Podcast
Root Causes 287: GoDaddy Private Key Breach


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
March 21, 2023
A GoDaddy breach exposed customer private keys. We explain expectations surrounding private key exposure and get into the interesting question of when an incident is or is not part of a large company's CA business.
Podcast Transcript
Lightly edited for flow and brevity.
“GoDaddy Announces Source Code Stolen and Malware Installed in Breach.”
So what happened here and what does this have to do with certificates?
And we want to bring out the root cause of the issue. Basically – and I’ll read right out of the text. It says, “however, in some cases, customer’s SSL private keys were exposed and if abused, this key could allow an attacker to impersonate a customer’s website or other services. While GoDaddy has reset customer WordPress passwords and private keys, it is currently in the process of issuing them new SSL certificates,” Tim.
Your existence depends on it and for everybody else who is acting as a CA because they’ve got root certificates in the Trust store of your browser, ok, to me that’s a CA. It’s a short conversation. You got that, you are a CA. And therefore, GoDaddy is a CA and so, therefore, if you are procuring SSL certificates from that vendor and they are not going to be super transparent about these things, well, you gotta think twice about where you are getting your SSL certificates from.

