Uber finds 'no evidence' that sensitive user data was stolen in hack

The intruder who claims to have hacked Uber may not have done much damage. The ride-sharing company determined there was "no evidence" that the attacker accessed sensitive user data, such as ride history. All services are working properly and the company has restored use of the internal software it removed after discovering the flaw.

Uber did not say more about the reported culprit or the nature of the incident. Bleeping Computer says it has seen screenshots of the hacker that claim to show Uber's computing resources, including its Amazon Web Services console, Google Workspace dashboard, and virtual machines. The attacker also gained access to Uber's bug bounty program, suggesting he may be aware of security vulnerabilities that the company hasn't necessarily patched.

Account information appears to be secure. However, it is feared that the attacker could gain access to the source code or sell the bounty data to other hackers who could use the vulnerabilities for their own campaigns. There could be fallout in the days to come, although Uber riders have no immediate reason to worry.

All products recommended by Engadget are selected by our editorial team, independent of our parent company. Some of our stories include affiliate links. If you purchase something through one of these links, we may earn an affiliate commission. All prices correct at time of publication.

Uber finds 'no evidence' that sensitive user data was stolen in hack

The intruder who claims to have hacked Uber may not have done much damage. The ride-sharing company determined there was "no evidence" that the attacker accessed sensitive user data, such as ride history. All services are working properly and the company has restored use of the internal software it removed after discovering the flaw.

Uber did not say more about the reported culprit or the nature of the incident. Bleeping Computer says it has seen screenshots of the hacker that claim to show Uber's computing resources, including its Amazon Web Services console, Google Workspace dashboard, and virtual machines. The attacker also gained access to Uber's bug bounty program, suggesting he may be aware of security vulnerabilities that the company hasn't necessarily patched.

Account information appears to be secure. However, it is feared that the attacker could gain access to the source code or sell the bounty data to other hackers who could use the vulnerabilities for their own campaigns. There could be fallout in the days to come, although Uber riders have no immediate reason to worry.

All products recommended by Engadget are selected by our editorial team, independent of our parent company. Some of our stories include affiliate links. If you purchase something through one of these links, we may earn an affiliate commission. All prices correct at time of publication.

What's Your Reaction?

like

dislike

love

funny

angry

sad

wow