Web.com hacked, at least 93,000 credit card data exposed

The US-based web hosting company Web.com has been Hacked, it admitted that credit card information of 93,000 customers have been compromised.

Web.com is the last victim of a data breach, the US-based web hosting company has up to 3.3 Million customers. According the first news circulating in the Internet the hackers may have compromised personal information and credit card data belonging to 93,000 of Web.com ‘s clients.

Web.com discovered the breach while conducting ordinary security monitoring and shutdown process, the company confirmed that unknown hackers breached one of its servers on August 13 and accessed customers’ data.

“Web.com, (Nasdaq:WWWW) reported that it discovered an unauthorized breach of one of its computer systems on August 13, 2015. As the result of this attack, the credit card information of approximately 93,000 customers (of the company’s over 3.3 million customers) may have been compromised. The company uncovered the unauthorized activity through its ongoing security monitoring. The company immediately reported the attack to credit card processors and the proper federal and state authorities.” reports the official statement released by Web.com.

The stolen data includes:

  • Credit Card information
  • Actual Names associated with the payment cards
  • Residential Addresses

According to the company no other information belonging to its customers, such as Social Security numbers, Verification Codes for the exposed credit cards, was exposed by the cyber attack.

At the time I was writing  there are no other details on the incident, for example, it is not clear how hackers compromised the company server and if the stolen data was encrypted.

The impact of the data breach was serious with repercussion on the value of its shares after the disclosure of the incident.

Web.com reported the cyber crime to law enforcement which are currently investigating the data breach.

However, neither the company mentioned whether the stolen data was encrypted, nor it said how hackers were able to accessed its customers’ data.

“The security of our customer information is a high priority for Web.com,” Web.com CEO and Chairman David L. Brown stated in a statement. “Our goals are simple –to protect our clients from the Internet attacks and, in the event that an attack succeeds, to fix the [issue] immediately.”

Web.com has already notified the incident to its customers via email, it will also provide Free Credit-Monitoring Protection for one-year to users affected by the intrusion.

Pierluigi Paganini

(Security Affairs – Web.com, data breach)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

19 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

20 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.