On Monday, Uber revealed further information about the security breach last week, tying it to a threat actor it suspects is linked to the notorious LAPSUS$ hacking crew.
“This group frequently targets technology firms, and in 2022 alone has hacked Microsoft, Cisco, Samsung, NVIDIA, and Okta, among other businesses,” according to the San Francisco-based firm.
In March 2022, the City of London Police arrested seven individuals aged 16 to 21 for their suspected connections to a financially-motivated extortionist gang. Fraud charges have been brought against two of those juvenile defendants.
The hacker that accessed Uber’s data, an 18-year-old known as Tea Pot, has also taken credit for attacking video game maker Rockstar Games over the weekend.
As Uber’s investigation continues, the company is working with “several leading digital forensics firms” and coordinating with the U.S. Justice Department and the Federal Bureau of Investigation (FBI).
For the method of the attack, Uber said that an “EXT contractor” had their device hacked with malware and their company account credentials stolen and sold on the dark web, confirming an earlier Group-IB disclosure.
The Singapore-based firm stated last week that at least two of Uber’s employees in Brazil and Indonesia had been hacked by unidentified malware known as Raccoon and Vidar.
Although Uber didn’t share how many employee accounts were likely hacked, it did emphasise that no code changes were made without authorisation and that there was no sign the hacker could access systems containing customer information.
The young hacker downloaded several internal Slack messages and information from an in-house finance team’s tool to manage specific invoices. In addition, Uber confirmed that the attacker accessed HackerOne bug reports; however, they noted: “that any bug reports the attacker was able to access have been remediated.”
While using an app-based authentication system to minimise risks associated with SIM swapping assaults has occurred, the hacking of Uber and Cisco demonstrates that security protections, once thought inviolable, are being broken through other means.
The fact that threat actors are relying on attack routes such as adversary-in-the-middle (AiTM) proxy toolkits and MFA fatigue (aka prompt bombing) to dupe an unsuspecting user into providing their One-Time Passcode (OTP) or granting access is proof that phishing-resistant tactics need to be used.
More Stories
Killnet and AnonymousSudan Collaborate to Launch Cyber Attacks on Western Organisations
In recent news, it has been reported that two Russia-sympathetic hacktivist groups, Killnet and AnonymousSudan, have allegedly launched a series...
$4000 Gone In An Instant: Mother Defrauded in Facebook Marketplace Car Deal
A mother of four is warning others to be cautious after believing she had purchased a safe and dependable car...
Shocking Scam: Sydney Family Loses $200K Life-Savings in Suncorp Spoofing Fraud
A family from Sydney has lost their life savings worth $200,000 due to a fraudulent scam. Peter and Madison, who...
Mysterious Money Transfer Leaves Couple Speechless: How They Got an Unsolicited $4000
A young couple in Melbourne claims their bank is making up a personal loan they do not understand. Ashley and...
Phishing + AI + Voice Cloning= Big Trouble: The New Way Criminals are Stealing Your Money
New Alert: Criminals use AI and voice cloning to trick you out of your money. Earlier this year, Microsoft unveiled...
‘Impossible to Spot’ Delivery Scam Email Targets Australia Post Customers – Don’t Fall Victim!
Unsuspecting shoppers should be cautious as a parcel delivery scam that is hard to distinguish targets Australia Post customers. Email...