Story image

Uber disguised breach ransom payment as a bug bounty reward

29 Nov 2018

£385,000 might be little more than a slap on the risk for Uber’s catastrophic data protection failings that caused cyber attackers to access the data of 2.7 UK customers and 82,000 UK drivers.

The Dutch Data Protection Authority Autoriteit Persoonsgegevens has also issued a fine of €600,000 to Uber, after 174,000 Dutch citizens were also affected by the breach.

But the breach reached much further than the UK and the Netherlands – more than 57 million Uber users worldwide were caught in the breach.

The UK Information Commissioner’s Office dealt the ruling this week. Director of investigations Steve Eckersley called it a serious failure of data security on Uber’s part, and a complete disregard for the customers and drivers whose personal information was stolen.

The breach happened between October and November 2016 when attackers used ‘credential stuffing’, a method in which usernames and passwords are cycled through until they find a match for an existing account.

The attackers were able to access customers’ full names, email addresses and phone numbers. Driver records, including details of their journeys and how much they were paid, were also stolen.

The attackers targeted a cloud-based storage system operated by Uber’s US parent company. They accessed more than 1000 S3 buckets and then demanded money to reveal how they had accessed the accounts.

They claimed they would not destroy the data until payment had been made.

But that’s not the end of the story – Uber then paid the attackers US$100,000 to destroy the stolen data. To try to legitimise the payment, Uber disguised the payment through a third party provider that administers Uber’s bug bounty programme.

“Paying the attackers and then keeping quiet about it afterwards was not, in our view, an appropriate response to the cyber attack,” comments Eckersley.

“Although there was no legal duty to report data breaches under the old legislation, Uber’s poor data protection practices and subsequent decisions and conduct were likely to have compounded the distress of those affected.”

Not only did the incident breach principle seven of the Data Protection Act 1988, it also exposed drivers and customers to increased fraud risks.

According to The ICO Monetary Penalty Notice, Uber has since improved security measures including a new key management system for credentials that access S3; source code migration from GitHub to internal code repositories; the introduction of multi-factor authentication for programmatic service account access to the S3 datastore; and further work on two-factor authentication.

The Dutch Data Protection Agency says the fine was issued because Uber did not report the breach to the DPA within 72 hours after it was discovered. 

The Dutch regulator was the lead member of an international task force which included the ICO and which co-operated in investigating the effects of the incident in their respective jurisdictions.

Uber’s Q2 2018 financial results reported revenue of US$2.7 billion – a 51% increase since Q2 2017.
 

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.