Home Technology Everything We Know About the Massive Uber Hack

Everything We Know About the Massive Uber Hack

0
Everything We Know About the Massive Uber Hack

Image for article titled Everything We Know About the Massive Uber Hack

Photo: DON EMMERT/AFP (Getty Images)

Uber has been hacked and boy does it look dangerous. The hacker, which boasted of their achievements by way of Telegram this week, claims to be an 18-year-old who allegedly gained such liberal entry to the tech large’s community that they have been capable of Slack the Uber workforce and publish an image of a dick on the corporate’s inner web sites.

Uber hasn’t mentioned a lot about its safety debacle but, other than Thursday when it admitted that it was experiencing a “cybersecurity incident.” On Friday, the corporate additionally posted a brief update during which they claimed that there was “no evidence that the incident involved access to sensitive user data.”

Online safety researchers have been fast to research the episode, parsing what tactical errors could have led to the breach, based mostly on the knowledge leaked by the perpetrator. Granted, all the pieces that the hacker has mentioned at this level is barely alleged and it’s not precisely clear whether or not they’re telling the reality or not. However, Gizmodo reached out to a number of consultants to inquire in regards to the hack and get their views on how this complete factor may need occurred.

How the Hacker Claims to Have Breached Uber

Like plenty of latest intrusions into giant company networks, the hack of Uber seems to have been completed utilizing pretty primary hacking methods. Indeed, if the perpetrator does develop into an adolescent, it will imply that one of many greatest tech corporations on the planet was hacked by somebody who probably doesn’t qualify as far more than a script kiddie.

As just isn’t rare in these instances, the hacker has been blissful to inform everyone how they obtained into Uber’s community. In statements posted to a Telegram web page, the alleged hacker mentioned they used a Man-in-the-Middle fashion assault to focus on an Uber worker and steal their login information. MITM assaults use phishing websites to ensnare unsuspecting victims and seize and manipulate their net knowledge. This can result in the compromise login credentials and different private info. Dave Masson, Director of Enterprise Security at safety agency Darktrace, informed Gizmodo that this isn’t a very subtle intrusion technique.

“Based on what the hacker said, they didn’t really ‘hack’ their way in,” mentioned Masson. “They basically tricked somebody into giving up the multi-factor authentication details and then walked in the front door.” These sorts of assaults have all the time been widespread, however they’ve grown more and more prevalent for the reason that pandemic put most corporations in a semi-permanent work-from-home standing, Masson mentioned.

The MITM assault seems to have allowed the hacker to achieve entry to the person’s VPN, which supplied entry to Uber’s company community. From there, the hacker allegedly found a doc, or “internal access share,” that included login credentials for different companies and areas of the community. After that, escalating privileges into the corporate’s broader setting would have been comparatively simple.

The Fatal Flaw in MFA

For a very long time, we’ve heard that the surest solution to preserve our digital lives secure is to make use of multi-factor authentication. MFA authenticates customers by forcing them to current a number of items of data (usually from no less than two completely different gadgets) to log into their on-line accounts. Yet some types of MFA even have an occasionally mentioned vulnerability, which is that they are often simply out-maneuvered by a hacker who employs primary Man-in-the-Middle-style assaults. This is what seems to have occurred to Uber.

Bill Demirkapi, an impartial safety researcher, informed Gizmodo that the sort of MFA that Uber appears to have used just isn’t probably the most safe sort. Instead, Demirkapi suggests the usage of FIDO2, which payments itself as a “phishing-resistant” type of authentication. FIDO2 is an online authentication mechanism that, not like extra normal types of MFA, verifies that the origin of the MFA immediate got here from the true login server, Demirkapi mentioned. “If an attacker created a fake login page and prompted for FIDO MFA, the U2F device wouldn’t even respond, preventing the authentication from continuing,” he added.

“Standard forms of multi-factor authentication such as push notifications, text messages, OTP [one-time-password], etc. do protect against attackers that only have an employee’s credentials, but often not against phishing,” he mentioned.

Problematically, phishing a person of ordinary MFA may be completed pretty simply utilizing broadly accessible net instruments. Demirkapi refers to at least one such device, known as “evilgynx,” which may be accessed without spending a dime on-line. An attacker can use a device like this to create a pretend login web page that appears equivalent to the true one. If they persuade a sufferer to go to the phishing web page, the attacker’s server can “replicate a connection to the real login server” in order that all the pieces the sufferer enters is solely relayed to the attacker.

“A victim can enter their credentials, the attacker logs it, and then the attacker sends the login request to the real server,” mentioned Demirkapi. “Once the victim is prompted for “standard MFA”, there is no such thing as a verification executed to guarantee that the sufferer is definitely on the true login web page. The sufferer accepts the immediate, the true server sends the authenticated cookies for the sufferer to the attacker server, and the attacker logs and relays this to the sufferer. It’s a seamless course of that enables the attacker to seize the sufferer’s credentials, even with widespread types of multi-factor authentication,” he mentioned.

Is User Data Safe?

One lingering query about this incident is whether or not person knowledge could have been affected. On Friday, Uber launched a statement that alleged that there was “no evidence” that the hacker had accessed “sensitive user data (like trip history).” However, the corporate hasn’t precisely supplied a lot context for what which means. Security consultants that spoke with Gizmodo mentioned that (given the broad entry the hacker seems to have acquired) it was definitely potential that they may have seen person knowledge.

“Is it possible? Sure,” mentioned Demirkapi. “In fact, some screenshots that the attacker did leak appear to show limited access to customer information. This alone does not mean much, however, because what really matters is the extent to which the attacker gained access to customer info.” That extent, clearly, is unknown.

Masson equally agreed that it was potential. “We don’t know that yet, but I wouldn’t be surprised if that turned out to be the case,” he mentioned, pointing to the 2016 hack that affected the corporate. In that specific case, the influence was fairly dangerous. Hackers stole the private info of some 57 million Uber users. The firm didn’t disclose the incident and secretly paid the cybercriminals to delete the info.

For now, the extra pertinent query for Uber could also be what sort of filth the hacker discovered on the rideshare firm’s business practices and whether or not they would even know what to search for.


#Massive #Uber #Hack
https://gizmodo.com/everything-we-know-about-the-massive-uber-hack-1849545682