Uber is investigating a major cybersecurity incident where an attacker socially engineered an employee to gain access to their VPN credentials. This allowed the attacker to hack into Uber's internal networks and locate a network share containing a Powershell script with an administrator's username and password. Using this stolen information, the attacker was reportedly able to extract more passwords and access several of Uber's internal systems and environments. The hack has left some Uber employees unable to access tools like Slack. Uber acknowledged the incident in a tweet, stating they are responding and in contact with law enforcement.
Uber is investigating a major cybersecurity incident where an attacker socially engineered an employee to gain access to their VPN credentials. This allowed the attacker to hack into Uber's internal networks and locate a network share containing a Powershell script with an administrator's username and password. Using this stolen information, the attacker was reportedly able to extract more passwords and access several of Uber's internal systems and environments. The hack has left some Uber employees unable to access tools like Slack. Uber acknowledged the incident in a tweet, stating they are responding and in contact with law enforcement.
Uber is investigating a major cybersecurity incident where an attacker socially engineered an employee to gain access to their VPN credentials. This allowed the attacker to hack into Uber's internal networks and locate a network share containing a Powershell script with an administrator's username and password. Using this stolen information, the attacker was reportedly able to extract more passwords and access several of Uber's internal systems and environments. The hack has left some Uber employees unable to access tools like Slack. Uber acknowledged the incident in a tweet, stating they are responding and in contact with law enforcement.
Uber is investigating a major cybersecurity incident where an attacker socially engineered an employee to gain access to their VPN credentials. This allowed the attacker to hack into Uber's internal networks and locate a network share containing a Powershell script with an administrator's username and password. Using this stolen information, the attacker was reportedly able to extract more passwords and access several of Uber's internal systems and environments. The hack has left some Uber employees unable to access tools like Slack. Uber acknowledged the incident in a tweet, stating they are responding and in contact with law enforcement.
Download as DOCX, PDF, TXT or read online from Scribd
Download as docx, pdf, or txt
You are on page 1of 1
Uber hack linked to hardcoded secrets
spotted in PowerShell script
Uber is investigating claims its systems have been compromised by an attacker. The attacker offered evidence that they had successfully breached many of the ride-sharing app firm’s internal networks by posting various screenshots and commenting on their exploits in interactions with the media and security experts. The miscreant claimed that they socially engineered an employee before gaining access to their VPN credentials. This compromised access subsequentially allowed them to hack into its network and scan Uber’s intranet. Catch up with the latest data breach news
Uber is purported to rely on multi-factor authentication (MFA). Third-party experts
have commented that an attacker may have been able to circumvent these controls by establishing a fake domain and any relaying authentication codes submitted to the genuine domain using a manipulator-in-the-middle (MitM) attack. According to the attacker, the hack was set up by spamming an Uber employee with push authentication requests for more than an hour before using another channel to trick them into authorizing one of the requests. The attacker claims they went on to locate a network share containing powershell scripts that included the username and password of a system administrator. Using this information, the cybercrook was purportedly able to extract passwords and access Uber’s AWS (Amazon Web Services), Onelogin, and GSuite environments, among others). They also hacked into an Uber employee’s HackerOne account before commenting on multiple tickets, evidence that the miscreant likely has compromised highly sensitive bug bounty reports related to security vulnerabilities in Uber products and infrastructure. As a result of the hack, Uber workers have been left unable to access Slack and some other tools. In addition, the hacker posted NSFW (Not Safe For Work) images on internal employee resource pages. In an update to its official Twitter account, Uber said: “We are currently responding to a cybersecurity incident. We are in touch with law enforcement and will post additional updates here as they become available.” The Daily Swig asked for early access to comment on the results of this ongoing data breach investigation. No word back as yet but we’ll update this story as and when more information comes to hand.