Every major registrar data breach, and what they told you too late Every major registrar data breach, and what they told you too late — Privacy & Freedom article on LaunchPad Host PRIVACY & FREEDOM Every major registrar data breach, and what they told you too late LaunchPad Host 11 min read
Every major registrar data breach, and what they told you too late — Privacy & Freedom guide on LaunchPad Host

Every major registrar data breach, and what they told you too late

HS
By Harry Singh · Founder, LaunchPad Host
Published April 19, 2026 · 11 min read

Table of Contents

Key Takeaways

  • GoDaddy breaches (2020/2021/2023): 1.2M+ WordPress creds, source code, SSL private keys, customer IPs.
  • Epik leak (Sept 2021): 180GB of WHOIS records, customer credit cards, years of private data.
  • Network Solutions: at least two public breaches, WHOIS and customer contact data.
  • Breach disclosure to customers is often months after discovery — SEC filings are faster than email.
  • Registrars that do not collect much data cannot leak much data.

The GoDaddy 2020–2023 timeline

Three separate breaches, four years, same company. Timeline assembled from GoDaddy's 2022 10-K filing and BleepingComputer coverage:

DateScopeHow disclosed
Mar 202028,000 hosting accounts; SSH creds; customer IPsEmail to customers, ~6 weeks after discovery
Nov 20211.2M Managed WordPress accounts; sFTP and DB creds; SSL private keysSEC filing (Form 8-K)
Feb 2023Multi-year intrusion — same attacker as prior breaches; source code stolen; customer websites injected with malware; SSL certs re-issued to attacker10-K annual report

The February 2023 disclosure is the alarming one: GoDaddy revealed in its 10-K that the attackers had been in their systems continuously since at least March 2020. That is the same "incident" that was disclosed as resolved three separate times.

This matters because GoDaddy hosts ~21 million domains and is the world's largest registrar. An attacker with sustained access to GoDaddy has access to WHOIS contact data, registration payment records, nameserver configurations, and in the Managed WordPress case, the source of the actual websites.

The Epik leak — 180GB in the open

On September 13, 2021, the group Anonymous released a 180GB torrent labeled as Epik's internal data. Coverage: Krebs on Security.

The dump contained:

The political context of the Epik leak (the provider hosted a number of controversial far-right sites and had attracted attention) is separate from the mechanics of what was exposed. For any customer whose data was in that dump — regardless of the site they ran — the privacy loss was permanent. The torrent is still indexed.

Epik subsequently rebranded and was acquired, but the data is out. A customer who paid for WHOIS privacy and had their real name and home address in the leak cannot un-leak it.

Tired of slow, overcrowded shared hosting?

LaunchPad Host runs on NVMe SSDs + LiteSpeed with free migration, free SSL, daily backups, and crypto payments. 30-day money-back guarantee.

See Hosting Plans

Network Solutions: twice and counting

Network Solutions has a long history predating most of its competitors, and correspondingly a longer breach history. Notable incidents:

Network Solutions, Register.com, and Web.com are all operated by Newfold Digital (the same parent as Bluehost, HostGator, and Domain.com). A breach at one brand means the entire customer database across brands is at risk.

What a registrar breach actually exposes

Most people underestimate what registrars know about them. A full customer profile at a mass-market registrar typically includes:

A WHOIS record alone allows automated scraping into a marketable list: "founders of businesses registered in [month, year] in [geography]." That list is bought and sold. Once a breach dumps the source data, every subsequent list-builder has the raw material.

How to minimize your exposure

Structural habits that limit what any single breach can cost you:

  1. Use a registrar that collects minimally. Privacy-forward registrars (Njalla, 1984, LaunchPad Host) either register domains in their own name or use structured privacy so the WHOIS record is not your identity. Even if their database leaks, the linkage to you is indirect.
  2. Use a mailbox you can rotate. SimpleLogin, AnonAddy, iCloud Hide My Email, or a dedicated domain with catch-all forwarding. Each registrar gets a unique alias. When one leaks, rotate that alias.
  3. Pay with virtual cards or crypto. Privacy.com, Capital One Eno, or Monero. The payment token is per-vendor; breach of one vendor does not reveal your banking relationship.
  4. Never reuse passwords. Registrar accounts are high-value targets because they control DNS. A stolen password from a 2018 breach of some unrelated service is how a DNS hijack starts.
  5. Enable hardware 2FA. YubiKey or equivalent. SMS 2FA is bypassable via SIM-swap; app-based TOTP is acceptable; hardware tokens are best.

We run LaunchPad Host with deliberately minimal customer data collection. Only what is required to register the domain and bill you. No marketing profile, no "partner" sharing, no optional data fields. Less to leak if we are ever breached.

Frequently Asked Questions

No. We are a newer operator, and we deliberately keep internal attack surface small (minimal data, segregated auth, hardware-locked admin access). That said — no operator can honestly promise they will never be breached. What they can promise is how they will disclose and what they have collected.

More private from the registrar's perspective, yes — they do not get your payment identity. Not more private from the blockchain's perspective unless you use a privacy coin like Monero or mixing. For most threat models, the registrar-side privacy is what matters.

If you have any customer-facing business relying on GoDaddy for anything more than domain parking, consider the risk cost of the next breach. Transfer is cheap; waiting until an incident affects you is not.

Not much directly — ICANN is a governance body, not a security regulator. Breach disclosure is governed by state data-breach notification laws (California SB-1386 is the baseline, followed by similar laws in most states).

Slightly. Njalla is ~€15/year for a .com vs GoDaddy's promotional $0.99 first year. At renewal (where GoDaddy jumps to $21.99), the privacy-forward registrar is often cheaper.

In the EU under GDPR, yes — right to erasure. In the US, only where state law applies (California CCPA). Even with erasure requests, data already leaked in a public dump is out of the registrar's control.

WHOIS privacy hides your details from the public WHOIS lookup — but the registrar still has your data. Registrar privacy means the registrar itself does not tie the domain to your real identity. The latter is stronger and is what LaunchPad Host and Njalla offer.

Ready for hosting that just works?

NVMe + LiteSpeed hosting with free migration, crypto payments accepted, and a 30-day money-back guarantee.

See Hosting Plans
Tags: data-breach godaddy epik network-solutions privacy whois

Related tools, articles & authoritative sources

Hand-picked internal pages and external references from sources Google itself considers authoritative on this topic.

Related free tools

Offshore & privacy hosting

Related premium tools