The way they contacted Bluehost is very odd. They say they reached out via LinkedIn, which is probably not the correct way to report a security breach.
Especially that the Bluehost contact page (http://www.bluehost.com/contact_us.html ) has multiple methods of contact, include a 24/7 tech support and an extended hours telephone line to report "SPAM, fraud, or anything suspicious". Surely a security breach and malware qualifies for one of these contact methods?
Especially that the Bluehost contact page (http://www.bluehost.com/contact_us.html ) has multiple methods of contact, include a 24/7 tech support and an extended hours telephone line to report "SPAM, fraud, or anything suspicious". Surely a security breach and malware qualifies for one of these contact methods?