Story image

BREAKING: Uber tried to sweep data breach of 57m people under the rug

23 Nov 17

In October last year hackers stole the personal data of 57 million customers and drivers from Uber Technologies Inc.

While this is a substantial, the worst part is that the company tried to keep the breach under wraps for more than a year.

Now that it has all come to light, the disruptive ride-hailing firm has sacked its chief security officer and one of his deputies as they had leading roles in sliding the attack under the rug, including a $100,000 payment to the attackers.

The data that was stolen included names, email addresses and phone numbers of 50 million Uber riders and seven million drivers around the world, which included their driver’s licence numbers.

“None of this should have happened, and I will not make excuses for it,” Dara Khosrowshahi, who took over as chief executive officer in September, said in an emailed statement. “We are changing the way we do business.”

This is just the latest announcement of a monumental breach following a string of others in recent years, including Yahoo, MySpace and Equifax.

Uber has released details of how the attack went down, with the concentrated version essentially revealing the hackers accessed a GitHub coding site used by Uber software engineers before stealing a set of login credentials.

They then used those credentials to gain access to the infrastructure account that was charged with handling computing tasks for the company.

From here, they discovered the archive of rider and driver information which they promptly took hold of before later emailing Uber with demands for money.

There are a number of both state and federal laws that do require organisations to let people and government agencies know when breaches of sensitive data do occur. Uber acknowledges that it was was obligated to report the hack of driver licence information and failed in this respect.

“At the time of the incident, we took immediate steps to secure the data and shut down further unauthorized access by the individuals. We also implemented security measures to restrict access to and strengthen controls on our cloud-based storage accounts,” Khosrowshahi said in the email statement.

“While I can’t erase the past, I can commit on behalf of every Uber employee that we will learn from our mistakes.”

A number of industry experts have come forward with their thoughts on the matter (some supportive and some scathing), including Trend Micro, Tenable, LMNTRIX, Sophos, Centrify and Zscaler – click here to see their insights.

What MSPs can learn from Datto’s Channel Ransomware Report
While there have been less high profile attacks making the headlines, the frequency of attacks is, in fact, increasing.
Cisco expands security capabilities of SD­-WAN portfolio
Until now, SD-­WAN solutions have forced IT to choose between application experience or security.
AlgoSec delivers native security management for Azure Firewall
AlgoSec’s new solution will allow a central management capability for Azure Firewall, Microsoft's new cloud-native firewall-as-a-service.
How to configure your firewall for maximum effectiveness
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
Exclusive: Why Australian enterprises are prime targets for malware attacks
"Only 14% of Australian organisations are continuously training employees to spot cyber attacks."
Exclusive: Why botnets will swarm IoT devices
“What if these nodes were able to make autonomous decisions with minimal supervision, use their collective intelligence to solve problems?”
Bitdefender announces security integration with Kaseya
The new partnership will allow VSA by Kaseya’s cloud and on-premises users to deploy and manage security with Bitdefender Cloud Security for MSPs.
Why you should leverage a next-gen firewall platform
Through full lifecycle-based threat detection and prevention, organisations are able to manage the entire threat lifecycle without adding additional solutions.