+44 (0)203 88 020 88

Menu

Search

Cyber Security News & Articles

 

Cyber Security
News & Articles

Trusted Cyber Security Experts
25+ Years Industry Experience
Ethical, Professional & Pragmatic

Uber Breached in Targeted Attack

The credentials of an Uber contractor were stolen and used to access multiple accounts and company files in a targeted attack. Uber released an initial security update statement that they were dealing with a cybersecurity incident when this breach was first identified and have since updated this post to give details about the attack and following investigation. No sensitive user data such as trip history was exposed as the attackers did not target this data, but instead targeted the company’s internal systems and files. There is also no evidence of any malicious code within Uber’s codebase so far. 

It is believed that the threat actor behind this attack is Lapsus$, who are also responsible for high profile attacks on Okta and T-Mobile, among other large tech companies. These attackers used the same method for this Uber attack as they have done in previous attacks, in which they purchase a user’s corporate password on the dark web. They achieved this through malware previously infecting the target user’s device. Once the credentials are obtained, they attempted to log in to this user account multiple times, however access to the account was usually prevented by two-factor authentication (2FA) which the user denied. In the case of Uber, the contractor accepted one of these 2FA requests, and the attackers were then able to successfully log on. 

 Once they had access to the contractor’s account, the attackers attempted to access other employee accounts. By doing this, they managed to obtain elevated permissions to multiple tools used by employees at Uber, such as Slack and G-Suite. The attackers also sent messages to the company-wide Slack channel and configured the OpenDNS to display an image of their choice. Although no customer data is thought to have been accessed in this breach, some confidential financial information including invoices are believed to be compromised. The attackers also managed to access HackerOne vulnerability reports, which is where Uber stored their bug reports in the Uber bug bounty program. This has now been disabled, so the attackers will no longer have access to this program, however all current vulnerability reports stored here were exfiltrated as a part of the attack. 

This attack did not appear to affect the functionality of Uber, Uber Eats, Uber Freight, and the Uber Driver app, however due to some internal systems being disabled by Uber in the incident response process, some customer support operations were impacted. Lapsus$ appear to still be a very active group, despite the arrest of seven teens earlier this year believed to members. This group is also credited for the Rockstar breach this week, in which test videos and game design for Grand Theft Auto 6 were leaked online. The user who released these images and source code goes by the names ‘teapotuberhacker’ and ‘teapots2022’ and claims to be responsible for both the Rockstar and Uber attacks. 

 

 

Subscribe to our monthly newsletter today

If you’d like to stay up-to-date with the latest cyber security news and articles from our technical team, you can sign up to our monthly newsletter. 

We hate spam as much as you do, so we promise not to bombard you with emails. We’ll send you a single, curated email each month that contains all of our cyber security news and articles for that month.

Why Choose SecureTeam?

CREST
CCS
ISO9001
ISO27001
CE-PLUS

Customer Testimonials

“We were very impressed with the service, I will say, the vulnerability found was one our previous organisation had not picked up, which does make you wonder if anything else was missed.”

Aim Ltd Chief Technology Officer (CTO)

"Within a very tight timescale, SecureTeam managed to deliver a highly professional service efficiently. The team helped the process with regular updates and escalation where necessary. Would highly recommend"

IoT Solutions Group Limited Chief Technology Officer (CTO) & Founder

“First class service as ever. We learn something new each year! Thank you to all your team.”

Royal Haskoning DHV Service Delivery Manager

“We’ve worked with SecureTeam for a few years to conduct our testing. The team make it easy to deal with them; they are attentive and explain detailed reports in a jargon-free way that allows the less technical people to understand. I wouldn’t work with anyone else for our cyber security.”

Capital Asset Management Head of Operations

“SecureTeam provided Derbyshire's Education Data Hub with an approachable and professional service to ensure our schools were able to successfully certify for Cyber Essentials. The team provided a smooth end-to-end service and were always on hand to offer advice when necessary.”

Derbyshire County Council Team Manager Education Data Hub

“A very efficient, professional, and friendly delivery of our testing and the results. You delivered exactly what we asked for in the timeframe we needed it, while maintaining quality and integrity. A great job, done well.”

AMX Solutions IT Project Officer

“We were very pleased with the work and report provided. It was easy to translate the provided details into some actionable tasks on our end so that was great. We always appreciate the ongoing support.”

Innovez Ltd Support Officer

Get in touch today

If you’d like to see how SecureTeam can take your cybersecurity posture to the next level, we’d love to hear from you, learn about your requirements and then send you a free quotation for our services.

Our customers love our fast-turnaround, “no-nonsense” quotations – not to mention that we hate high-pressure sales tactics as much as you do.

We know that every organisation is unique, so our detailed scoping process ensures that we provide you with an accurate quotation for our services, which we trust you’ll find highly competitive.

Get in touch with us today and a member of our team will be in touch to provide you with a quotation. 

0

No products in the basket.

No products in the basket.