Uber Data Breach - Cyber Security Case Study
Uber Data Breach - Cyber Security Case Study
The Uber data breach began with a hacker purchasing stolen credentials belonging to
an Uber employee from a dark web marketplace. An initial attempt to connect to Uber’s
network with these credentials failed because the account was protected with MFA. To
overcome this security obstacle, the hacker contacted the Uber employee via What’s
App and, while pretending to be a member of Uber’s security, asked the employee to
approve the MFA notifications being sent to their phone. The hacker then sent a flood of
MFA notifications to the employee’s phone to pressure them into succumbing to this
request. To finally put an end to this notification storm, the Uber employee approved an
MFA request, granting the hacker network access, which ultimately led to the data
breach.
After completing the attack, the hacker compromised an Uber employee’s Slack
account and announced the successful breach to the entire company.
This isn’t the first time Uber has been hacked. In 2016, two hackers breached Uber’s
systems, accessing names, email addresses, and phone numbers of 57 million users of
the Uber app.
Was any Sensitive User Data Stolen During the Uber Breach?
Despite the deep level of compromise the hacker achieved, no evidence of customer
data theft has been announced. This is likely because the hacker wasn’t intent on
causing harm but was, rather, chasing the thrill of a successful cyberattack and the
hacker community respect that comes with it.
Had the hacker been motivated by financial gain, he would have likely sold Uber’s bug
bounty reports on a dark web marketplace. Given the devastating data breach impact
that’s possible with the findings of a bug bounty program, it would have sold for a very
high price.
To say that Uber is lucky this hacker wasn’t an actual cybercriminal is a significant
understatement. The company came so close to a complete system shutdown. From a
cybersecurity perspective, it seems almost unbelievable that after taking complete
control of Uber’s systems, the hacker just dropped everything and walked away. Without
any security obstacles left to overcome, it would have been so easy to tie off the breach
with a quick installation of ransomware.
Given Uber’s poor reputation for handling extorsion attempts, thankfully, this didn’t
happen. When Uber was breached in 2016, the company paid the cybercriminals their
$100,000 ransom in exchange for deleting their copy of the stolen data. Then, in an
attempt to conceal the event, the company forced the hackers to sign a non-disclosure
agreement and made it appear like the ransom payment was an innocuous reward
within the company’s bug bounty program.