Η εταιρεία Uber παραβιάστηκε την Πέμπτη το απόγευμα και οι χάκερ μοίρασαν στιγμιότυπα των εσωτερικών συστημάτων της εταιρείας, του πίνακα ελέγχου του ηλεκτρονικού ταχυδρομείου και του διακομιστή Slack.
What appears from the screenshots shared by the hackers is that they were able to gain full access to several critical Uber IT systems, including the company's security software and Windows domains.
They also managed to get into the company's Amazon Web Services console, VMware ESXi virtual machines, the Google Workspace email management dashboard and the Slack server, where the hacker posted messages.
Uber confirmed attack, tweeting that is in consultation with police and will release additional information as it becomes available.
The New York Times, who first reported the breach, succeeded and spoke with the hacker, who said they breached Uber after carrying out an attack social engineering to an employee and stole his password.
The hacker(s) then gained access to the company's internal systems using the stolen credentials.
Η κοινωνική μηχανική (Social engineering) είναι η πράξη της προφορικής χειραγώγησης ατόμων, με σκοπό την απόσπαση πληροφοριών.
Although similar to trickery or simple fraud, the term is primarily associated with deceiving individuals in order to extract confidential information necessary to gain access to a computer system.
Usually the one applying it never comes face to face with the person who is deceiving or misleading. Although the term may not be accurate or successful it is now established.
Social engineering has become a very popular tactic in recent attacks against well-known companies, including Twitter, MailChimp, Robinhood and Okta.
Εκτέθηκαν αναφορές ευπάθειας HackerOne
While it's possible the hacker stole data and source code from Uber, it appears he also had access to what could be its most valuable asset.
According to Yuga Labs security engineer, Sam Curry, the hacker also had access to the company's HackerOne bug bounty program, where he commented on all of the company's bug bounty tickets.
Curry said he first learned of the breach after the attacker left the above comment in a vulnerability report he submitted to Uber two years ago.
Uber runs a HackerOne bug bounty program where it allows security researchers to privately disclose vulnerabilities in its systems and applications in exchange for a bug bounty reward. These vulnerability reports are intended to be kept confidential until a patch is published to prevent attackers from exploiting them in attacks.
As you can see the attacker downloaded all the vulnerability reports before losing access to Uber's bug bounty program. This likely includes unpatched vulnerability reports, presenting a serious security risk for Uber in the future as well.