2022 Uber Breach Explained | How did Uber get hacked by an 18 year old?

Поделиться
HTML-код
  • Опубликовано: 21 авг 2024
  • A #CISOlife overview of the public information of the 2022 Uber Breach by Brian Haugli, CEO, SideChannel.
    Brian presents an explanation and graphical review of how the supposed 18 year old attacker breached Uber. The info released so far shows a series of steps:
    [2:00] Social Engineering of Employee
    [2:30] MFA SMS Push Flood
    [2:40] Pretends to be an IT Help Desk from Uber
    [3:05] Log into VPN
    [3:30] Internal scanning for more data
    [4:00] Finds hardcoded password in Powershell script
    [4:25] Access Privilege Access Management (PAM) - Thycotic
    [5:00] Access to other services; AWS, GCP, Slack, SentinelOne, HackerOne, etc
    [6:30] Breakdowns in controls and security that could lead to this breach
    #cisolife
    Follow us -
    Website - sidechannel.com
    Podcast - anchor.fm/ciso...
    LinkedIn - / sidechannelsecurity
    Twitter / X - / sidechannelsec

Комментарии • 30

  • @EMR-DESIGN
    @EMR-DESIGN Год назад +3

    Good breakdown. Hopefully others will learn from it.

  • @hobzzr8598
    @hobzzr8598 Год назад +2

    Great video, Great explanation. Annoying sound of marker on board.

    • @SideChannel
      @SideChannel  Год назад +2

      Thanks! Sorry about the marker.

  • @howdarylrolls
    @howdarylrolls Год назад +2

    Wait, are you just really good at writing backwards? Or did you just flip the video? Either way it’s a very unique way to do this video, despite ppl complaining about marker noises. Lol.
    That said, a lapel mic would probably isolate your voice better.

    • @SideChannel
      @SideChannel  Год назад +2

      Thanks! We just upgraded the studio mic to a Shure MV7

  • @MrBitviper
    @MrBitviper Год назад +1

    awesome breakdown. thanks for this

  • @saradhakannan
    @saradhakannan Год назад +3

    After the multiple push notification, was the victim accepted it?

  • @MelCraft10
    @MelCraft10 Год назад +1

    This was an amazing video. Great beginner breakdown. Subbed for future content!

  • @johnabel5722
    @johnabel5722 Год назад +1

    Good explanation. How did the attacker get a good password to authenticate with in order to generate a push for the sms second factor?

    • @SideChannel
      @SideChannel  Год назад

      We don't have info on that, some sources report it was from a previous leak or database of usernames/passwords

    • @zafmafattack
      @zafmafattack Год назад

      He got the employee credentials from an access broker online, and the brokers get them from breaches and the occasional employee selling access

  • @gurneemsaini1
    @gurneemsaini1 Год назад +1

    What device they VPN from? And if it was the hacker’s device was there any VPN vulnerability.. I thought we needed a cert or some kind of vpn control.

  • @Cyberplex
    @Cyberplex Год назад +1

    Awesome thank you for sharing.

  • @matt3316
    @matt3316 Год назад +1

    That was very well explained but as far as like the drivers for them what effect does it have on them because I am one of their drivers and because of this breach I'm not even sure if I want to hop online as they call it

    • @SideChannel
      @SideChannel  Год назад

      Doesn't seem to effect drivers that we know of.

  • @sarujanview
    @sarujanview Год назад +2

    Well explained that

  • @Z3kyTw0
    @Z3kyTw0 Год назад

    Has there been any discussion on how the attacker got the users credentials to start the MFA push ?
    \

  • @arnezedwards5560
    @arnezedwards5560 Год назад +1

    How did the attacker get the employees contact?

  • @jessloke7544
    @jessloke7544 Год назад

    so uber never do VA?? a clear text password store for such sensitive platform..

  • @Gripengamer
    @Gripengamer Год назад +1

    Great video and that, but please get a better mic and/or a better studio. It sounds like your in a aquarium xD

    • @SideChannel
      @SideChannel  Год назад +1

      Thanks, it's always a work in progress!