HOSTINGER RESETS PASSWORDS OF HALF ITS CUSTOMER BASE IN LIGHT OF SECURITY BREACH

Hacking

Hostinger assured customers that none of the 14 million records in website files, customers usernames, email addresses and passwords stored on the API database was compromised.



Hostinger, a web hosting provider and internet domain registrar was hit last week by hackers; an incident which has caused the company to take precautionary measures to reset all passwords for customers in a bid to protect consumer data.

The web hosting provider has shared in blog post that an unauthorised third party was able to hack into their “internal system API, one of which had access to hashed passwords and other non-financial data about customers, adding that while they have taken steps to ensure that customer information is safe, they have also contacted the appropriate authorities and are conducting investigations into the source of the breach.

They advise that clients do their possible best to keep their personal details and information safe; cautioning that all web users must exercise caution when met with strange requests for login details or referrals to other unlicensed websites that request sensitive data.

Hostinger assured customers that none of the 14 million records in website files, customers usernames, email addresses and passwords stored on the API database was compromised. They have also made upgrades to the previous SHA-1 password hashing system which scrambles sensitive data to a more powerful SHA-2 algorithm for added security.

While they say there is nothing to fear as regards customer safety, clients who would want to delete their information from Hostinger servers in accordance with GDPR rules are informed to do so by notifying support at gdpr@hostinger.com

This year alone, multiple web hosting sites have been found to have vulnerabilities that leave customers unprotected to attacks from hackers and potential data breaches.

0 Comments

Write a comment

    Write a Comment

    view all comments
    Read before write a comment! Read the guidelines