Uber: Difference between revisions

From Enlace Hacktivista
Jump to navigation Jump to search
(Created page with "Ride-share giant Uber confirmed that it was responding to “a cybersecurity incident”. A hacker calling themselves "Tea Pot" claims to be the individual who took responsibility for the attack, bragging to multiple security researchers about the steps they took to breach the company. == Explanation of the Hack == An Uber EXT contractor had their account compromised by an attacker. It is likely that the attacker purchased the contractor’s Uber corporate password on t...")
 
mNo edit summary
Line 1: Line 1:
Ride-share giant Uber confirmed that it was responding to “a cybersecurity incident”. A hacker calling themselves "Tea Pot" claims to be the individual who took responsibility for the attack, bragging to multiple security researchers about the steps they took to breach the company.
Ride-share giant Uber confirmed that it was responding to “a cybersecurity incident” after TeaPot claimed to have hacked Uber. A hacker calling themselves "Tea Pot" claims to be the individual who took responsibility for the attack, bragging to multiple security researchers about the steps they took to breach the company.


== Explanation of the Hack ==
== Explanation of the Hack ==

Revision as of 00:51, 23 September 2022

Ride-share giant Uber confirmed that it was responding to “a cybersecurity incident” after TeaPot claimed to have hacked Uber. A hacker calling themselves "Tea Pot" claims to be the individual who took responsibility for the attack, bragging to multiple security researchers about the steps they took to breach the company.

Explanation of the Hack

An Uber EXT contractor had their account compromised by an attacker. It is likely that the attacker purchased the contractor’s Uber corporate password on the dark web, after the contractor’s personal device had been infected with malware, exposing those credentials. The attacker then repeatedly tried to log in to the contractor’s Uber account. Each time, the contractor received a two-factor login approval request, which initially blocked access. Eventually, however, the contractor accepted one, and the attacker successfully logged in.

From there, the attacker accessed several other employee accounts which ultimately gave the attacker elevated permissions to a number of tools, including G-Suite and Slack. The attacker then posted a message to a company-wide Slack channel, which many of you saw, and reconfigured Uber’s OpenDNS to display a graphic image to employees on some internal sites.

Confirmation of method used:

Media Coverage