment compromised. Attackers accessed customer email addresses, WordPress admin usernames/passwords (original ones set at provisioning), SFTP/database credentials, and SSL private keys for a subset. | 1.2 million Managed WordPress customers. |
| February 2023 (disclosed; intrusion discovered December 2022) | Multi-year breach of GoDaddy's cPanel hosting environment. Source code stolen and malware installed in the GoDaddy cPanel environment itself — not the customers' sites, GoDaddy's infrastructure. Customer sites were then intermittently redirected to malicious URLs. | Undisclosed but affected cPanel shared hosting broadly. |
The 2023 incident is the most significant for the "host-side malware" question. This wasn't a case where individual customers got hacked because of outdated plugins. It was a case where GoDaddy's own infrastructure was compromised, with attackers able to install malware that then appeared on customer sites. Customers had no ability to prevent or detect this — the vulnerability was in the host's environment.
The security controls GoDaddy was missing
Per the FTC complaint, GoDaddy failed to implement all of the following — controls that are industry-standard and that GoDaddy told customers it had:
- Multi-factor authentication for access to hosting systems and databases.
- Software update management — systematic patching of the underlying hosting infrastructure.
- Security event logging — the ability to detect and investigate suspicious access.
- Network segmentation — isolating different customer environments and internal systems.
- Threat detection and monitoring — active intrusion detection.
- File integrity monitoring — noticing when system files were modified.
- Asset inventory and management — knowing what systems existed and who had access.
- Risk assessments for hosting services — systematic security review.
- Secure connections to data-access services — basic encryption of internal data flows.
Every one of these is table-stakes for a hosting provider. A small independent host running Plesk or cPanel on a single VPS should have file integrity monitoring and MFA. GoDaddy — a $4 billion revenue company at the time — did not.
Tired of slow, overcrowded shared hosting?
LaunchPad Host runs on NVMe SSDs + LiteSpeed with free migration, free SSL, daily backups, and crypto payments. 30-day money-back guarantee.
See Hosting PlansWhat the settlement requires GoDaddy to do
- Mandatory MFA for all customers, employees, and contractors accessing hosting tools and databases.
- Non-phone-based authentication available (security keys or authenticator apps) — SMS alone does not satisfy the order.
- Comprehensive information security program covering the controls listed above.
- Biennial independent third-party security assessments. Results filed with the FTC.
- Prohibition on misleading security claims in advertising and marketing.
The MFA mandate in particular is meaningful: as of the consent order, GoDaddy must require MFA rather than offer it as optional. For customers who had opted out of MFA for convenience, this now changes.
What this means if you're still a GoDaddy customer
- Enable MFA immediately if you haven't. GoDaddy now requires it. If you've been using SMS-only MFA, switch to an authenticator app.
- Rotate all credentials. If your account existed during any of the three breach windows (especially Managed WordPress in late 2021), assume your original credentials were exposed. Change hosting password, cPanel password, database passwords via wp-config, SFTP, and any saved API keys.
- Rotate your SSL certificates. The 2021 breach included SSL private keys for a subset of customers. If you can't confirm you weren't in that subset, regenerate your certificates.
- Audit your site for legacy malware. If your site was running during late 2022 through early 2023, the cPanel-environment compromise may have dropped artifacts. Scan with Wordfence or Sucuri SiteCheck — and if found, investigate the root cause rather than buying a cleanup product.
- Review what GoDaddy products you're paying for. The Website Security (Sucuri-powered) product continues to be sold. Given the underlying infrastructure issues the FTC documented, paying extra for security add-ons on top of a platform with documented security failures is a questionable purchase.
If you're deciding whether to move
The FTC action does not mean GoDaddy is unsafe in 2026 — the consent order imposes controls that, if followed, meaningfully improve the platform. But it does mean two things:
- The culture that produced the 2018-2023 gaps existed at a large, well-resourced, publicly-traded company. Culture doesn't change quickly. The controls are now mandated; the underlying incentives that produced the gaps may or may not have.
- You now know. If you continue hosting at GoDaddy after reading the FTC complaint and something bad happens in the future, the "I didn't know" defense to yourself is gone.
Reasonable alternatives depend on what you actually need:
- Simple shared WordPress hosting with privacy: LaunchPad Host Starter plan.
- Managed WordPress (more hand-holding): Kinsta, WP Engine, Cloudways.
- Technical users who want a VPS: Hetzner, Netcup, DigitalOcean.
- Offshore / jurisdiction-focused: Shinjiru (mixed reviews), FlokiNET (Iceland), OrangeWebsite (Iceland), or us.
For domain registration specifically: moving domains off GoDaddy is straightforward (60-day transfer lock after last transfer, then unlock and transfer out). Our domain registration page walks through the process.
Frequently Asked Questions
No. The FTC alleged that GoDaddy's security failures allowed third-party attackers to access GoDaddy's environment, and that those attackers installed malware. The malware came from attackers; GoDaddy's failure was in making the attack possible. This is an important distinction — GoDaddy is on the hook for negligence, not malicious intent.
Cumulatively, over 1.2 million customers were directly notified across the three disclosed incidents. The February 2023 cPanel breach affected an undisclosed number of customers, but cPanel shared hosting is GoDaddy's largest product category — the real number is likely multiples of the 1.2M figure.
The underlying infrastructure compromises were remediated by GoDaddy per their public statements and the FTC consent order. Residual risk: if your site was actively infected during the breach windows and you never audited, artifacts may persist. Scan with independent tools.
The opposite. GoDaddy's pricing during the breach years was on par with or higher than independent hosts. Customers paid a premium for a brand that was failing at fundamentals. Factor in the security add-ons (Website Security at $6.99+/month) and the effective cost is significantly higher than hosts that include server-level security in the base plan.
Similar pattern is possible at any large host. The FTC picked GoDaddy because of the scale and the specific misrepresentations, not because other hosts are necessarily better. Hostinger's abuse policy and suspension practices have their own issues (see our <a href="/blog/hostinger-suspended-deleted-data-refused-refund">Hostinger article</a>). Bluehost/HostGator have the SiteLock upsell pattern (our <a href="/blog/sitelock-bluehost-hostgator-malware-upsell-scam-explained">SiteLock article</a>). Every large shared host has structural issues; the trick is picking the set of tradeoffs you can live with.
The FTC's jurisdiction is US-based, but the remedial measures apply to GoDaddy's operations globally because they're internal controls (MFA, logging, audits) rather than customer-facing. EU customers also benefit from the NIS2 directive's similar requirements on hosting providers, which overlap substantially with the FTC order.
The filed complaint is public at ftc.gov. Search "FTC v GoDaddy" or go directly to the FTC's January 15, 2025 press release. The final consent order (May 2025) is also public. Both are worth reading if you want the source rather than secondary coverage.
Ready for hosting that just works?
NVMe + LiteSpeed hosting with free migration, crypto payments accepted, and a 30-day money-back guarantee.
See Hosting PlansRelated tools, articles & authoritative sources
Hand-picked internal pages and external references from sources Google itself considers authoritative on this topic.
Related free tools
- Site Validator (robots, sitemap, SSL, headers) Validate robots.txt, sitemap.xml, SSL certificate, and security headers.
- DNS Lookup & Records Checker All DNS records (A, AAAA, MX, NS, TXT, CAA, SPF, DMARC) for any domain.
- PageSpeed & Core Web Vitals Google Lighthouse scores: performance, SEO, accessibility, best practices.
Offshore & privacy hosting
- DMCA-Ignored Hosting Due-process complaint handling, explained
- Offshore Hosting EU jurisdiction, privacy-first, from $3.99/mo
- Bulletproof Hosting Alternative What searchers actually want, without the risk