Uber sees employee data leaked following cyberattack
More like Uber Leaks
When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.
A hacking forum has four new topics purporting to contain newly leaked corporate data from Uber and Uber Eats.
The company has confirmed a breach, revealing toBleepingComputerthat data, including source code for mobile device management platforms (MDMs), IT asset management reports, data destruction reports,WindowsActive Directory information,e-mailaddresses, and “other corporate information” wasstolen via a breachto anAmazon Web Services(AWS) server belonging to asset management and tracking service company Teqtivity.
The true extent of the breach is as yet unknown, but one document alone seen byBleepingComputeris stuffed with data for over 77,000 employees - although security researchers have confirmed that this particular breach should not affect customers.
Uber’s security woes
The incident is the third known breach to leak Uber personal data in recent years.
In July 2022,TechRadar Proreportedthat Uber confessed to covering up a “major” data breach that occurred in 2016 that led to customer data, includingpasswords, being leaked online, putting them at risk ofidentity theft.
That leak was, however, uncovered well before then, resulting in a£385,000 fine from the UK’s Information Commissioner’s Office(ICO) in 2018.
In September 2022, the companyconfirmedthat another data breach that affected customers, made possible by vulnerabilities to its criticalendpoints,had occurred that month. It lateradmittedthat hacking collective Lapsus$ had gained access to its HackerOne dashboard, which provides insights into an organization’s digital security.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Check out our list of the best identity management software right now
What Is IAM? Understanding Identity & Access Management
What is Zero Trust Network Access?
Forum posts relating to the December breach do reference at least one individual member of Lapsus$. However, Uber maintains that the September and December breaches are unrelated.
“We believe these files are related to an incident at a third-party vendor and are unrelated to our security incident in September. Based on our initial review of the information available, the code is not owned by Uber; however, we are continuing to look into this matter,” it said, while also claiming that it has not seen malicious or unusual activity on its own systems.
Nevertheless, the latest breach raises concerns around the continued reliance on cloud services offered by only a select number of companies, such asAmazon, despite security andoutage concerns.
Uber employees are advised to be extra vigilant on the lookout forsocial engineeringscams, such asphishingattacks, from threat actors looking to capitalise on the breach.
Luke Hughes holds the role of Staff Writer at TechRadar Pro, producing news, features and deals content across topics ranging from computing to cloud services, cybersecurity, data privacy and business software.
Cisco issues patch to fix serious flaw allowing possible industrial systems takeover
Washington state court systems taken offline following cyberattack
I’ve used Genmoji and now I’m convinced Apple Intelligence will be a huge success