Uber Hacked - Full Access Granted to Hacker

Uber Hacked - Full Access Granted to Hacker

A breach in Uber’s computer network was discovered that caused several internal communication systems and engineering systems to be taken offline by the company.

It appears that there have been many internal systems at Uber that have been compromised by this breach. It has almost been confirmed that the hackers have accessed Uber to its full extent.

Cybersecurity researchers received images of emails, cloud storage services, and code repositories of Uber provided by a person declaring responsibility for the hack.

No alt text provided for this image

Hacked Uber Systems

Apart from the critical Uber IT systems, the hackers managed to gain access to other crucial Uber systems. And here below we have mentioned them: -

  • Amazon Web Services console
  • VMware ESXi virtual machines
  • Google Workspace email admin dashboard
  • Slack server

It has been confirmed by Uber that the attack took place and they have tweeted that they are in contact with the law enforcement agencies. Also, they confirmed that additional information will be posted soon once they have it.

No alt text provided for this image

After a social engineering attack against an Uber employee and stealing the password of that employee, the threat actor claimed they had breached the company.

No alt text provided for this image

The threat actor was able to gain access to the company’s internal systems after stealing the credentials of the company’s internal systems.

Hacker One Flaw

During this attack, the threat actor may have stolen Uber’s data and source code, but there is no way to confirm this. Furthermore, they had access to an asset that had the potential to be even more valuable than they already were.

No alt text provided for this image
No alt text provided for this image

Here’s what the Yuga Labs security engineer Sam Curry stated: -

“It’s possible that the threat actor may also have access to the Hacker One bug bounty reward program of Uber. On this page, they have commented on all bug bounty tickets submitted by the company.”

Through this program, cybersecurity experts secretly find and report all the flaws affecting systems and apps of Uber. So, all the reports of these flaws were kept confidential by the company itself until they were fixed.

All of the company’s private vulnerabilities submitted through the Hacker One program by the experts were accessible to the threat actor.

Before losing access to Uber’s bug bounty program, the attacker downloaded all of Uber’s vulnerability reports. So, to prevent further access to the vulnerabilities disclosed secretly, Uber has disabled the Hacker One program for now.

While apart from this, it was reported that Uber’s top security executive at the time, Joe Sullivan, had resigned from his position because of his role in responding to the hack.

要查看或添加评论,请登录

Mahesh Channapatna Girish的更多文章

  • What is The CIA TRIAD?

    What is The CIA TRIAD?

    The CIA TRIAD Helps to Increase Security, Ensure Business Continuity and Protect an Organization’s Reputation…

  • Risk Management

    Risk Management

    A security professional uses knowledge, skills, and experience to examine an organization's operational risk…

  • Privileged Access Management (PAM)

    Privileged Access Management (PAM)

    What Is Privileged Access? Privileged access refers to special access or abilities above and beyond that of a standard…

  • Passwordless - The Future of Authentication

    Passwordless - The Future of Authentication

    Security & Usability for the Digital Transformation Companies are going through a #digitaltransformation, or…

  • IN PURSUIT OF DIGITAL TRUST

    IN PURSUIT OF DIGITAL TRUST

    The future of #digitaltransformation is dependent on a focus on trust among all parties of online transactions. Digital…

  • How the U.S. Government is Spending Billions on Cybersecurity?

    How the U.S. Government is Spending Billions on Cybersecurity?

    In recent months, the House of Representatives has been hard at work drafting colorful spending bills for the 2023…

  • The Largest DDoS Attack Ever Recorded By Google Recorded At 46 Million Requests Per Second

    The Largest DDoS Attack Ever Recorded By Google Recorded At 46 Million Requests Per Second

    It is reported that Google was the target of the largest DDoS attack in history against one of its customers. On June…

  • Five Tips For Securing Your Email From Hackers

    Five Tips For Securing Your Email From Hackers

    Hackers are a fact of life. Just about every company has had its email account(s) hacked at one time or another.

社区洞察

其他会员也浏览了