Story image

BREAKING: Uber tried to sweep data breach of 57m people under the rug

23 Nov 2017

In October last year hackers stole the personal data of 57 million customers and drivers from Uber Technologies Inc.

While this is a substantial, the worst part is that the company tried to keep the breach under wraps for more than a year.

Now that it has all come to light, the disruptive ride-hailing firm has sacked its chief security officer and one of his deputies as they had leading roles in sliding the attack under the rug, including a $100,000 payment to the attackers.

The data that was stolen included names, email addresses and phone numbers of 50 million Uber riders and seven million drivers around the world, which included their driver’s licence numbers.

“None of this should have happened, and I will not make excuses for it,” Dara Khosrowshahi, who took over as chief executive officer in September, said in an emailed statement. “We are changing the way we do business.”

This is just the latest announcement of a monumental breach following a string of others in recent years, including Yahoo, MySpace and Equifax.

Uber has released details of how the attack went down, with the concentrated version essentially revealing the hackers accessed a GitHub coding site used by Uber software engineers before stealing a set of login credentials.

They then used those credentials to gain access to the infrastructure account that was charged with handling computing tasks for the company.

From here, they discovered the archive of rider and driver information which they promptly took hold of before later emailing Uber with demands for money.

There are a number of both state and federal laws that do require organisations to let people and government agencies know when breaches of sensitive data do occur. Uber acknowledges that it was was obligated to report the hack of driver licence information and failed in this respect.

“At the time of the incident, we took immediate steps to secure the data and shut down further unauthorized access by the individuals. We also implemented security measures to restrict access to and strengthen controls on our cloud-based storage accounts,” Khosrowshahi said in the email statement.

“While I can’t erase the past, I can commit on behalf of every Uber employee that we will learn from our mistakes.”

A number of industry experts have come forward with their thoughts on the matter (some supportive and some scathing), including Trend Micro, Tenable, LMNTRIX, Sophos, Centrify and Zscaler – click here to see their insights.

Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.
IBM X-Force Red & Qualys introduce automated patching
IBM X-Force Red and Qualys are declaring a war on unpatched systems, and they believe automation is the answer.
Micro Focus acquires Interset to improve predictive analytics
Interset utilises user and entity behavioural analytics (UEBA) and machine learning to give security professionals what they need to execute threat detection analysis.