Lessons from Uber’s Recent Breach

Lessons from Uber’s Recent Breach

Lessons from Uber’s Recent Breach

Every cybersecurity breach is an opportunity to learn and adapt.

On Sept 15th a curious teenage hacker looking for fun, compromised Uber in a serious way, gaining administrative access to the company’s massive cloud instance, development environments, tools, and even their access management server! The hacker joked with how terribly easy it was and shared proof with news outlets, on hacker message boards, and even with employees on Uber’s internal Slack communication tool.

The attack was not masterful, but rather simple, and yet snowballed into a massive data breach.

This is not the first big breach that Uber has experienced. Back in 2016 another breach occurred, affecting 57 million people, and executives tried to conceal it. That resulted in a $148 million dollar fine and an agreement with the FTC to maintain a comprehensive privacy program for 20 years.

As for this recent hack, it started with a simple social engineering attack that granted access to the internal network, then while snooping around a PowerShell script was found that contained administrator level access which cascaded into Super Admin permissions across the company.  





Security experts describe this hack as a “total compromise”, which is a term not often used.

I see many people pointing a finger at the weakness of behaviors, some say it is a failure of technology, while a handful are defending Uber, saying being breached is an inevitability.

Well, from where I sit there were failures across the cybersecurity spectrums of technology, behaviors, and processes.

Let’s cover a few:

  1. Behaviors: Social engineering targets people, the weakest link, and it appears that the training and security culture could be much improved. Beyond the fact that phishing was the starting point, the reporting of the issue was slow, and even when the crisis team told employees to not use internal tools like Slack, the employees ignored the instructions. 

  2. Processes: Yes, the crisis response process could be improved, especially with getting staff on-board with containment and recovery actions. But the biggest issues are around allowing scripts to have embedded passwords to systems and not requiring more sophisticated authentication for Admin accounts. …and Failsafe Super Admin accounts should be protected and reserved to evict bad actors.

  3. As for the technology: Strong Multi-Factor authentication should be in place for all Admin accounts. Better oversight and blocking capabilities for remote Admin logins should also be in place. Basically, the principles of Zero Trust, that is gaining so much momentum across security tool vendors.

  4. Lastly, from an organizational perspective, they are committed to have a comprehensive Privacy program, due to the 2016 data breach, but Privacy is meaningless without the necessary security to go with it. 

Uber was lucky this attacker was not malicious. With those permissions, an attacker could destroy the systems and data of the company, probably causing hundreds of millions of dollars and disrupting services for months.

The bad news is that every organized cybercriminal group, ransomware crew, and nation-state offensive team will be looking at Uber as an easy target. Their history tells a story, the current event is looking egregious, and that might spell doom for Uber in the future.

Uber, it is time to invest and support a highly capable and enabled cybersecurity, privacy, and ethics program which should be reporting to the CEO and board. In the meantime, there are likely rough roads ahead for Uber.

Share this article

Leave your comments

Post comment as a guest

terms and condition.
  • No comments found

Share this article

Matthew Rosenquist 

Cybersecurity Expert

Matthew Rosenquist is an industry-recognized pragmatic, passionate, and innovative strategic security expert with 28 years of experience. He thrives in challenging cybersecurity environments and in the face of ever shifting threats. A leader in identifying opportunities, driving industry change, and building mature security organizations, Matthew delivers capabilities for sustainable security postures. He has experience in protecting billions of dollars of corporate assets, consulting across industry verticals, understanding current and emerging risks, communicating opportunities, forging internal cooperation and executive buy-in, and developing practical strategies. Matthew is a trusted advisor, security expert, and evangelist for academia, businesses, and governments around the world. A public advocate for best-practices, and communicating the risks and opportunities emerging in cybersecurity. He delivers engaging keynotes, speeches, interviews, and consulting sessions at conferences and to audiences around the globe. He has attracted a large social following of security peers, is an active member on advisory boards, and quoted in news, magazines, and books. Matthew is a recognized industry expert, speaker, and leader who enjoys the pursuit of achieving optimal cybersecurity. Matthew Rosenquist is experienced in building world class teams and capabilities, managing security operations, evangelizing best-practices to the market, developing security products, and improving corporate security services. 

Cookies user prefences
We use cookies to ensure you to get the best experience on our website. If you decline the use of cookies, this website may not function as expected.
Accept all
Decline all
Read more
Tools used to analyze the data to measure the effectiveness of a website and to understand how it works.
Google Analytics