GoDaddy.com, the popular website that hosts millions of domains for businesses, said it had restored most service Tuesday. On Monday, it was subject to a cyberattack by someone claiming to be a member of the Anonymous hacker group.
"We're working out the last kinks for our site and control centers," the private Scottsdale, Ariz., company's representatives advised via Twitter. "No customer data compromised."
GoDaddy's corporate website worked throughout the denial-of-service (DNS) attack on Monday, but websites that it operates on behalf of customers were blocked in the ate afternoon. GoDaddy has eight large server farms in the U.S., as well as one in India.
Some of the company's server traffic was transferred to VeriSign Inc. (Nasdaq: VRSN), a Reston, Va., provider of Internet services, GoDaddy representatives said.
The company tweeted that it was "aware of the trouble people are having with our site" and urged customers to monitor Twitter for more information.
On Monday, an apparent attacker with the tag "AnonymousOwn3r" claimed the attack "would test how the cyber security is safe and for more reasons than I can not talk now."
In last winter's controversy concerning the proposed Stop Online Piracy Act (SOPA) in the U.S. Congress, GoDaddy was targeted because it supported the law, which was championed by publishers and Hollywood studios. The law was never brought up for a vote in either the House or the Senate.
GoDaddy was previously subject to DNS attacks in 2007 and 2009.
The GoDaddy attack came a week after another hacker group, AntiSec, claimed it had obtained more than 1.5 million passwords and other data from customers of Apple Inc. (Nasdaq: AAPL), which it had downloaded from a laptop belonging to an FBI agent. Both the FBI and Apple dismissed the charges.
BlueToad Inc., a private service in Orlanda, Fla., acknowledged it had been the victim of the attack. In an interview with the New York Times, CEO Paul DeHart said the data had come from BlueToad. "We face thousands of attacks every day," he said. "This one happened to come through."
To contact the editor, e-mail: