Uber says compromised credentials of a contractor led to knowledge breach | Mob Tech

Uber says compromised credentials of a contractor led to data breach | Mob Tech

Uber has added further aspect to the narrative of its latest breach of security controls, saying the compromise of a third-party contractor’s credentials was the beginning line of the assault. He moreover believes the attacker was linked to the Lapsu$ extortion ring.

“The attacker seemingly purchased the contractor’s Uber firm password on the darkish web, after the contractor’s non-public machine was contaminated with malware, exposing these credentials,” the company talked about Monday.

The attacker then repeatedly tried to log into the contractor’s Uber account. Each time, the contractor acquired a two-factor login approval request, which initially blocked entry. Lastly, nonetheless, the contractor accepted one and the attacker effectively logged on.

This tactic was effectively utilized by an attacker earlier this yr in the direction of a Cisco Applications employee.

“From there, the attacker accessed a lot of completely different employee accounts that in the long run gave the attacker elevated permissions to numerous devices, along with G-Suite and Slack. The attacker then posted a message to a company-wide Slack channel, which numerous you [reporters] seen and reconfigured Uber’s OpenDNS to point out a graphical image to employees on some internal web sites.”

Uber believes the attacker or attackers are affiliated with the Lapsus$ gang, which is believed to have suffered extreme damage in March when UK police arrested seven people between the ages of 16 and 21. In the long run, two children who allegedly hacked for the gang have been charged.

Lapsus$ has gained notoriety for exposing assaults in the direction of graphics card maker Nvidia, Samsung, Cisco Applications, and on-line sport developer Ubisoft. Microsoft acknowledged in March that it was attacked by the gang.

In an analysis of the gang’s methods, Microsoft talked about it’s acknowledged to buy credentials and session tokens from underground jail boards and look for uncovered credentials in public code repositories. If an organization makes use of multi-factor authentication as a further step to secure logins, the gang has been acknowledged to utilize session token replay and stolen passwords to set off simple approval MFA requests, hoping that the particular person The genuine particular person of the compromised account in the end accepts the requests and grants the obligatory approval. if an employee’s non-public e mail or smartphone is hacked, they use that entry to reset passwords and full account restoration actions.

Uber acknowledged that the attacker downloaded some internal messages from Slack, along with accessed or downloaded knowledge from an internal software program that its finance group makes use of to deal with some invoices. These downloads are being analyzed.

He moreover admits that the attacker was ready to entry Uber’s dashboard on HackerOne, the place security researchers report bugs and vulnerabilities for cash. Nonetheless, Uber talked about, any bug evaluations the attacker was ready to entry have been remediated.

So far, Uber says, it has no proof that the attacker has accessed its manufacturing (ie, public-facing) applications, or the databases it makes use of to retailer delicate particular person knowledge, paying homage to financial institution card numbers. , particular person checking account knowledge or journey historic previous. Uber well-known that the company encrypts financial institution card knowledge and personal effectively being information.

There could also be moreover no proof that the attacker made any changes to the equipment’s code bases. It has moreover not found that the attacker has accessed any purchaser or particular person information saved by Uber’s cloud suppliers (as an example, AWS S3).

Uber, Uber Eats and Uber Freight suppliers are nonetheless operational and working simply, the company talked about. “Because of we eradicated some internal devices, purchaser assist operations have been minimally affected and in the meanwhile are once more to common,” he added.

Among the many many actions Uber says it has taken due to this violation

  • any employee account that was compromised or doubtlessly compromised was locked out or wanted to have its password reset;
  • Credential keys have been rotated, efficiently restoring entry to many internal Uber suppliers.
  • utility code bases have been locked to cease extra code changes;
  • employees accessing the occasion devices ought to re-authenticate. Uber talked about it’s often “extra strengthening our multi-factor authentication (MFA) insurance coverage insurance policies”;
  • Additional monitoring of Uber’s internal environment has been added to take care of a good nearer eye on any suspicious train.


You may also like...

Comments are closed.