/
Navigation
Chronicles
Browse all articles
Explore
Semantic exploration
Research
Entity momentum
Nexus
Correlations & relationships
Story Arc
Topic evolution
Drift Map
Semantic trajectory animation
Posts
Analysis & commentary
Pulse API
Tech news intelligence API
Browse
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
Concept Search
Semantic similarity search
High Impact Stories
Top coverage by position
Sentiment Analysis
Positive/negative coverage
Anomaly Detection
Unusual coverage patterns
Analysis
Rivalry Report
Compare two entities head-to-head
Semantic Pivots
Narrative discontinuities
Crisis Response
Event recovery patterns
Connected
Search: /
Command: ⌘K
Embeddings: large
TEXXR

Chronicles

The story behind the story

days · browse · Enter similar · o open

Uber says there is “no evidence” the hacker accessed sensitive user info, like trip histories, during the breach and that all its products are now “operational”

Uber says there is “no evidence” that any of its users' private information was compromised in a breach of its internal computer systems.

The Verge Andrew J. Hawkins

Discussion

  • @uber_comms @uber_comms on x
    https://twitter.com/...
  • @racheltobac Rachel Tobac on x
    So far Uber says “we have no evidence the incident involved access to sensitive user data (like trip history)”. As we know, just bc there isn't evidence yet of user data exfil doesn't mean it didn't happen. Crossing my fingers that it turns out user data wasn't impacted 🤖🤞 https:…
  • @hacker_ Corben Leo on x
    Apparently there was an internal network share that contained powershell scripts... “One of the powershell scripts contained the username and password for a admin user in Thycotic (PAM) Using this i was able to extract secrets for all services, DA, DUO, Onelogin, AWS, GSuite” htt…
  • @coltonseal Colton on x
    Honestly kind of a classy way to hack someone 😂😂😂 @Uber https://twitter.com/...
  • @kyliebytes Kylie Robison on x
    An Uber employee told Fortune that when they open their work laptop, all internal websites displayed a picture of an “erect penis” with the text “FUCK YOU DUMB WANKERS.” https://fortune.com/...
  • @kwestin Ken Westin on x
    If Uber didn't use computers then this would have never happened.
  • @willoremus Will Oremus on x
    old enough to remember three days ago when twitter was the only tech company with bad security https://www.washingtonpost.com/ ... https://t.co/UZE1YaXQKY
  • @film_girl Christina Warren on x
    I can't dunk on this. I know a lot of people will, but I can't. I was raised in newsrooms, which is second only to LE for gallows humor. But lol at being told to stop. https://twitter.com/...
  • @josephmenn Joseph Menn on x
    The Uber breach, which the hacker says began with social engineering of an employee, may be so thorough that it will be hard to kick the intruder out, experts said overnight. https://www.washingtonpost.com/ ...
  • @kyliebytes Kylie Robison on x
    NEW: An employee at Uber described scenes of chaos on Thursday night as the ride-hailing company's computer systems were commandeered in a devastating hack that buffeted staffers with obscene images. I wrote about inside the mayhem for @FortuneMagazine: https://fortune.com/...
  • @laurentbercot Laurent Bercot on x
    I'll just use my username and password in this script that needs admin rights, what could possibly go wrong https://twitter.com/...
  • @k8em0 @k8em0 on x
    Pour one out for the security response team at Uber. Hardcoded secrets in a powershell script got them powershellacked. Good practice is to assume intruders will seek out your internal scripts & do not leave secrets hard coded to help them elevate privilege & pivot like this. htt…
  • @rik_ferguson Rik Ferguson on x
    Second time in a week that I have heard of hardcoded PAM secrets giving an opportunistic attacker *all the access* to a global corp. Technology is wholly dependent upon proper implementation and process. It's easy to point fingers at a product, but often wrong. https://twitter.co…
  • @da_667 @da_667 on x
    The amount of shitposting and emojis is pretty hilarious. https://twitter.com/...
  • @aaschapiro Avi Asher-Schapiro on x
    If this screen shot is to be believed, the hacker who broke into Uber spammed the company's slack with a message about underpaid drivers.... https://twitter.com/...
  • @faizsays Faiz Siddiqui on x
    As employee reactions poured in, including a Mr. Krabs meme, the “It's Happening” GIF and questions about whether it was a prank, someone wrote. “Sorry to be a stick in the mud, but I think IT would appreciate less memes while they handle the breach” https://www.washingtonpost.co…
  • @kantrowitz Alex Kantrowitz on x
    Props for going @ here vs. @ channel. That counts for something. https://twitter.com/...
  • @tomwarren Tom Warren on x
    The Uber hacker reportedly posted a message in the company's internal Slack, and employees thought it was joke and reacted with 🍿 and 🚨 emoji and GIFs on the post https://twitter.com/...
  • @uber_comms @uber_comms on x
    We are currently responding to a cybersecurity incident. We are in touch with law enforcement and will post additional updates here as they become available.
  • @samwcyo Sam Curry on x
    Someone hacked an Uber employees HackerOne account and is commenting on all of the tickets. They likely have access to all of the Uber HackerOne reports. https://twitter.com/...
  • @samwcyo Sam Curry on x
    From another Uber employee: Instead of doing anything, a good portion of the staff was interacting and mocking the hacker thinking someone was playing a joke. After being told to stop going on slack, people kept going on for the jokes. lmao
  • @kyliebytes Kylie Robison on x
    RIP to everyone's weekend at Uber. “Shortly before the Slack system was taken offline on Thursday afternoon, Uber employees received a message that read: ‘I announce I am a hacker and Uber has suffered a data breach.’” https://www.nytimes.com/...
  • @billdemirkapi Bill Demirkapi on x
    Some new information since last night. The attacker claims that they were able to gain persistent MFA access to their compromised accounts by social engineering the victims into accepting a prompt that allowed the attacker to register their own device for MFA. 15/N https://twitte…
  • @cityofthetown Tom Dotan on x
    The uber hack seems nightmarishly bad. And pretty depressing that the way around MFA is just spamming the victim until they give up and just allow themselves to be hacked. https://twitter.com/...
  • @joshconstine Josh Constine on x
    This is so savage. A hacker broke into Uber's Bug Bounty program and stole all the vulnerability reports ...so they can hack it over and over until everything is fixed. Galaxy brain attack. https://www.bleepingcomputer.com/ ... https://twitter.com/...
  • @lorenzofb Lorenzo Franceschi-Bicchierai on x
    NEW: One of the biggest takeaways of the Uber hack is that 2FA via push notifications is flawed and relatively easy to circumvent. “They can become so annoying that the target eventually accepts,” @RachelTobac told us. https://www.vice.com/...
  • @kyliebytes Kylie Robison on x
    Just dropping this here.... employees seemingly still don't have access. Yay for long weekends? https://twitter.com/...
  • @spencerdailey Spencer Dailey on x
    @Techmeme @LawrenceAbrams This is a major deal if true —> not only have Uber's systems been compromised, but the company will remained compromised until it fixes all of their known vulnerabilities. In other words, the odds of hacker reentry are extremely high and will remain so f…
  • @kateconger Kate Conger on x
    Update: We spoke to the person who claimed responsibility for the hack. He says he is 18. https://twitter.com/...
  • @tiffanycli Tiffany C. Li on x
    Cybersecurity truths: 1. No system is perfectly secure. 2. The more data you store, the more data you risk. Good thing the only sensitive personal data Uber has are financial info, contact info, and also the records of everywhere every user has ever traveled at any time. https://…
  • @carlquintanilla Carl Quintanilla on x
    “.. The hacker provided .. screenshots that appeared to show widespread access to a range of administrative accounts that manage Uber's technology systems, including the company's Amazon Web Services and Google clouds ..” ⁦@WSJ⁩ $UBER https://www.wsj.com/...
  • @kevinroose Kevin Roose on x
    Update: a person claiming responsibility for the Uber hack tells the NYT that he is 18, got in through social engineering an employee's password, and hacked the company because it had weak security. https://www.nytimes.com/... https://twitter.com/...
  • @tomwarren Tom Warren on x
    Uber has been hacked, and it looks bad. The hacker got in through social engineering and allegedly found a network share full of Microsoft PowerShell scripts that included Uber admin usernames and passwords to let them breach AWS, G Suite, and more 🥲 https://www.theverge.com/...
  • @dcuthbert Daniel Cuthbert on x
    “Doesn't know what to do with it and is having the time of his life” Aaaaand there's my teenage years eloquently portrayed. https://twitter.com/...
  • @mmasnick Mike Masnick on x
    The kids these days... https://twitter.com/...
  • @wbm312 Whitney Merrill on x
    And on the 27th anniversary of the movie Hackers too. https://twitter.com/... https://twitter.com/...
  • @williamlegate @williamlegate on x
    Uber has had their entire infrastructure (cloud, financial, comms, dev, etc) hacked by a kid purporting to be a teenager - breach appears to be very severe. https://twitter.com/...
  • @roybahat Roy E. Bahat on x
    “In the Slack message that announced the breach, the person also said Uber drivers should receive higher pay.” Curious what motivated the hacker to choose to crusade for that... https://twitter.com/...
  • @dangoodin001 Dan Goodin on x
    “'They pretty much have full access to Uber,' said Sam Curry, a security engineer at Yuga Labs who corresponded with the person who claimed to be responsible for the breach. ‘This is a total compromise, from what it looks like.’” https://twitter.com/...
  • @wbm312 Whitney Merrill on x
    Fido 2FA for all pls. https://twitter.com/...
  • @wbm312 Whitney Merrill on x
    Guess they can't hide this one from the FTC 😬 https://twitter.com/...
  • @wbm312 Whitney Merrill on x
    This is the worst case scenario we all try to prepare for, but no one believes will happen or is possible... https://twitter.com/...
  • @3vansutton Evan Sutton on x
    I can't wait for them to have a fleet of driverless cars because clearly there's no large scale risk of that ending badly https://twitter.com/...
  • @kellen_browning Kellen Browning on x
    Big scoop from ⁦@kateconger⁩ and ⁦@kevinroose⁩ — Uber's internal network was breached Thursday and employees have been told to stay off Slack. Developing situation: https://www.nytimes.com/...