back to top

Trending Content:

What Precipitated the Uber Knowledge Breach in 2022? | Cybersecurity

The Uber knowledge breach started with a hacker buying stolen credentials belonging to an Uber worker from a darkish net market. An preliminary try to hook up with Uber’s community with these credentials failed as a result of the account was protected with MFA. To beat this safety impediment, the hacker contacted the Uber worker through What’s App and, whereas pretending to be a member of Uber’s safety, requested the worker to approve the MFA notifications being despatched to their cellphone. The hacker then despatched a flood of MFA notifications to the worker’s cellphone to stress them into succumbing to this request. To lastly put an finish to this notification storm, the Uber worker accepted an MFA request, granting the hacker community entry, which in the end led to the information breach.

After finishing the assault, the hacker compromised an Uber worker’s Slack account and introduced the profitable breach to all the firm.

Screenshot of the hacker’s breach announcement in Uber’s Slack channel – Supply: TwitterWhat Knowledge Did the Hacker Entry?

After efficiently connecting to Uber’s intranet, the hacker gained entry to the corporate’s VPN and found Microsoft Powershell scripts containing the login credentials of an admin consumer in Thycotic – the corporate’s Privileged Entry Administration (PAM) answer. This discovery considerably elevated the severity of the breach by facilitating full admin entry to all of Uber’s delicate providers, together with DA, DUO, Onelogin, Amazon Internet Companies (AWS), and GSuite.

The hacker additionally allegedly accessed Uber’s bug bounty reviews which normally include particulars of safety vulnerabilities but to be remediated.

The 18-year-old hacker, believed to be related to the cybercriminal group, Lapsus$, revealed the small print of the assault in a dialog with cybersecurity researcher Corben Leo.

673c406af776e8c59d760c09 63773580415e09785f5b76a4 F2Screenshot of the dialog between the Uber hacker and cybersecurity researcher Corben Leo – Supply: TwitterWas any Delicate Consumer Knowledge Stolen In the course of the Uber Breach?

Regardless of the deep stage of compromise the hacker achieved, no proof of buyer knowledge theft has been introduced. That is probably as a result of the hacker wasn’t intent on inflicting hurt however was, relatively, chasing the joys of a profitable cyberattack and the hacker neighborhood respect that comes with it.

Had the hacker been motivated by monetary acquire, he would have probably offered Uber’s bug bounty reviews on a darkish net market. Given the devastating knowledge breach impression that’s doable with the findings of a bug bounty program, it might have offered for a really excessive value.

To say that Uber is fortunate this hacker wasn’t an precise cybercriminal is a big understatement. The corporate got here so shut to an entire system shutdown. From a cybersecurity perspective, it appears virtually unbelievable that after taking full management of Uber’s methods, the hacker simply dropped every part and walked away. With none safety obstacles left to beat, it might have been really easy to tie off the breach with a fast set up of ransomware.

Given Uber’s poor repute for dealing with extorsion makes an attempt, fortunately, this didn’t occur. When Uber was breached in 2016, the corporate paid the cybercriminals their $100,000 ransom in change for deleting their copy of the stolen knowledge. Then, in an try to hide the occasion, the corporate compelled the hackers to signal a non-disclosure settlement and made it seem just like the ransom fee was an innocuous reward throughout the firm’s bug bounty program.

is your business at risk of a data breach?4 Key Lesson From the Uber Knowledge Breach

A number of essential cybersecurity classes could be discovered from the Uber knowledge breach. By making use of them to your cybersecurity efforts, you could possibly probably keep away from struggling an analogous destiny.

1. Implement Cyber Consciousness Coaching

The truth that the Uber worker ultimately gave into the flood of MFA requests within the preliminary stage of the assault is proof of poor consciousness of a typical MFA exploitation tactic generally known as MFA Fatigue. Had the Uber worker been conscious of this tactic, they might have probably reported the risk relatively than falling sufferer to it, which might have prevented the breach from occurring. The hacker additionally utilized social engineering strategies to idiot the Uber worker into considering they had been a member of Uber’s safety staff, which is one other widespread cyberattack tactic. 

Implementing cyber consciousness coaching will equip your workers to acknowledge the widespread cyberattack strategies that made this breach doable – MFA fatigue and social engineering.

The next free assets can be utilized to coach your staff about widespread cyber threats and the significance of cybersecurity:

2. Be Conscious of Frequent MFA Exploitation Strategies

Not all Multi-Issue Authentication protocols are equal. Some are extra weak to compromise than others. Your cybersecurity groups ought to evaluate your present MFA processes in opposition to widespread exploit techniques and, if required, improve the complexity of authentication protocols to mitigate exploitation.

Find out about widespread MFA bypass strategies >

3. By no means Hardcode Admin Login Credentials Anyplace (Ever)

In all probability probably the most embarrassing cybersecurity blunder on this incident is the hardcoding of admin credentials inside a Powershell script. This meant that the potential of an unauthorized consumer accessing uber’s delicate methods was at all times there – all that was required was for somebody to learn the Powershell script and uncover admin credentials contained therein.

This safety flaw would have been averted if safe coding practices had been adopted. Admin credentials ought to at all times be saved securely in a password vault and definitely by no means hardcoded wherever.

4. Implement a Knowledge Leak Detection Service

If the Uber hacker had extra malicious intentions, buyer knowledge woud have been stolen, revealed on the darkish net, and accessed a number of instances by cybercriminals earlier than Uber even realized it was breached. It’s essential for organizations to have a security internet in place for detecting darkish net knowledge leaks from undetected knowledge breaches, from each first-hand and third-party assaults.

A knowledge leak detection service notifies impacted companies when delicate knowledge leaks are detected on the darkish net in order that cybersecurity groups can safe compromised accounts earlier than they’re focused in observe up assaults.

Learn the way knowledge leak detection can cut back the impression of ransomware assaults.

Text reading - Uber Security Report

See how your group’s safety posture compares to Uber’s.

View Uber’s safety report.

Find out about different Well-known Knowledge Breaches:

Latest

Honeytokens as a Protection Towards Provide Chain Assaults | Cybersecurity

Honeytokens act like tripwires, alerting organizations of malicious cyber...

What’s a Safety Operations Heart (SOC)? | Cybersecurity

A safety operations heart (SOC) is a centralized facility...

Newsletter

Don't miss

How Did the Money App Information Breach Occur? | Cybersecurity

The Money App information breach was attributable to a former worker who accessed buyer monetary reviews as an act of revenge towards the corporate...

Honeytokens as a Protection Towards Provide Chain Assaults | Cybersecurity

Honeytokens act like tripwires, alerting organizations of malicious cyber threats lurking on the footsteps of their delicate information. They are a very efficient intrusion...

What’s a Safety Operations Heart (SOC)? | Cybersecurity

A safety operations heart (SOC) is a centralized facility that unifies a company’s safety monitoring throughout all IT infrastructure. SOCs operate as a hub...

LEAVE A REPLY

Please enter your comment!
Please enter your name here