Request Demo

NIST Cybersecurity Framework

What to Learn From Uber's 2016 Data Breach...

down-arrow

Just last week, Uber disclosed that hackers accessed the personal information of 57 million riders and drivers in October 2016, a breach it didn’t disclose publicly until November 21, 2017. This lack of Due Care and ethical process is making waves in the media as this incident adds a potential legal burden for the company.

Uber Cyber Breach: What Happened?

According to the CEO of Uber, Dara Khosrowshahi, two hackers broke into the company in late 2016. Although there is no indication that trip location history, credit card numbers, bank account numbers, Social Security numbers or dates of birth were downloaded, the hackers were able to download files containing a significant amount of other information, including:

  • The names and driver’s license numbers of around 600,000 drivers in the United States.

  • Personal information including phone numbers, email addresses, and names of 57 million Uber users (drivers described above are included) around the world.

Khosrowshahi says hackers accessed the data through a third-party, cloud-based service. They found private authentication information that Uber engineers had accidentally exposed publicly on GitHub, a site many engineers and companies use to store code and track projects. The attack began when hackers got their hands on Uber user data stored on an Amazon server.

About the Uber Security Incident

Law enforcement advises companies to not pay hackers and report breaches to the authorities whenever there is an attack. However, instead of alerting users and authorities, Uber paid the hackers $100,000, perhaps to keep quiet and resolve the incident as quickly as possible.

The company’s failure to disclose the breach was very amateur. An Uber driver who has not yet received any communication from the company stated, “I found out through the media. Uber doesn’t get out in front of things, they hide them.” Just a small reminder that a data breach not only affects your business's success in dollars but also in reputation.

This incident didn't just upset riders and drivers. It will ultimately affect the company legally. There is no doubt that Uber will face possible consequences from both state and federal agencies, and it is going to be heavily fined for this incident. “Forty-eight states have security breach notification laws which require companies to disclose when hackers access private information,” including California, where Uber’s headquarters is located. Furthermore, the Uber breach affects non-U.S. users too, so there could be some international consequences.

Uber’s Solution to the Hack

According to Khosrowshahi, Uber is individually notifying the drivers whose driver’s license numbers were downloaded and providing these drivers with free credit monitoring and identity theft protection.

Here are some tips if you've been on Uber and want to reinstate your resilience in case your data was stolen, which you may never know.

What Lesson Can We Learn From This Uber Security incident?

Cybercriminals are always looking for vulnerabilities, and Uber clearly has some. The attackers used a relatively unsophisticated process compared to other major cyberattacks that happened this year. Ultimately, it was the cause of a lack of Due Care and negligence.

At the same time, you could sympathize with companies who are carrying around such data that they're more attractive for cybercriminals. These questions arise..

How could they have had the visibility to look into their program and see every vulnerability? How could they have known that everyone in their organization was doing their job correctly? That human error was as reduced as possible? That they were following best practices? How could they have even known that what they were doing was best practice at all? As compared to what?

How the NIST CSF Plays Its Part

CyberStrong provides visibility, reporting, measurement, and mapping to the gold-standard NIST Cybersecurity Framework. Imagine having the ability to map your company's strategy to this massive set of best practices in just hours.. You can enhance the security and resilience of your organization as you receive recommendations for improvement based on cost-impact on your resilience, and make informed decisions based on your existing gaps. A risk-based approach, measures your risk and cyber posture continuously, day to day, and sees your team in action to eliminate human error. Take advantage of effective and specific solutions while retaining flexibility within your program.

When it comes to cybersecurity, we all need to be proactive in our organizations for the sake of both our companies and our customers. At least for the sake of negative social implications, we don’t want another “Uber incident” to occur caused by vulnerabilities that could have been prevented.


 

You may also like

SEC Compliance Requirements: Why ...
on March 10, 2025

The SEC is getting serious about cybersecurity. Recent regulations and high-profile cases signal a new era of accountability for publicly listed companies. But how do you prepare? ...

First 90 Days: Exploring the CISO ...
on March 3, 2025

The first 90 days in any new role are critical, but for a Chief Information Security Officer (CISO), they can be make-or-break. This period is your opportunity to understand the ...

Integrating the Human Element in ...
on February 26, 2025

Cyber risk management is evolving, placing greater emphasis on collaboration and the critical role of human interaction. Experts in the field are advocating for a more ...

Revolutionizing Cybersecurity: The ...
on February 25, 2025

Control scoring has long been a critical yet cumbersome aspect of cyber risk management and compliance. Traditionally, organizations have relied on manual processes to assess and ...

CyberStrong February Product Update
on February 20, 2025

The team at CyberSaint is thrilled to announce the latest additions and updates to the CyberStrong solution. To start, we’re expanding Phase 1 of Asset Management with custom ...

Bridging the Gap Between Security ...
on February 24, 2025

Cybersecurity and risk management are often treated as separate disciplines within organizations. Security teams focus on identifying and mitigating technical threats, while risk ...