Previous
Learn how PurpleSec’s experts can protect your business against the latest cyber attacks.
Author: Eva Georgieva / Last Updated: 9/19/2022
Reviewed By: Dalibor Gašić, & Michael Swanagan, CISSP, CISA, CISM
View Our: Editorial Process
Table Of Contents
On September 15th, an 18 year old managed to hack Uber. The hacker reportedly gained control over the company’s internal systems leveraging social engineering techniques that led to compromising an employee’s Slack account.
We are currently responding to a cybersecurity incident. We are in touch with law enforcement and will post additional updates here as they become available.
— Uber Comms (@Uber_Comms) September 16, 2022
From there on the hacker accessed their internal databases, and obtained control of the company’s Amazon Web Services and Google Cloud accounts.
In information security, it is widely known that the weakest link is in fact the human.
Social engineering leverages exactly that factor. It is the art of manipulating people to give up confidential information using a variety of techniques and methods.
The endgame is usually to lure unsuspecting users to expose confidential data, give access to restricted systems, give out their credentials or spread malware infections.
Human error is way more likely to be exploited than a software flaw and that is why some of the most successful and biggest hacks start with a social engineering attack.
Allegedly the attack was carried out by the hacker performing what it seems to be a classic social engineering play.
The hacker sent a text message to an Uber employee that seemed like it was coming from the Uber’s IT department, the employee thought it was a legitimate message coming from their department and they shared their password.
Once the password was shared the hacker was in.
How PurpleSec Helps To Secure Your Organization
Our vulnerability management services and penetration testing services provide a holistic approach to securing what’s most important to you.
On September 16th, Uber decided to give a statement on Twitter[3], claiming that they are responding to a cybersecurity incident without giving out too many details.
We are currently responding to a cybersecurity incident. We are in touch with law enforcement and will post additional updates here as they become available.
— Uber Comms (@Uber_Comms) September 16, 2022
However, data coming in from different sources indicates that the hacker got access to Uber’s HackerOne account and most likely all their reports.
Apart from that, Sam Curry, a Bug Bounty Hunter, also shared on Twitter that the hacker claimed they’ve got full administrative rights on AWS and Google Cloud Platform.
From an Uber employee:
Feel free to share but please don’t credit me: at Uber, we got an “URGENT” email from IT security saying to stop using Slack. Now anytime I request a website, I am taken to a REDACTED page with a pornographic image and the message “F*** you wankers.”
— Sam Curry (@samwcyo) September 16, 2022
He also posted that an Uber employee shared that at Uber they got an urgent email stating that all employees should stop using Slack, which is the platform on which the hacker, after gaining access, posted a message from the compromised user’s account saying “I announce I am a hacker and Uber has suffered a data breach.”
From the employee statements, the message initially was not taken seriously by the rest of the employees, until the IT team asked the employees to stop using Slack.
Because of the breach, some of Uber’s internal systems, including Slack, were temporarily disabled.
Uber still hasn’t disclosed the scope of the breach and how exactly they are dealing with it.
However, it does seem like the hackers were motivated by the hack by the low pay that Uber drivers receive as was seen in one of the messages that were posted on Slack, as reported by New York Times.
They haven’t asked for a ransom and it does look like they have done this to affect Uber’s reputation.
This is not the first time Uber had to deal with a cyber security data breach.
In 2016, 57 million driver accounts were breached and confidential information was stolen.
A deeper investigation was conducted into the current and now former and accused CISO Joseph Sullivan.
This month, Mr. Sullivan was found guilty of obstructing justice and actively concealing a felony for concealing the breach from the Federal Trade Commission, which was investigating Uber’s privacy protections at the time.
He faces up to five years in prison for obstruction and up to three years for the latter charge.
Based on our sources and information available online, Sullivan was made aware of a data breach that had occurred at Uber which happened on November 3, 2016.
A hacker had gained access to the personal information of 57 million Uber users, including their names, email addresses and phone numbers.
Rather than reporting the breach to the authorities, Mr. Sullivan hid it.
He then paid the hacker $100,000 to destroy the evidence and keep quiet about what had happened.
Eva is a security engineer, researcher, and penetration tester with over 5 years of experience working on both red teams and blue teams.
Recent Attacks
Popular Articles
Ransomware Attacks
Preventing Attacks